Essays about: "Decryption"
Showing result 16 - 20 of 49 essays containing the word Decryption.
-
16. Ethical hacking of Danalock V3 : A cyber security analysis of a consumer IoT device
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IoT-enheter blir alltmer populära. IoT-produkter tillåter användare att fjärrstyraenheten med hjälp av en mobilapplikation eller en webbapplikation. För dettaändamål används en mängd av kommunikationsprotokoll som Bluetooth och Wi-Fi.Denna sammankoppling av enheter och användningen av olika tekniker kan leda tillsäkerhetsproblem. READ MORE
-
17. TLS Decryption in passive monitoring system with server private key
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Many network operators need to be able to ensure that customers get the level of service they pay for. To avoid bandwidth and server performance bottlenecks, and easily troubleshoot network problems, the network providers need to be able to see what payload data is sent. READ MORE
-
18. Power analysis on FPGA implementation of Classic McEliece
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In this work, the hardware implementation of Classic McEliece has been assessed for side-channel leakage through a power analysis. The official, unprotected, decryption procedure of Classic McEliece was implemented on a Xilinx Atix7 \acl{fpga} and incorporated into the \acl{cw} framework. READ MORE
-
19. Uncovering Signal : Simplifying Forensic Investigations of the Signal Application
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The increasing availability of easy-to-use end-to-end encrypted messaging applications has made it possible for more people to conduct their conversations privately. This is something that criminals have taken advantage of and it has proven to make digital forensic investigations more difficult as methods of decrypting the data are needed. READ MORE
-
20. Ransomware
University essay from Högskolan Kristianstad/Fakulteten för naturvetenskapAbstract : This thesis researches different ransomwares, how we can stop them and how their threat vectors work. It is important to notice that when solving one ransomware doesn’t solve the next incoming one. In this thesis we investigate six different ransomwares that spread between 2016-2019. READ MORE