Essays about: "Cryptographic protocols"

Showing result 6 - 10 of 20 essays containing the words Cryptographic protocols.

  1. 6. Evaluation of Network-Layer Security Technologies for Cloud Platforms

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bruno Marcel Duarte Coscia; [2020]
    Keywords : Overlay network; Network security; IPsec; Slack nebula; Nebula; Noise framework; Noise protocol; Överlagring Nätverk; Nätverkssäkerhet; IPsec; Slack nebula; Nebula; Noise ramverk; Noise protokoll;

    Abstract : With the emergence of cloud-native applications, the need to secure networks and services creates new requirements concerning automation, manageability, and scalability across data centers. Several solutions have been developed to overcome the limitations of the conventional and well established IPsec suite as a secure tunneling solution. READ MORE

  2. 7. Far Field Electromagnetic Side Channel Analysis of AES

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zihao Zhao; [2020]
    Keywords : Side-channel analysis; far-feild electromagnetic emission; AES;

    Abstract : Side-Channel Attacks (SCAs) have become a realistic threat to implementations of cryptographic algorithms. By utilizing the unintentionally leaked side-channel information during the execution of a cryptographic algorithm, it is possible to bypass the theoretical strength of the algorithm and extract its secret key. READ MORE

  3. 8. Puncturable Symmetric KEMs for Forward-Secret 0-RTT Key Exchange

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Matilda Backendal; [2019]
    Keywords : cryptography; cryptographic protocols; session resumption; forward secrecy; 0-RTT; TLS 1.3; puncturable PRFs; key encapsulation mechanisms; Technology and Engineering;

    Abstract : The latest version of the Transport Layer Security protocol (TLS 1.3) introduces a pre-shared key zero round-trip time (0-RTT) mode. This enables session resumption with no latency before the first application data can be sent, at the cost of losing forward secrecy and replay protection. READ MORE

  4. 9. Out-of-band transfer with Android to configure pre-shared secrets into sensor nodes

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Johannes Nilsson; Jameel Habbosh; [2018]
    Keywords : performance-constrained sensor nodes; out-of-band communications; pre key-exchange problem; smartphone-based transmitter; Technology and Engineering;

    Abstract : Applications based on Wireless Sensor Networks are making their way into all kinds of industries. Today, they can do anything from off-loading hospitals by monitoring patients in their homes to regulating production lines in factories. More often than not, they perform some kind of surveillance and tracking. READ MORE

  5. 10. Security of dynamic authorisation for IoT through Blockchain technology

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexander Sandor; [2018]
    Keywords : Blockchain; IoT; Public Key Encryption; Public Key Infrastructure;

    Abstract : The use of Internet of Things devices is an integral part of our modern society. Communication with internet of things devices is secured with asymmetric key encryption that is handled by the centralized certificate authority infrastructure. READ MORE