Master Degree / Yüksek Lisans Tezleri

Permanent URI for this collectionhttps://hdl.handle.net/11147/3008

Browse

Search Results

Now showing 1 - 3 of 3
  • Master Thesis
    A Firewall Design for Academic Environments
    (Izmir Institute of Technology, 2001) Tok, Metin; Koltuksuz, Ahmet Hasan
    Computer networks in academic environments could have many secUlity problems if there weren't enough precaution. The source of these problems is generally vulnerabilities of TCP/IP protocol and Internet. Vulnerabilities can cause threats. These threats will be analyzed in this thesis. There are many kind of countelmeasures to prevent the assets of the academic networks. Firewalls are a kind of countermeasure against these attacks. In this thesis, these countelmeasures will be also analyzed and a firewall will be designed and proposed for academic environments against these threats.
  • Master Thesis
    An Approch To the Security Problems in the Tcp/Ip Protocol Suite for a Network Security Monitor Design
    (Izmir Institute of Technology, 1999) Mutaf, Pars; Koltuksuz, Ahmet Hasan
    There are a number of security problems in the TCP/IP protocol suite. In this thesis these problems will be analyzed in detail. The problems in several existing prevention methods will be analyzed as well in order to show that security policies based merely on preventive measures are not completely secure and convenient. Therefore, "network security moniJoring" will be proposed as an alternative and supplementary approach against Internet attacks.
  • Master Thesis
    An Analysis of Key Generation Efficiency of Rsa Cryptosystem in Distributed Environments
    (Izmir Institute of Technology, 2005) Çağrıcı, Gökhan; Koltuksuz, Ahmet; Koltuksuz, Ahmet Hasan
    As the size of the communication through networks and especially through Internet grew, there became a huge need for securing these connections. The symmetric and asymmetric cryptosystems formed a good complementary approach for providing this security. While the asymmetric cryptosystems were a perfect solution for the distribution of the keys used by the communicating parties, they were very slow for the actual encryption and decryption of the data flowing between them. Therefore, the symmetric cryptosystems perfectly filled this space and were used for the encryption and decryption process once the session keys had been exchanged securely. Parallelism is a hot research topic area in many different fields and being used to deal with problems whose solutions take a considerable amount of time. Cryptography is no exception and, computer scientists have discovered that parallelism could certainly be used for making the algorithms for asymmetric cryptosystems go faster and the experimental results have shown a good promise so far. This thesis is based on the parallelization of a famous public-key algorithm, namely RSA.