- Help & Terms of Use

Cryptography and Information Security
- Faculty of Engineering
- School of Computer Science, Electrical and Electronic Engineering and Engineering Maths
- Website http://www.bris.ac.uk/engineering/research/cryptography/
United Kingdom
Student theses
- Title (descending)
Search results
A multi-domain approach for security compliance, insider threat modelling and risk management.
Supervisor: Tryfonas, T. (Supervisor)
Student thesis : Doctoral Thesis › Doctor of Philosophy (PhD)
Analysis of Implementations and Side-Channel Security of Frodo on Embedded Devices
Supervisor: Oswald, M. E. (Supervisor) & Stam, M. (Supervisor)
A Study of Inference-Based Attacks with Neural Network Classifiers
Supervisor: Page, D. (Supervisor) & Oswald, E. (Supervisor)
A systems approach to asset management for the Clifton Suspension Bridge Trust
Supervisor: Tryfonas, T. (Supervisor) & Taylor, C. (Supervisor)
Student thesis : Doctoral Thesis › Engineering Doctorate (EngD)
Breaking boundaries for adoption of accessible high fidelity haptic feedback technologies
Supervisor: Roudaut, A. (Supervisor) & Warinschi, B. (Supervisor)
Cryptographic Access Control: Security Models, Relations and Construction
Supervisor: Warinschi, B. (Supervisor)
Engineering a platform for local peer-to-peer electricity trading
Supervisor: Chitchyan, R. (Supervisor), Delalonde, C. (External person) (Supervisor), Byrne, A. (External person) (Supervisor), Ferguson, D. (External person) (Supervisor) & Warinschi, B. (Supervisor)
Enhancing Current Software Safety Assurance Practice to Increase System Mission Effectiveness
Supervisor: May, J. (Supervisor), Tryfonas, T. (Supervisor) & Hadley, M. J. (External person) (Supervisor)
Game theory applied to cybersecurity threat mitigation - Analysis of Threshold FlipThem
Supervisor: Leslie, D. (Supervisor) & Smart, N. (Supervisor)
Handling organisational complexity with a framework of accessible founding principles
Supervisor: Oikonomou, G. (Supervisor) & Tryfonas, T. (Supervisor)
Hydrological Applications of Multi-source Soil Moisture Products
Supervisor: Han, D. (Supervisor) & Tryfonas, T. (Supervisor)
Modelling and Simulation Applications on Cyber-Physical Systems’ Security and Resilience
Supervisor: Tryfonas, T. (Supervisor) & Oikonomou, G. (Supervisor)
On the Theory and Design of Post-Quantum Authenticated Key-Exchange, Encryption and Signatures
Supervisor: Smart, N. P. (Supervisor) & Warinschi, B. (Supervisor)
Side Channel Attacks on IoT Applications
Supervisor: Oswald, M. E. (Supervisor) & Tryfonas, T. (Supervisor)
Software Defined Networking for the Industrial Internet of Things
Supervisor: Nejabati, R. (Supervisor) & Oikonomou, G. (Supervisor)
Towards Dynamic, SDN-assisted Interface Bonding for Heterogeneous 802.11 Devices
Supervisor: Doufexi, A. (Supervisor) & Oikonomou, G. (Supervisor)

- < Previous
Home > Office of Graduate Studies > Electronic Theses, Projects, and Dissertations > 729
Electronic Theses, Projects, and Dissertations
MODERN CRYPTOGRAPHY
Samuel Lopez , California State University - San Bernardino Follow

Date of Award
Document type, degree name.
Master of Arts in Mathematics
Mathematics
First Reader/Committee Chair
McMurran, Shawnee
We live in an age where we willingly provide our social security number, credit card information, home address and countless other sensitive information over the Internet. Whether you are buying a phone case from Amazon, sending in an on-line job application, or logging into your on-line bank account, you trust that the sensitive data you enter is secure. As our technology and computing power become more sophisticated, so do the tools used by potential hackers to our information. In this paper, the underlying mathematics within ciphers will be looked at to understand the security of modern ciphers.
An extremely important algorithm in today's practice is the Advanced Encryption Standard (AES), which is used by our very own National Security Agency (NSA) for data up to TOP SECRET. Another frequently used cipher is the RSA cryptosystem. Its security is based on the concept of prime factorization, and the fact that it is a hard problem to prime factorize huge numbers, numbers on the scale of 2^{2048} or larger. Cryptanalysis, the study of breaking ciphers, will also be studied in this paper. Understanding effective attacks leads to understanding the construction of these very secure ciphers.
Recommended Citation
Lopez, Samuel, "MODERN CRYPTOGRAPHY" (2018). Electronic Theses, Projects, and Dissertations . 729. https://scholarworks.lib.csusb.edu/etd/729
Since June 07, 2018
Included in
Information Security Commons , Number Theory Commons
Advanced Search
- Notify me via email or RSS
- Department, Program, or Office
- Disciplines
Author Corner
- Submit Research
- Graduate Studies Website
- Thesis Digitization Project
Home | About | FAQ | My Account | Accessibility Statement
Privacy Copyright Acrobat Reader

