Essays about: "Kryptografiska protokoll"
Found 5 essays containing the words Kryptografiska protokoll.
-
1. Cost and efficiency comparison of Quantum Key Distribution schemes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The development of quantum computing exposes critical vulnerabilities in classical encryption systems. However, quantum computing also enables new methods of secure communication. Quantum key distribution (QKD) is one class of such methods. READ MORE
-
2. MACsec in Classic AUTOSAR : MACsec Implementation PoC on Classic AUTOSAR ECUs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Classic AUTOSAR provides a standardized architecture and guidelines for automotive development. However, it does not include specifications for securing Ethernet communication. The IEEE 802.1AE standard specifies a security standard called Media Access Control Security (MACsec) to protect Ethernet communication. READ MORE
-
3. Bootstrapping Secure Sensor Networks in the Internet of Things
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Internet of Things has become an integral part of modern society and continues to grow and evolve. The devices are expected to operate in various conditions and environments while securely transmitting sensor data and keeping low manufacturing costs. Security for the Internet of Things is still in its infancy and a serious concern. READ MORE
-
4. Evaluation of Network-Layer Security Technologies for Cloud Platforms
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the emergence of cloud-native applications, the need to secure networks and services creates new requirements concerning automation, manageability, and scalability across data centers. Several solutions have been developed to overcome the limitations of the conventional and well established IPsec suite as a secure tunneling solution. READ MORE
-
5. On Asynchronous Group Key Agreement : Tripartite Asynchronous Ratchet Trees
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The subject of secure messaging has gained notable attention lately in the cryptographic community. For communications between two parties, paradigms such as the double ratchet, used in the Signal protocol, provide provably strong security guarantees such as forward secrecy and post-compromise security. READ MORE