Essays about: "Cryptographic protocols"

Showing result 11 - 15 of 20 essays containing the words Cryptographic protocols.

  1. 11. Mapping the current state of SSL/TLS

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Per Lindström; Oscar Pap; [2017]
    Keywords : ;

    Abstract : The focus of this thesis is to analyze cryptographic protocol and algorithm usage based on three different data sets where the largest set contains one million websites. Ciphers, algorithms and different versions of cryptographic protocols are described and discussed. READ MORE

  2. 12. Access Control With High Security Credentials

    University essay from Lunds universitet/Institutionen för reglerteknik

    Author : Michael Kapusta; Nicklas Lindstrom; [2016]
    Keywords : Technology and Engineering;

    Abstract : Developing security regardless of its format is a constant cat and mouse game were adversaries are either in the midst of trying to crack your solution, or they may have already cracked it. A cryptographic algorithm may be unfeasible to crack from a mathematical perspective but as long as a human being is the one developing the solution, a human error is always possible. READ MORE

  3. 13. Privacy Ensuring SRTP for Cloud Conferencing

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Maria Haider; [2016]
    Keywords : Network Security; Semi trusted cloud conference Server; SRTP; RTP; DTLS-SRTP;

    Abstract : Multimedia conferences held using services provided by clouds owned by third party companies are becoming increasingly popular. While using such services, end users will want to keep their audio/video data private when they pass through the servers situated in the cloud. READ MORE

  4. 14. Implementation of bit-vector variables in a CP solver, with an application to the generation of cryptographic S-boxes

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Kellen Dye; [2014]
    Keywords : ;

    Abstract : We present a bit-vector variable implementation for the constraint programming (CP) solver Gecode and its application to the problem of finding high-quality cryptographic substitution boxes (S-boxes). S-boxes are a component in some cryptographic protocols, for example DES, which are critical to the strength of the entire system. READ MORE

  5. 15. Secure Multicast with Source Authentication for the Internet of Things

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Nikita Martynov; [2014]
    Keywords : ;

    Abstract : Sakernas Internet är ett snabbt växande område av avancerad teknik och forskning. Dess säkerhet är avgörande för tillförlitligheten och tryggheten av framtida dagliga kommunikationer. DTLS protokollet är ett standardprotokoll för att garantera säkerheten för unicast kommunikation. READ MORE