- Testimonials
2020 All Rights Reserved By © Matlab Simulation
Form Submitted
Www.matlabsimulation.com, top quality cryptography thesis, related pages, research areas.
Digital Image processing
Medical Image processing
Biomedical Signal processing
Biometric Detection
Information Security
Neural Networks
Network Security
Wireless Networks
Wireless Communication
Matlab Simulink
power Electronics
Renewable Energy
Mobile Communication
Satellite Communication
Optical Communication
Video processing
Artificial Intelligence
Advanced Robotics
Related Tools
3D-2D CONVERTER
RAPID MINER
SENTI WORDNET
CLOUD REPORTS
Cryptography is a security-based system that offers secured services such as integrity, user authentication, privacy as well as warehouses of confidential data over the communication channels. It is otherwise known as communication methodologies which are derived from the statistical approaches to make the message resilient to decipher .“This is the article which is fully contented with the concepts that are necessary for the best cryptography thesis ”
In addition, they do have featured rule-based computation algorithms . These are widely used to generate cryptographic keys and to make digital operations trustworthy.
As you know that, data packets are being transmitted over the massive network. Hence there is a chance to face an attack or may lose confidential data inputted in it. Thus it is important to deploy a technology called “Cryptography”.
Cryptography is the security-based technique used to encrypt the network data packets as well as generate two major keys named symmetric and asymmetric . These keys are used at the endpoints of both sender and receiver. Data packets encryption is possible by the asymmetric keys. Our technical crew has lighted up this article with an overview of cryptography for your better understanding
Overview of Cryptography
- The term cryptography refers to the data framing in a secret manner
- The main objective is to preserve the secrecy of the message
- Text-based carriers transmit the data from one end to another end
- It is the data visibility features & offers security services
- Security services such as non-repudiation, data integrity & accessibility
- Cryptanalysis attack can break the secrecy of the data packets
- Cryptography always offers the results in ciphertext
This is the overview of cryptography. In point of fact, cryptography concepts are having a huge amount of ideas and aspects that are used to secure the network from the unstable network. At this time, we felt that giving an explanation about the major functions of cryptography will make you understand better. Shall we get into the next section? Come on guys lets we brainstorm together to craft innovative cryptography thesis topics .

