Essays about: "RSA"

Showing result 26 - 30 of 58 essays containing the word RSA.

  1. 26. Modified and Efficient Image Encryption Algorithm Based on Chaos Theory, DNA Complementary Rules and SHA-256

    University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystem

    Author : Rizwan Haider; [2017]
    Keywords : block encryption; image cryptography; DNA; chaos; SHA-256;

    Abstract : The emerging topic, symmetric encryption technique for digital imagesusing chaotic function and DNA bases has recently drawn a lot ofattentions from the research community. The use of voice and visualmaterial as an addition to textual data has become more widespread. READ MORE

  2. 27. Performance and Comparison of post-quantum Cryptographic Algorithms

    University essay from Linköpings universitet/Institutionen för systemteknik

    Author : Vladimir Valyukh; [2017]
    Keywords : post; quantum; resistant; cryptography; cryptographic; algorithms; performance; comparison; SIDH; NTRU; Frodo; NewHope; kvantresistenta; krypto; kryptoalgoritmer; prestanda; jämförelse; SIDH; NTRU; Frodo; NewHope;

    Abstract : Secure and reliable communication have always been critical part of todays infrastructure. Various asymmetric encryption schemes, such as RSA, have been used to achieve this goal. READ MORE

  3. 28. RSA authentication in Internet of Things : Technical limitations and industry expectations

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Fredrik Jonsson; Martin Tornkvist; [2017]
    Keywords : Internet of Things; RSA; Authentication;

    Abstract : The objective of this thesis is to evaluate if it is possible to run RSA authentication in a specified scenario. A Raspberry Pi with a limited CPU is used to simulate a low-performance device. A series of tests on this device shows that it is not possible to run RSA authentication in the provided scenario. READ MORE

  4. 29. The Implementation of the Frequency-Time Encoded Decoy-State Protocol with the Slow-Light Effect for Quantum Memories

    University essay from Lunds universitet/Fysiska institutionen; Lunds universitet/Atomfysik

    Author : Koray Dinçer; [2017]
    Keywords : QKD; Decoy-State; Frequency-Time; Slow-light; Quantum Repeater; Quantum Memory; Physics and Astronomy;

    Abstract : Quantum key distribution (QKD) is a secure encryption key generation process to be used by two users in the presence of an eavesdropper. The no-cloning theorem allows the sender "Alice" to securely send qubits with single photons to the receiver "Bob". READ MORE

  5. 30. Anonymous networks: A theoretical and practical approach

    University essay from Linköpings universitet/Institutionen för datavetenskap; Linköpings universitet/Tekniska fakulteten

    Author : Karl Fredrik Gudjonsson; Alexander Ulander; [2016]
    Keywords : ;

    Abstract : This thesis presents an overview of different solutions for anonymous networks. Theory behind connection- and data-anonymity is described, how to implement them and the theory behind commonly used cryptography. READ MORE