Essays about: "Symmetric key Encryption"

Showing result 1 - 5 of 17 essays containing the words Symmetric key Encryption.

  1. 1. Anonymization of Sensitive Data through Cryptography

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Isac Holm; Johan Dahl; [2023]
    Keywords : Cryptography; Encryption; Decryption; AES; Camellia; Anonymization; Sensitive Data;

    Abstract : In today's interconnected digital landscape, the protection of sensitive information is of great importance. As a result, the field of cryptography plays a vital role in ensuring individuals' anonymity and data integrity. READ MORE

  2. 2. Client controlled, secure endpointto-endpoint storage in the cloud

    University essay from KTH/Hälsoinformatik och logistik

    Author : Maximilian Michelson; [2020]
    Keywords : ;

    Abstract : Abstract Softronic's customers do not want them to store sensitive data in a cloud environment as theydistrust the cloud providers with keeping sensitive data secret and are afraid of violating GDPR.Softronic wants to prove that data can be kept protected using encryption, even though it is storedin a cloud, and the goal of this thesis is to find a cryptographic solution with good security and performance. READ MORE

  3. 3. Building Datagram Transport Layer Security (DTLS)-based access control in the Internet-of-Things

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chenxi Feng; [2020]
    Keywords : ;

    Abstract : With the widespread use of the Internet of Things (IoT), the security problem has raised social attention. Due to the limited calculation ability of the constrained device, it is difficult to download the defense software inside and the device just can use the built-in encryption mechanisms to defend attack. READ MORE

  4. 4. A Web-Based Application for the Secure Transfer of NGS data

    University essay from Uppsala universitet/Experimentell och klinisk onkologi

    Author : Ina Odén Österbo; [2019]
    Keywords : NGS; next generation sequencing; security; transfer; cryptography; AES; RSA;

    Abstract : During the last decade, the use of Next-Generation Sequencing(NGS) technologies has sky-rocketed. The vast amount of data produced by these platforms require processing and analysis. This is usually performed at locations remote from the sequencing facilities thereby introducing the need for data-transportation to the place of analysis. READ MORE

  5. 5. Deniable Messaging Under Strong Surveillance

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fredrik Johansson; [2018]
    Keywords : Deniable Encryption; Security;

    Abstract : In today’s society, people are more aware of the need for encryption to keep their private information safe. Therefore chat apps like WhatsApp and Signal are popular since they allow people to talk encrypted over instant messaging. However, normal encryption might not always be enough to keep the data safe. READ MORE