DESIGN AND IMPLEMENTATION OF PROVABLE SECURITY FOR CRYPTO-CURRENCIES

Type: Project Materials | Format: Ms Word | Attribute: Documentation Only | Pages: 76 Pages | Chapters: 1-5 chapters | Price: ₦ 3,000.00

2,108 marked this research material reliable.
Call or whatsapp: +2347063298784 or email: info@allprojectmaterials.com
DESIGN AND IMPLEMENTATION OF PROVABLE SECURITY FOR CRYPTO-CURRENCIES

In this project, the discussed issue is designing and implementing Crypto-currencies security System using Simulink.

 

Two main techniques were used in this project which is scrambling and AES-128 encryption algorithm.

 

Finally the two techniques were compared in terms of degree of confidentiality and quality of output currency. It

 

was found that scrambling algorithm produces a better quality audio signal compared to AES encryption which

 

gave a very low quality audio due to unresolved accumulated delays. Furthermore AES encryption gives better

 

security solutions compared to scrambling techniques. In AES it almost infeasible to decrypt the currency without

 

having the proper key and brute force attacks are very difficult with AES. Brute force attacks of AES may be

 

feasible in the coming years through the quantum computers. Chapter 1 Introduction

 

 

1.1 Background of the Project

 

 

The concern about money   security started from the very beginning (creation of universe), this concern

 

started when people first started having money   and willing to share among themselves. The

 

monetary  channel in which this shared money   is going through is subject to leakage and as a result

 

insecurity, so people started thinking of a ways to share their money   without worrying about their data to

 

be compromised by an unauthorized party. First they invented a very basic ways to protect the privacy of their

 

money   such as Caesars cipher, these basic ciphers later on evolved into a very cumbersome and complex

 

ways to protect the confidentiality of the money   such as,       DES,3DES,AES, RSA and many other

 

algorithms. According to Brandau(2008),although most of monetary  systems employ some sort of

 

security mechanism but always there is a security leakage in most of those systems, therefore currency encryption

 

is used in order to ensure that the currency transmitted from one end to another in Real-Time communication

 

systems such as, GSM, VOIP, Telephone and Analog Radio arrives safely without being compromised.

DESIGN AND IMPLEMENTATION OF PROVABLE SECURITY FOR CRYPTO-CURRENCIES

Additional Information

  • The Project Material is available for download.
  • The Research material is delivered within 15-30 Minutes.
  • The Material is complete from Preliminary Pages to References.
  • Well Researched and Approved for supervision.
  • Click the download button below to get the complete project material.

Frequently Asked Questions

In-order to give you the best service available online, we have compiled frequently asked questions (FAQ) from our clients so as to answer them and make your visit much more interesting.

We are proudly Nigerians, and we are well aware of fraudulent activities that has been ongoing in the internet. To make it well known to our customers, we are geniune and duely registered with the Corporate Affairs Commission of the republic of Nigeria. Remember, Fraudulent sites can NEVER post bank accounts or contact address which contains personal information. Free chapter One is always given on the site to prove to you that we have the material. If you are unable to view the free chapter 1 send an email to info@allprojectmaterials.com with the subject head "FREE CHAPTER 1' plus the topic. You will get a free chapter 1 within an hour. You can also check out what our happy clients have to say.


Students are always advised to use our materials as guide. However, if you have a different case study, you may need to consult one of our professional writers to help you with that. Depending on similarity of the organization/industry you may modify if you wish.


We have professional writers in various disciplines. If you have a fresh topic, just click Hire a Writer or click here to fill the form and one of our writers will contact you shortly.


Yes it is a complete research project. We ensure that our client receives complete project materials which includes chapters 1-5, full references, questionnaires/secondary data, etc.


Depending on how fast your request is acknowledged by us, you will get the complete project material withing 15-30 minutes. However, on a very good day you can still get it within 5 minutes!

What Clients Say

Our Researchers are happy, see what they are saying. Share your own experience with the world.
Be polite and honest, as we seek to expand our business and reach more people. Thank you.

A Research proposal for design and implementation of provable security for crypto-currencies:
Reviews: A Review on design and implementation of provable security for crypto-currencies, design, implementation, provable project topics, researchcub.info, project topic, list of project topics, research project topics, journals, books, Academic writer.
Chapter 1 Introduction 1.1 Background of the Project The concern about money security started from the very beginning (creation of universe), this concern started when people first started having money and willing to share among themselves. The monetary channel in which this shared money is going through is subject to leakage and as a result insecurity, so people started thinking of a ways to share their money without worrying about their data to be compromised by an unauthorized party. First they invented a very basic ways to protect the privacy of their money such as Caesar’s cipher, these basic ciphers later on evolved into a very cumbersome and complex ways to protect the confidentiality of the money such as, DES,3DES,AES, RSA and many other algorithms. According to Brandau(2008),although most of monetary systems employ some sort of security mechanism but always there is a security leakage in most of those systems, therefore currency encryption is used in order to ensure that the currency transmitted from one end to another in Real-Time communication systems such as, GSM, VOIP, Telephone and Analog Radio arrives safely without being compromised. .. computer science project topics

DESIGN AND IMPLEMENTATION OF PROVABLE SECURITY FOR CRYPTO-CURRENCIES

Project Information

  • CATEGORY : COMPUTER SCIENCE
  • TYPE : PROJECT MATERIAL
  • FORMAT : MICROSOFT WORD
  • ATTRIBUTE : Documentation Only
  • PAGES : 76 Pages
  • CHAPTERS : 1 - 5
  • PRICE : ₦ 3,000.00

Share Links

Download Post
Download Post

Search for Project Topics

Project topics in Departments

Do you need a writer for your academic work?