Essays about: "Kryptografiska protokoll"

Found 5 essays containing the words Kryptografiska protokoll.

  1. 1. Cost and efficiency comparison of Quantum Key Distribution schemes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Erik Lidbjörk; Rasmus Söderström Nylander; [2023]
    Keywords : ;

    Abstract : The development of quantum computing exposes critical vulnerabilities in classical encryption systems. However, quantum computing also enables new methods of secure communication. Quantum key distribution (QKD) is one class of such methods. READ MORE

  2. 2. MACsec in Classic AUTOSAR : MACsec Implementation PoC on Classic AUTOSAR ECUs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamna Zahid; [2022]
    Keywords : Automotive Ethernet; MKA; MACsec; Network security; Classic AUTOSAR; Automotive Ethernet; MKA; MACsec; Nätverkssäkerhet; Classic AUTOSAR;

    Abstract : Classic AUTOSAR provides a standardized architecture and guidelines for automotive development. However, it does not include specifications for securing Ethernet communication. The IEEE 802.1AE standard specifies a security standard called Media Access Control Security (MACsec) to protect Ethernet communication. READ MORE

  3. 3. Bootstrapping Secure Sensor Networks in the Internet of Things

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Edman; [2022]
    Keywords : Internet of Things; Machine-to-machine communications; Internet security; Cryptographic protocols; Sakernas internet; Maskin-till-maskin kommunikation; Säkerhet på internet; Kryptografiska protokoll;

    Abstract : The Internet of Things has become an integral part of modern society and continues to grow and evolve. The devices are expected to operate in various conditions and environments while securely transmitting sensor data and keeping low manufacturing costs. Security for the Internet of Things is still in its infancy and a serious concern. READ MORE

  4. 4. Evaluation of Network-Layer Security Technologies for Cloud Platforms

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bruno Marcel Duarte Coscia; [2020]
    Keywords : Overlay network; Network security; IPsec; Slack nebula; Nebula; Noise framework; Noise protocol; Överlagring Nätverk; Nätverkssäkerhet; IPsec; Slack nebula; Nebula; Noise ramverk; Noise protokoll;

    Abstract : With the emergence of cloud-native applications, the need to secure networks and services creates new requirements concerning automation, manageability, and scalability across data centers. Several solutions have been developed to overcome the limitations of the conventional and well established IPsec suite as a secure tunneling solution. READ MORE

  5. 5. On Asynchronous Group Key Agreement : Tripartite Asynchronous Ratchet Trees

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Phillip Gajland; [2020]
    Keywords : MLS; secure messaging; cryptography; MLS; säker meddelandehantering; kryptografi;

    Abstract : The subject of secure messaging has gained notable attention lately in the cryptographic community. For communications between two parties, paradigms such as the double ratchet, used in the Signal protocol, provide provably strong security guarantees such as forward secrecy and post-compromise security. READ MORE