Veuillez utiliser cette adresse pour citer ce document :
http://dspace1.univ-tlemcen.dz/handle/112/18654
Titre: | Etude et analyse des algorithmes de brouillage utilisé dans la sécurité des Signaux de parole. |
Auteur(s): | Guerroudj, Lina |
Mots-clés: | private key encryption; public key encryption audio stream, XOR; AES; Blowfish; RSA, Transposition, vigenére, wav file; Cryptography, Audio security chiffrement à clé secrète, chiffrement à clé publique, flux audio, XOR, AES, Blowfish, RSA, Transposition, vigenére, format Wave |
Date de publication: | 6-jui-2019 |
Editeur: | 28-06-2022 |
Référence bibliographique: | salle des thèses |
Collection/Numéro: | bfst2690; |
Résumé: | The sound is a familiar thing in our daily lives that we often forget the physical meaning which is not easy to understand. In the found throughout, especially with the advent of the Internet. Cryptography is traditionally used to conceal messages to some users. This use today has an interest of greater as Internet communications flowing in for infrastructure which it cannot guarantee the reliability and confidentiality. The main objective of our work is based on encryption and secure audio represented by Wav files flow using secret key encryption algorithms and public key as AES (Advanced Encryption Standard), RSA( Rivest, Shamir, Adleman) and Blowfish. This achievement is followed by a comparative study of these algorithms on a set of criteria, such as encryption/ decryption time and the quality and performance of the encryption operation. |
URI/URL: | http://dspace.univ-tlemcen.dz/handle/112/18654 |
Collection(s) : | Master SIC |
Fichier(s) constituant ce document :
Fichier | Description | Taille | Format | |
---|---|---|---|---|
Etude-et-analyse-des-algorithmes-de-brouillage-utilise-dans-la-securite..pdf | CD | 2,55 MB | Adobe PDF | Voir/Ouvrir |
Tous les documents dans DSpace sont protégés par copyright, avec tous droits réservés.