Show simple item record

dc.contributor.advisorShepherd, Simon J.
dc.contributor.advisorAbd-Alhameed, Raed A.
dc.contributor.authorAdeka, Muhammad I.*
dc.date.accessioned2017-02-16T10:01:41Z
dc.date.available2017-02-16T10:01:41Z
dc.date.issued2015
dc.identifier.urihttp://hdl.handle.net/10454/11380
dc.description.abstractThis work modifies Shamir’s algorithm by sharing a random key that is used to lock up the secret data; as against sharing the data itself. This is significant in cloud computing, especially with homomorphic encryption. Using web design, the resultant scheme practically globalises secret sharing with authentications and inherent secondary applications. The work aims at improving cybersecurity via a joint exploitation of human factors and technology; a human-centred cybersecurity design as opposed to technology-centred. The completed functional scheme is tagged CDRSAS. The literature on secret sharing schemes is reviewed together with the concepts of human factors, trust, cyberspace/cryptology and an analysis on a 3-factor security assessment process. This is followed by the relevance of passwords within the context of human factors. The main research design/implementation and system performance are analysed, together with a proposal for a new antidote against 419 fraudsters. Two twin equations were invented in the investigation process; a pair each for secret sharing and a risk-centred security assessment technique. The building blocks/software used for the CDRSAS include Shamir’s algorithm, MD5, HTML5, PHP, Java, Servlets, JSP, Javascript, MySQL, JQuery, CSS, MATLAB, MS Excel, MS Visio, and Photoshop. The codes are developed in Eclipse IDE, and the Java-based system runs on Tomcat and Apache, using XAMPP Server. Its code units have passed JUnit tests. The system compares favourably with SSSS. Defeating socio-cryptanalysis in cyberspace requires strategies that are centred on human trust, trust-related human attributes, and technology. The PhD research is completed but there is scope for future work.en_US
dc.description.sponsorshipPetroleum Technology Development Fund (PTDF), Abuja, Nigeria,en_US
dc.language.isoenen_US
dc.rights<a rel="license" href="http://creativecommons.org/licenses/by-nc-nd/3.0/"><img alt="Creative Commons License" style="border-width:0" src="http://i.creativecommons.org/l/by-nc-nd/3.0/88x31.png" /></a><br />The University of Bradford theses are licenced under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-nd/3.0/">Creative Commons Licence</a>.en_US
dc.subjectHuman factor; Cryptology; Cybersecurity; Communication; Risk; Authentication; Security perimeter; Web of Trust; Secret sharing; Cloud data repositoryen_US
dc.titleCryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trusten_US
dc.type.qualificationleveldoctoralen_US
dc.publisher.institutionUniversity of Bradfordeng
dc.publisher.departmentFaculty of Engineering and Informaticsen_US
dc.typeThesiseng
dc.type.qualificationnamePhDen_US
dc.date.awarded2015
refterms.dateFOA2018-07-26T09:48:50Z


Item file(s)

Thumbnail
Name:
Submission_Adeka_PhD_Thesis_Po ...
Size:
4.419Mb
Format:
PDF
Description:
Thesis

This item appears in the following Collection(s)

Show simple item record