Essays about: "RSA"
Showing result 21 - 25 of 55 essays containing the word RSA.
-
21. Open Source Security Token for Linux
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : The project investigates and implements a two-factor authentication system utilizing the RSA cryptography scheme. The system consists of an FPGA security token and a PAM module for Linux. Two similar solutions were made, one air-gapped with a shorter key (version A), whereas the other communicated over USB (version B). READ MORE
-
22. RSA in extensions of the ring of integers
University essay from Linnéuniversitetet/Institutionen för matematik (MA)Abstract : The aim of this work is to create a variant of the RSA classical algorithm, through extensions from the ring of integers Z to two Euclidean domains:the domain of Gaussian integers, Z[i], and the domain generated by p2, Z[p2]. To achieve this purpose, the study of the theory behind both these sets becomes necessary, to ensure that all the properties are preserved when moving into extensions and so that the construction of the algorithm is possible. READ MORE
-
23. Homomorphic Encryption: Working and Analytical Assessment : DGHV, HElib, Paillier, FHEW and HE in cloud security
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : Context: Secrecy has kept researchers spanning over centuries engaged in the creation of data protection techniques. With the growing rate of data breach and intervention of adversaries in confidential data storage and communication, efficient data protection has found to be a challenge. READ MORE
-
24. Modified and Efficient Image Encryption Algorithm Based on Chaos Theory, DNA Complementary Rules and SHA-256
University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystemAbstract : The emerging topic, symmetric encryption technique for digital imagesusing chaotic function and DNA bases has recently drawn a lot ofattentions from the research community. The use of voice and visualmaterial as an addition to textual data has become more widespread. READ MORE
-
25. Performance and Comparison of post-quantum Cryptographic Algorithms
University essay from Linköpings universitet/Institutionen för systemteknikAbstract : Secure and reliable communication have always been critical part of todays infrastructure. Various asymmetric encryption schemes, such as RSA, have been used to achieve this goal. READ MORE