Major Functions of Cryptography
- Exchanges the keys among the senders and receivers
- Acknowledges the messages sent by the sender
- Authorizes the legitimates users with exact credentials
- Assures the data privacy that no one can read except the receiver
- Ensures the originality of the received message
The aforementioned are the major functioning areas of cryptography systems . Actually, cyber-attacks are getting boom day by day. The attackers in the network are trying to identify the loopholes and vulnerable areas in which they can intrude on the organization or network. This has aroused when we are started to use the internet connections.
Besides, we cannot communicate without the aid of the internet. Hence, developers and engineers in the world are trying their best to eradicate the attacks. For this, we have suggested some of the emerging cryptographic algorithms for the ease of your understanding.
Emerging Cryptographic Algorithms
- Key Types: Public Key
- Objective: Exchanging Keys & Digital Signatures
- Effects: Low Security
- Effects: Low Security
- Objective: Hash Operations
- Effects: Requires Huge Outputs
- Key Types: Symmetric Key
- Objective: Encryption
- Effects: Requires Greater Key Sizes
- Objective: Key Generation & Digital Signatures
These are the diverse algorithms involved in development of cryptography thesis ideas . As a matter of fact, our knowledge hulks are well versed in the areas of cryptography. By doing so many researches and experiments in cryptography-related aspects we do prefer clear-cut algorithms to overcome all the possible issues that arise in the determined areas of research.
Actually, we are being trusted by various students from all over the world in the event of guiding those throughout the proposed works get done. Now we can the section regarding cryptographic attacks.
What are Cryptographic Attacks?
- The cryptographic attack is done by identifying vulnerabilities in protocols, codes & cipher
- They also interfere with the key management schemes or structures
- This process is otherwise known as cryptanalysis
The main objective of the attacker is to get the secrecy of the data transmitted through the network by means of encryption. In recent days, we are facing so many social engineering and other harmful attacks and they are breaking the efficiency of the cryptosystems . But it needs some level of capacity or knowledge in the areas of arithmetical computations.
In this regard, let us discuss the different types of attacks that are being presented in the cryptographic techniques. Are you interested to know about them? Yes, we know that you are keenly paying your attention here. Come on let us move on to the ensuing passage to make your understanding better in the attack areas too.
What are the Different Types of Attacks in Cryptography?
- DDOS Attack
- SYN Flooding
- Smurf Attack
- Denial of Services
- Session Hijacking
- SQL Injection
- Cross-site Scripting
- Intercept Resend Attack
- Detector Blinding Attack
- Photon Number Splitting
- Time-shift Attack
- Coherent Attack
- Collective Attack
- Individual Attack
- Trojan Horses
- Drive-by Attack
- Whale Phishing Attack
- Spear Phishing Attack
- Impersonation Attack
- Message Modification Attack
- Replay Attack
- Masquerade Attack
- Message Content Release
- Network Traffic Analysis
- Ping Sweeps Attack
- Packet Sniffer Attack
- Port Scanning Attack
- Social Engineering Attack
- Traffic Interception
- Man in the Middle Attack
- Key Logger Attack
- Dictionary Attack
- Brute Force Attack
- Password Attack
- Trust Exploitation Attack
- Port Redirection Attack
- Side-Channel Attack
- Power Analysis Attack
- Fault Attack
- Scanning Attack
- Timing Attack
- Cache Accessing Attack
- Linear Crypt Analysis
- Known Plain-text Attack
- Differential Crypt Analysis
- Chosen Cipher-text Attack
- Birthday Attack
The above-mentioned are the innumerable attacks that are held in every organization and faced by each and every individual on the internet. As this article is focused on giving content on the subject of cryptography thesis here we would like to make your base as strong. That means we are going to explain one of the cryptographic attacks for the ease of your understanding. Yes, the next section is all about the side-channel attacks.
In the upcoming sections, we’ve clearly mentioned to you the overview of the side-channel attacks. Are you guys interested to know about them? We know that you are already tuned with the article’s flow! Come on lets we have the quick insights!!!
Side-Channel Attacks in Cryptography
- A side-channel attack is possible when cryptography leaks out the information
- For instance, EMF produced by the supercomputers afore encryption
Generally, the secured communication channel is intended to transfer the data which is resilient to altering purposes. On the other hand, robust data interference is possible in confidential communication channels. Thus the information can be read by some unauthorized individuals. A telecommunication channel is encrypted at both ends of parties. It is the inclusion of,
- Valid distribution of notes & usage
- Purposes & effective areas
- Identification of indicators
- Number of holders
- Aiding suggestions
This is how the side-channel attacks are taking advantage of the confidential data that is transmitted through the various channels of communication. Here, you might get confusion or dilemma about what will be the things that come under the side channels. Did our researchers guess right? Our technicians in the industry furthermore want to denote the exact side channels list for the ease of your understanding.
What are Side Channels?
- Hardware Testing Areas
- Faults & Caches
- Electro Magnetic Fields
- Power Cables
The listed above are the channels which could leak the highly confidential data during the data transmission. In fact, this is becoming possible by the developer’s inefficient considerations while designing the cryptographic protocols and systems. For instance, giving if-else comments in the programming would give access to the attackers. As well as highly benefits the attackers by means of stealing the data assets .
In addition to this section, we would also like to high spot the different classes of side-channel attacks for your cherished contemplations. In fact, this is one of the important areas of this article hence we are advising you to pay your attention here. Come on, guys! Let us move on to the immediate section.
Different Classes of Side-Channel Attacks
- Acoustic happens when a complete computation done
- High featured cameras can read sensitive data by recording the visuals
- State retention losses are caused by adjacent memory accesses
- This is possible by altering the memory off-limits (row hammer)
- Destroyed confidential data can be stolen here
- For example, cold boot attacks
- This is retrieving sensitive data by showing faults in the evaluation
- Electromagnetic radiations can offer the cipher-texts & plaintexts
- These measures help to decrypt the encrypted packets
- It is also possible to handle them in non-cryptographic attacks (TEMPEST)
- It makes use of chances in which hardware consumes power while computation
- It measures the computation time by matching the passwords given
- Accesses the cache histories of the victim’s devices
The listed above are the different classes of side-channel attacks. Apart from this attack, if you want to explore more in the other cryptographic attacks you could approach our researchers at any time. Usually, these attacks can be tackled by the implementation of cryptography schemes. Yes, this is the right time to discuss the attack prevention schemes in cryptography and steganography projects. Are you interested in stepping forward? Come on, dear students!!! Let grab them.
Attack Prevention Schemes in Cryptography
- Private & Public Key Cryptography
- Silicon-Level Security Measures
- Modified AES Models
The foregoing section has conveyed to you the different prevention schemes in cryptography. If you still need any assistance in these areas you are always hailed to have our opinions. As this article is focused on delivering the concepts in order to frame the best cryptography thesis here we primarily wanted to highlight how to write exact thesis chapters for your better understanding.
How to Write Cryptography Thesis Chapters?
- Introduction of the theme by common statements
- Precise the particular theme by a thesis statement
- Conclude everything by overall combinations
The above listed are the common things that should be considered though writing a thesis. In addition to this, it is also important and essential to note the things to be presented in the thesis introduction areas. Yes, the next section is all about how a thesis introduction is to be written.
- Overview of the research theme & background
- Define terms of the research & refer to its scope
- Resilient topics & robust base of introduction
- Bring related literature reviews according to the research
- Point out the current state of affairs
- Compute the current state of affairs, merits & demerits
- Recognize the research gaps
- Identify the research importance
- Comment the research issues & questions
- Indicate the research goals & purposes
- List the suggestions & theories
- Draw the thesis in a structural manner
- Point out the methodologies
This is how the thesis is written and things need to be considered. Besides, our technical would like to make you better in the areas of the latest cryptography titles also. Yes, my dear students, we are going to envelop the next section with the various topics of cryptography thesis for your added knowledge. Come let us also learn them.

