Analysis of the DES, LOKI, and IDEA algorithms for use in an encrypted voice PC network
dc.contributor.advisor | Chin-Hwa Lee | |
dc.contributor.advisor | Suh, M.. | |
dc.contributor.author | McClenney, Walter O. | |
dc.date | September 1995 | |
dc.date.accessioned | 2013-04-29T22:51:45Z | |
dc.date.available | 2013-04-29T22:51:45Z | |
dc.date.issued | 1995-09 | |
dc.identifier.uri | http://hdl.handle.net/10945/31592 | |
dc.description.abstract | The protection of information is of vital importance to the successful operation of both the Federal Government and the Department of the Navy. Attention is usually given to the protection of classified information. The Computer Security Act mandates that not only classified, but sensitive information be protected in accordance with the Privacy Act. The increasing reliance on networks makes this a challenging problem to overcome. The focus of this thesis is to examine the capabilities, effectiveness, and limitations of the DES, LOKI, and IDEA cryptosystems for use in the PC environment. It analyzes the use of these cryptosystems for network voice encryption. Further, this thesis examines the function and security of these cryptosystems and on possibilities for implementation in a Naval Postgraduate School PC network. Experimental results on the speed and efficiency of two of the cryptosystems are presented to show their relative strengths and weaknesses. A recommendation is made as to the appropriate cryptosystems to be used in a network implementation. Further recommendations are given on the type of computer networking architecture and the type of network encryption to use. (KAR) P. 2. | en_US |
dc.description.uri | http://archive.org/details/analysisofdeslok1094531592 | |
dc.format.extent | 49 p. | en_US |
dc.language.iso | en_US | |
dc.publisher | Monterey, California. Naval Postgraduate School | en_US |
dc.rights | This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. | en_US |
dc.title | Analysis of the DES, LOKI, and IDEA algorithms for use in an encrypted voice PC network | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Information Technology Management | |
dc.description.funder | NA | en_US |
dc.description.recognition | NA | en_US |
dc.description.service | U.S. Navy (U.S.N.) author. | en_US |
etd.thesisdegree.name | M.S. in Information Technology Management | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Information Technology Management | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.