Essays about: "Cryptographic protocols"
Showing result 11 - 15 of 20 essays containing the words Cryptographic protocols.
-
11. Mapping the current state of SSL/TLS
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : The focus of this thesis is to analyze cryptographic protocol and algorithm usage based on three different data sets where the largest set contains one million websites. Ciphers, algorithms and different versions of cryptographic protocols are described and discussed. READ MORE
-
12. Access Control With High Security Credentials
University essay from Lunds universitet/Institutionen för reglerteknikAbstract : Developing security regardless of its format is a constant cat and mouse game were adversaries are either in the midst of trying to crack your solution, or they may have already cracked it. A cryptographic algorithm may be unfeasible to crack from a mathematical perspective but as long as a human being is the one developing the solution, a human error is always possible. READ MORE
-
13. Privacy Ensuring SRTP for Cloud Conferencing
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : Multimedia conferences held using services provided by clouds owned by third party companies are becoming increasingly popular. While using such services, end users will want to keep their audio/video data private when they pass through the servers situated in the cloud. READ MORE
-
14. Implementation of bit-vector variables in a CP solver, with an application to the generation of cryptographic S-boxes
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : We present a bit-vector variable implementation for the constraint programming (CP) solver Gecode and its application to the problem of finding high-quality cryptographic substitution boxes (S-boxes). S-boxes are a component in some cryptographic protocols, for example DES, which are critical to the strength of the entire system. READ MORE
-
15. Secure Multicast with Source Authentication for the Internet of Things
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : Sakernas Internet är ett snabbt växande område av avancerad teknik och forskning. Dess säkerhet är avgörande för tillförlitligheten och tryggheten av framtida dagliga kommunikationer. DTLS protokollet är ett standardprotokoll för att garantera säkerheten för unicast kommunikation. READ MORE