Essays about: "Kryptering"

Showing result 21 - 25 of 61 essays containing the word Kryptering.

  1. 21. Far Field EM Side-Channel Attack Based on Deep Learning with Automated Hyperparameter Tuning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Keyi Liu; [2021]
    Keywords : Side-Channel Attack; Deep Learning; Far Field EM emission; Auto Hyperparameter Tuning; Auto-Keras; AES; Sidokanalattack; Machine Learning; Multilayer Perceptron; Hyperparameter Tuning; Bayesian Optimization; Auto-Keras; AES;

    Abstract : Side-channel attacks have become a realistic threat to the implementations of cryptographic algorithms. By analyzing the unintentional, side-channel leakage, the attacker is able to recover the secret of the target. Recently, a new type of side-channel leakage has been discovered, called far field EM emissions. READ MORE

  2. 22. Board and Chip Diversity in Deep Learning Side-Channel Attacks : On ATtiny85 Implementations Featuring Encryption and Communication

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Filip Björklund; Niklas Landin; [2021]
    Keywords : side-channel attack; deep learning; poweranalysis; ATtiny85; diversity; sidokanalsattack; djupinlärning; effektanalys; ATtiny85; mångfald;

    Abstract : Hardware security is an increasingly relevant topic because more and more systems and products are equipped with embedded microcontrollers. One type of threat against hardware security is attacks against encryption implementations in embedded hardware. READ MORE

  3. 23. A comparative study on Tor’s client compromise rates when changing the number of guard nodes and their rotation time

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Rami Marrikie; Waled Rached; [2021]
    Keywords : ;

    Abstract : The Tor Project is a non-profit organization with the belief that Internet users should have private access to an uncensored Web. Tor accomplishes this through onion routing, which uses multi-layered encryption. Tor’s design is not flawless and different attacks are being performed to deanonymize users. READ MORE

  4. 24. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Alex Gustafsson; Carl Stensson; [2021]
    Keywords : Public-Key Cryptography; Benchmark; x86; IBM Z; z15; Asymmetrisk Kryptering; Prestandatest; x86; IBM Z; z15;

    Abstract : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. READ MORE

  5. 25. Security analysis of a smartlock

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Pontus Persman; Sebaztian Öjebrant; [2021]
    Keywords : ;

    Abstract : The Internet of Things (IoT) market has expanded and the variety as well as quantity of IoT devices has been rapidly increasing. Which also bring new security threats as new vulnerabilities are found within IoT devices. READ MORE