Latest Thesis Titles in Cryptography
- Blockchain Method’s Privacy & Security
- Malware & Network Vulnerability Detection by Newfangled Techniques
- Risk Management & Intrusion Detection in Real-time
- Hardware-based Attacks & Safety Measures
- Pattern Recognition
- Access Control & Secured User Authentication
- Post-quantum Cryptography Structural Designs
- Internet of Things based Privacy & Security
- Software Defined Networking &
- Wireless Networks Privacy & Security
- Machine Learning & Artificial Intelligence Privacy & security
- Innovative Threat Detection Methodologies
- Lightweight based Cryptography Behavior Codes & Patterns
- New Incontestable Cryptographic Protocols & Systems
- Privacy-preserving Models & Protocols
These are some of the developed thesis ideas of our technicians. Apart from this, we have conducted around 250+ cryptography thesis efficaciously with fruitful results. If you are surfing for assistance in writing a thesis then here is a suggestion, let’s make appointments with our researchers to get the newfangled ideas.
Let’s light up your dreams and apply your thought processes by means of technical researches!!!!
A life is full of expensive thing ‘TRUST’ Our Promises
100% confidential.
We don’t disclose our client’s data to any third party and it is kept as secret to all.
Fresh Ideas
All the time, you receive only the novel ideas that not release from anywhere.
Work Guarantee
We guarantee for your satisfaction and it is not further need of correction and complaints.
Plagiarism Free
We follow our own writing. It means that without copying from any source, we write it.
We are not intent to sale our product to more than one person. It is totally new for each.
Business Ethics
Surely, we follow our set of ethics to send the high quality products for everyone.
On-Time Delivery
We always deliver your work at the time of delivery. So that feels our timely guidance.
Affordable Price
We are not serving with high cost. You get an excellent work in at reasonable price.
We meet each individual customer’s demands by our years of skills. This is the secret of success.
Great Memories Our Achievements
We received great winning awards for our research awesomeness and it is the mark of our success stories. It shows our key strength and improvements in all research directions.

Our Guidance
- Assignments
- Literature Survey
- Mathematical Proofs
- Research Proposal
- System Development
- Paper Writing
- Conference Paper
- Thesis Writing
- Dissertation Writing
- Hardware Integration
- Paper Publication
24/7 Support, Call Us @ Any Time [email protected] +91 94448 56435

IMAGES
VIDEO
COMMENTS
There are three main branches of Cryptography: Symmetric systems, Asymmetric systems, and Cryptographic protocols. Secure internet communication can be realized.
For this reason, NIST has started a Lightweight Cryptography Project to standardize lightweight algorithms. In this thesis, we first explain what
Websitehttp://www.bris.ac.uk/engineering/research/cryptography/. Postal addressShow on map ... Student thesis: Doctoral Thesis › Doctor of Philosophy (PhD).
Lopez, Samuel, "MODERN CRYPTOGRAPHY" (2018). Electronic Theses, Projects, and Dissertations. 729. https://scholarworks.lib.csusb.edu/etd/729.
In the second part of the thesis, we focus on authenticated encryption schemes. While regular ciphers only protect privacy of processed data, authenticated
How to start writing a cryptography thesis? Get in touch with us for customized cryptography dissertation writing help from top rated writers.
This thesis focuses on issues arising when implementing cryptography, ... to turn a cryptographic algorithm into a practical system which can provide.
In this section, some cryptography algorithms are briefly introduced, and each of them will be used in this thesis project. 2.4.1 Rivest-Shamir-Adleman (RSA).
A Senior Thesis submitted in partial fulfillment ... Cryptography, the study of encryption and decryption, stems from the basic desire for privacy.
that all prior ciphers based on CA have been found to be vulnerable to attacks, the present work first develops cryptographic primitives using Cellular Automata