| dc.contributor.advisor | Michael O. Rabin. | en_US |
| dc.contributor.author | Juang, Jason K | en_US |
| dc.contributor.other | Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. | en_US |
| dc.date.accessioned | 2010-03-24T20:35:36Z | |
| dc.date.available | 2010-03-24T20:35:36Z | |
| dc.date.copyright | 2009 | en_US |
| dc.date.issued | 2009 | en_US |
| dc.identifier.uri | http://hdl.handle.net/1721.1/52767 | |
| dc.description | Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009. | en_US |
| dc.description | This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. | en_US |
| dc.description | Includes bibliographical references (p. 89-90). | en_US |
| dc.description.abstract | The security of modern cryptographic schemes relies on limits on computational power and assumptions about the difficulty of certain mathematical problems, such as integer factorization. This thesis describes hyper-encryption in the limited access model, a system that provides perfect secrecy and authentication against an adversary who possesses unbounded computational power, but who is limited in the ability to eavesdrop on more than a fraction of computers in a large network, such as the Internet. This thesis also presents an implementation of hyper-encryption in the limited access model, discusses areas where the theoretical system differs from the practical implementation, and analyzes their impact on the security of the system. | en_US |
| dc.description.statementofresponsibility | by Jason K. Juang. | en_US |
| dc.format.extent | 90 p. | en_US |
| dc.language.iso | eng | en_US |
| dc.publisher | Massachusetts Institute of Technology | en_US |
| dc.rights | M.I.T. theses are protected by
copyright. They may be viewed from this source for any purpose, but
reproduction or distribution in any format is prohibited without written
permission. See provided URL for inquiries about permission. | en_US |
| dc.rights.uri | http://dspace.mit.edu/handle/1721.1/7582 | en_US |
| dc.subject | Electrical Engineering and Computer Science. | en_US |
| dc.title | Practical implementation and analysis of hyper-encryption | en_US |
| dc.type | Thesis | en_US |
| dc.description.degree | M.Eng. | en_US |
| dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | |
| dc.identifier.oclc | 503456131 | en_US |