The Global System for Mobile Communications (GSM) is among the most widely used cellular technology throughout the world. GSM is utilized for a number of uses, but mainly for voice communication and SMS. Security is essential for Global System for Mobile Communications GSM. The security consists of elements utilized to shield the numerous stakeholders, for example service providers & subscribers. In this project, we will discuss: Security Attacks, Cryptographic Protection Methods, Mobile Station (MS), Cryptanalytical Attacks against GS, etc.
Quantum key growing, referred to as quantum cryptography or quantum key distribution, is a technique using some attributes of quantum mechanics to create a secret shared cryptography key even if an eavesdropper has access to unlimited computational power. An important but often
In hospitals, medical data is stored in databases. These medical databases store anything from diagnoses to patient information. Some of the data in a medical database is sensitive and access to this data should be limited to authorized persons. Furthermore, the integrity of the data should be protected to prevent unauthorized persons from making alterations.
Steganography, meaning hidden writing, is the technique of concealing secret information into another cover-media, such as audio, video, image and text, in such a manner that the very existence of the information is camouflaged. Unlike the goal of cryptography, which prevents the data from illicit access and modification by transforming the secret data into messy and meaningless bit-streams, the aim of steganography is to conceal their very existence such that the embedded data is inaudible or invisible to the grabbers.
This master thesis deals with Internet security in general and IPsec in particular. Traffic and transactions over the Internet are risky, and credit card numbers are easily stolen and abused. IPsec has been developed to ensure security and integrity and we discuss
With more and more widespread use of web services in building distributed applications grows and the need to develop and implement adequate mechanisms for protection of such applications. The purpose of this paper is to investigate ways for achieving high security by
With the advancements of mobile communication technologies, the utilization of audio-visual information in addition to textual information becomes more prevalent than the past. Cryptographic approaches are therefore necessary for secure multimedia content storage and distribution over open networks such as the Internet.
This thesis describes two proposed schemes that could be used to secure mobile messaging (SMS/MMS) as well as one scheme that could be used to secure mobile content. The security services we considered in securing the mobile messages are confidentiality, authentication, non-repudiation
This master thesis has been written for the specific purpose of finding a way to store encryption keys in a secure manner. Encryption keys are used to protect valuable information. If the secrecy, integrity or availability of the keys are damaged, then
This thesis is motivated by the problem of user authentication mechanisms, i.e. the problem of associating a digital identity with a physical person for later verification. Authentication in the physical world is an old story, keys opened doors, people were recognised by
Project Reports, Final Year Projects for Students, Case Studies, Dissertation Ideas, Thesis Topics, Project Sample Downloads