Essays about: "hemlig kommunikation"

Showing result 1 - 5 of 6 essays containing the words hemlig kommunikation.

  1. 1. Time-based Key for Coverless Audio Steganography: A Proposed Behavioral Method to Increase Capacity

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : John Alanko Öberg; Carl Svensson; [2023]
    Keywords : Coverless audio steganography; information hiding; covert communication; effective capacity; behavioral; Täcklös ljudsteganografi; informationsdöljning; hemlig kommunikation; effektiv kapacitet; beteendemässig;

    Abstract : Background. Coverless steganography is a relatively unexplored area of steganography where the message is not embedded into a cover media. Instead the message is derived from one or several properties already existing in the carrier media. This renders steganalysis methods used for traditional steganography useless. READ MORE

  2. 2. Proof of the security of the modified sphinx mixnet header format in the SPORES protocol : A verifiably secure onion routing protocol with indistinguishable replies

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Benjamin Thellström; [2023]
    Keywords : ;

    Abstract : The internet inherently makes secret communication difficult, the entire basis of the IP-protocol is that the routers handling the packets need to know who is receiving the packet. However, there are many reasons why someone would want to communicate in secret. One possible solution is that of onion-routing. READ MORE

  3. 3. Board and Chip Diversity in Deep Learning Side-Channel Attacks : On ATtiny85 Implementations Featuring Encryption and Communication

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Filip Björklund; Niklas Landin; [2021]
    Keywords : side-channel attack; deep learning; poweranalysis; ATtiny85; diversity; sidokanalsattack; djupinlärning; effektanalys; ATtiny85; mångfald;

    Abstract : Hardware security is an increasingly relevant topic because more and more systems and products are equipped with embedded microcontrollers. One type of threat against hardware security is attacks against encryption implementations in embedded hardware. READ MORE

  4. 4. Discreet Discrete Mathematics : Secret Communication Using Latin Squares and Quasigroups

    University essay from Umeå universitet/Institutionen för matematik och matematisk statistik

    Author : Christoffer Olsson; [2017]
    Keywords : Cryptology; Cryptography; Latin squares; Row-latin squares; Quasigroups; Secret sharing schemes; Kryptologi; Kryptografi; Latinska kvadrater; Rad-latinska kvadrater; Kvasigrupper; Hemlighetsdelning;

    Abstract : This thesis describes methods of secret communication based on latin squares and their close relative, quasigroups. Different types of cryptosystems are described, including ciphers, public-key cryptosystems, and cryptographic hash functions. There is also a chapter devoted to different secret sharing schemes based on latin squares. READ MORE

  5. 5. Design av persistensramverkför säker DB-access

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Pelle Säfström; [2013]
    Keywords : ;

    Abstract : Försvarsmakten har en säkerhetsplattform benämnd ”Secure Desktop” som tillhandahåller funktioner för autentisering, behörighetskontroll samt säkerhetsloggning för administrativa system. ”Secure Desktop” är dimensionerad för de krav som ställs på system som hanterar information med en sekretessklassning upp till och med Hemlig/Top Secret. READ MORE