Abstract |
I present research on various encryption schemes and their applications in securing data. To do this, I discuss their vulnerabilities, implementations (both logically and mathematically), and briefly mention their durability against cryptanalysis attacks. I will discuss their mathematical properties, and theories that are assumed to hold within a security parameter. Namely the RSA (Rivest, Shamir, and Adelman) Encryption Algorithm and AES (Advanced Encryption Standard) Algorithm in CBC mode (Cipher Block Chaining) against chosen-plaintext attacks. Finally, I will explain why all cryptography will eventually converge to a field of quantum mechanics.
|