Essays about: "3des"

Found 4 essays containing the word 3des.

  1. 1. Security in Cloud Storage : A Suitable Security Algorithm for Data Protection

    University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologi

    Author : Adeshola Oyesanya Oduyiga; [2018]
    Keywords : Security-in-cloud-storage; DES; 3DES; Blowfish; RC5; AES; Attacks-on-cloud-facilities; Data-Encryption-Standard; Data-protection.;

    Abstract : The purpose of this thesis work was to conduct a general research on existing security techniques and come up with a considerable algorithm for data security in cloud storage. Cloud storage is an infrastructure or is a model of computer data storage in which the digital data is stored in logical pools. READ MORE

  2. 2. A Comparison of EncryptionAlgorithms for Protecting data passed Through a URL

    University essay from Linnéuniversitetet/Institutionen för datavetenskap (DV)

    Author : Mohamed Osman; Adam Johansson; [2017]
    Keywords : Encryption; ASP.NET CORE; Security; web application; Query String; AES; DES;

    Abstract : This project starts off with giving an overview of what sensitive data is, encryption algorithms and other required knowledge for this thesis project.This is because of the aim of this thesis project, that is to find the best way to encrypt data passed through a URL with a focus on protecting sensitive data in web applications. READ MORE

  3. 3. Encryption in Delocalized Access Systems

    University essay from Institutionen för teknik och naturvetenskap

    Author : Henrik Ahlström; Karl-Johan Skoglund; [2008]
    Keywords : Access systems; Cryptography; Public Key; Embedded system; Large integer arithmetic.;

    Abstract : The recent increase in performance of embedded processors has enabled the use of computationally heavy asymmetric cryptography in small and power efficient embedded systems. The goal of this thesis is to analyze whether it is possible to use this type of cryptography to enhance the security in access systems. READ MORE

  4. 4. Implementing the Transport Layer Security Protocol for Embedded Systems

    University essay from Institutionen för systemteknik

    Author : Bengt Werstén; [2007]
    Keywords : TLS; SSL; embedded systems; cryptography; hardware support; export laws;

    Abstract : Web servers are increasingly being used in embedded devices as a communication medium. As more systems connect to the Internet, the need for security is increasing. The Transport Layer Protocol (TLS) is the successor of Secure Socket Layer (SSL) and provides security in almost all secure Internet transactions. READ MORE