[giaban]0.000 VNĐ[/giaban] [kythuat]
Voice and image encryption, and performance analysis of counter mode advanced encryption standard for WiMAX


[/kythuat]
[tomtat]
Voice and image encryption, and performance analysis of counter mode advanced encryption standard for WiMAX
Table of Contents
Abstract
Acknowledgements
Table of Contents
List of Tables
List of Figures
1 Introduction
1.1 Secure Digital Communication System
1.2 Overview of WiMAX
1.3 WiMAX Security Architecture
1.4 Fundamentals of Encryption
1.5 Implementing a Cryptosystem
1.6 Outline of Thesis
2 The Advanced Encryption Standard
2.1 The AES Algorithm
2.1.1 Encryption
2.1.1.1 A Sub-bytes step
2.1.1.2 Shift rows step
2.1.1.3 Mix columns step
2.1.1.4 Add round key step
2.1.1.5 Key Schedule
2.1.2 Decryption
2.2 AES Modes of Operation
2.2.1 Electronic codebook mode
2.2.2 Cipher block chaining mode
2.2.3 Cipher feedback mode
2.2.4 Output feedback mode
2.2.5 Counter mode
2.3 Benefits of using Counter Mode
3 Audio and Image Encryption in MATLAB using AES -CTR
3.1 Audio Encryption
3.2 AES –CTR Encryption Process
3.2.1 PCM
3.2.2 Decimal to binary stream
3.2.3 Implementing the encryption engine
3.2.3.1 Substitution of bytes (SUB_SBOX)
3.2.3.2 Shift rows
3.2.3.3 Mix columns
3.2.3.4 Add round key
3.2.3.4 Key Expansion
3.2.4 Decryption
3.3 Voice Encryption Results
3.4 Image Encryption and Results
4 Error Properties of AES
4.1 Avalanche Effect
4.2 Bit Error Expansion
4.3 Bit Error Propagation in Counter Mode
5 Results of Improved AES –CTR Performance with FEC in AWGN
5.1 BPSK Modulator and Demodulator
5.2 Forward Error Correction Using BCH Code
5.2.1 (n, k) = (31, 16) Binary BCH code
5.2.2 Berlekamp algorithm for decoding Binary BCH (31, 16) code
5.3 Analysis of AES –CTR Mode Error Performance
5.3.1 AES in ECB mode with BPSK
5.3.2 AES in CTR mode – perfect synchronization
5.3.2.1 Case 1
5.3.2.2 Case 2
5.3.3 AES –CTR mode with counter transmittal
5.3.3.1 Case 3
5.3.3.2 Case 4
5.3.4 Performance of AES –CTR compared with AES –ECB
5.3.5 Binary BCH (31, 16) coded performance of AES -CTR
5.3.5.1 Case 5
5.3.5.2 Case 6
5.3.5.3 Case 7
6 Conclusion and Future Work
6.1 Conclusion
6.2 Future Work
References 
[/tomtat]

Bài viết liên quan