Deokar, Ravi Babaji (2023) File Transfer on Cloud using Diffie-Hellman Key Exchange in Conjunction with AES Encryption. Masters thesis, Dublin, National College of Ireland.
Preview |
PDF (Master of Science)
Download (1MB) | Preview |
Preview |
PDF (Configuration manual)
Download (3MB) | Preview |
Abstract
The advent of internet communications has been widely adopted in recent times, with major advancements being made in the field of technology. With such advances in technology evolving at a faster pace, the role of online platforms to fulfill the purpose of remote communications has been successfully established. In light of this fact, communication ought to be established over a wireless channel involving two different parties that wish to send a private message through this medium. Hence, protecting this data and ensuring that the wireless channel is protected from security breaches becomes mandatory. It is at this point that the notion of cryptography is adopted. Cryptography is a branch of cyber security that tends to secure private messages sent over an online platform to protect them from breaches and attacks done by hackers. For its implementation, several encryption algorithms and techniques are used so that a respective approach can be followed and the informational exchange between the communicating parties can be secured. For this purpose, I propose the implementation of encryption algorithms to secure and monitor the online data so that a trust factor between the client and the third party is developed. The AES encryption algorithm is used to generate the existing key to be shared between the two end parties through a mail message sent by the recipient. In addition to the AES algorithm, the ECDHA encryption algorithm is also put forward. The amalgamation of the two mentioned algorithms helps to develop a technique that would imbibe the agreement protocol and execute the encryption and decryption phases without service delay. The generation of respective keys and their sizes is performed by the AES algorithm so that a communication channel can be developed between the client and the server. However, the execution of the ECDHA algorithm is used to secure the data upload and sharing on the cloud. This implementation of a hybrid concept that involves a combination of two algorithms tends to ensure that the overall security of the system model is maintained and authenticated communication is established. In the last stage, the final experiment is carried out, wherein the encryption and decryption times of various key sizes are compared for their evaluation.
Item Type: | Thesis (Masters) |
---|---|
Supervisors: | Name Email Heeney, Sean UNSPECIFIED |
Subjects: | Q Science > QA Mathematics > Electronic computers. Computer science T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science T Technology > T Technology (General) > Information Technology > Cloud computing Q Science > QA Mathematics > Computer software > Computer Security T Technology > T Technology (General) > Information Technology > Computer software > Computer Security Q Science > QA Mathematics > Computer software > File Sharing T Technology > T Technology (General) > Information Technology > Computer software > File Sharing |
Divisions: | School of Computing > Master of Science in Cloud Computing |
Depositing User: | Tamara Malone |
Date Deposited: | 18 Apr 2023 17:25 |
Last Modified: | 18 Apr 2023 17:25 |
URI: | https://norma.ncirl.ie/id/eprint/6467 |
Actions (login required)
View Item |