Master Degree / Yüksek Lisans Tezleri
Permanent URI for this collectionhttps://hdl.handle.net/11147/3008
Browse
2 results
Search Results
Master Thesis Performance Enhancement of Real-Time Protocol Master of Science(Izmir Institute of Technology, 2010) Yücel, Çağan Selçuk; Ayav, TolgaA mechanism is described for dynamic adjustment of the performance requirements of multimedia applications. The sending application uses RTP receiver reports to compute packet loss and control mechanism periodically measures the utilization. Based on these and some other metrics the control mechanism can make necessary adjustments. Several experiments have been run in order to tune and evaluate the mechanism. The results indicate that the mechanism can be applied efficiently and the performance of the RTP can be increased.Master Thesis Group Key Establishment Protocols: Pairing Cryptography and Verifiable Secret Sharing Scheme(Izmir Institute of Technology, 2013) Aslanoğlu, Rabia; Şahin, SerapThe aim of this study is to establish a common secret key over an open network for a group of user to be used then symmetrical secure communication between them. There are two methods of GKE protocol which are key agreement and key distribution. Key agreement is a mechanism whereby the parties jointly establish a common secret. As to key distribution, it is a mechanism whereby one of the parties creates or obtains a secret value and then securely distributes it to other parties. In this study, both methods is applied and analyzed in two different GKE protocols. Desirable properties of a GKE are security and efficiency. Security is attributed in terms of preventing attacks against passive and active adversary. Efficiency is quantified in terms of computation, communication and round complexity. When constructing a GKE, the challenge is to provide security and efficiency according to attributed and quantified terms. Two main cryptographic tools are selected in order to handle the defined challenge. One of them is bilinear pairing which is based on elliptic curve cryptography and another is verifiable secret sharing which is based on multiparty computation. In this thesis, constructions of these two GKE protocols are studied along with their communication models, security and efficiency analysis. Also, an implementation of four-user group size is developed utilizing PBC, GMP and OpenSSL Libraries for both two protocols.
