Essays about: "Diffie-Hellman"

Showing result 1 - 5 of 7 essays containing the word Diffie-Hellman.

  1. 1. Using Requirement-Driven Symbolic Execution to Test Implementations of the CoAP and EDHOC Network Protocols

    University essay from Uppsala universitet/Datalogi

    Author : Sabor Amini; [2023]
    Keywords : Requirement-driven; Symbolic execution; Network protocols; CoAP; EDHOC; Kravbaserad; Symbolisk Exekvering; Nätverksprotokoll;

    Abstract : As the number of Internet of Things devices is increasing rapidly, it is of utmost significance that the implementations of protocols for constrained devices are bug-free. In general implementations of network protocols are error-prone due to their complex nature and ambiguities in the protocol specification. READ MORE

  2. 2. TLS Decryption in passive monitoring system with server private key

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Emil Käck; [2021]
    Keywords : TLS; Decryption; Passive monitoring; Server private key;

    Abstract : Many network operators need to be able to ensure that customers get the level of service they pay for. To avoid bandwidth and server performance bottlenecks, and easily troubleshoot network problems, the network providers need to be able to see what payload data is sent. READ MORE

  3. 3. On Asynchronous Group Key Agreement : Tripartite Asynchronous Ratchet Trees

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Phillip Gajland; [2020]
    Keywords : MLS; secure messaging; cryptography; MLS; säker meddelandehantering; kryptografi;

    Abstract : The subject of secure messaging has gained notable attention lately in the cryptographic community. For communications between two parties, paradigms such as the double ratchet, used in the Signal protocol, provide provably strong security guarantees such as forward secrecy and post-compromise security. READ MORE

  4. 4. On the Use of Elliptic Curves in Public-Key Cryptography

    University essay from Lunds universitet/Matematik LTH; Lunds universitet/Matematik (naturvetenskapliga fakulteten)

    Author : Christoph Strobl; [2020]
    Keywords : Elliptic Curves; Public-Key Cryptography; Index Calculus; Pohlig-Hellman; Diffie-Hellman Problem; Asymmetric Cryptography; Mathematics and Statistics;

    Abstract : Uppsatsen behandlar asymmetrisk kryptering över ändliga kropper och elliptiska kurver. Elliptiska kurver införs med hjälp av affint och projektivt rum. Uppsaten också ger en introduction till algoritmer som kan knäcka diskret logaritm problemet över kropper och elliptiska kurver.. READ MORE

  5. 5. A Performance Evaluation of Post-Quantum Cryptography in the Signal Protocol

    University essay from Linköpings universitet/Informationskodning

    Author : Markus Alvila; [2019]
    Keywords : post-quantum; resistant; cryptography; commutative; supersingular; isogeny; Diffie-Hellman; CSIDH; Signal; protocol; X3DH; Double Ratchet; Curve25519; performance; evaluation; CPU; profiling; Android;

    Abstract : The Signal protocol can be considered state-of-the-art when it comes to secure messaging, but advances in quantum computing stress the importance of finding post-quantum resistant alternatives to its asymmetric cryptographic primitives. The aim is to determine whether existing post-quantum cryptography can be used as a drop-in replacement for the public-key cryptography currently used in the Signal protocol and what the performance trade-offs may be. READ MORE