Essays about: "SHA"

Showing result 11 - 15 of 37 essays containing the word SHA.

  1. 11. Migration of Signing Algorithms : An investigation in migration of signing algorithms used in certificate authorities.

    University essay from KTH/Hälsoinformatik och logistik

    Author : Yusuf Hassan; [2019]
    Keywords : signing; algorithm; migration; post-quantum; certificate; x.509; backwards; compatibility; signeringsalgoritm; signeringsalgoritmer; migration; postkvantum; certifikat; x.509; kompatibilitet;

    Abstract : The migration of signing algorithms is a process which can be used to move from signing algorithms which are regarded as less safe to algorithms which are regarded as safer. The safety of cryptographic algorithms has been compromised before, algorithms such as SHA-1 has been proven to be broken. READ MORE

  2. 12. Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Louise Bergman Martinkauppi; Qiuping He; [2019]
    Keywords : cryptography; performance; SM2; SM3; SM4; kryptering; prestanda; SM2; SM3; SM4;

    Abstract : Background. China is regulating the import, export, sale, and use of encryption technology in China. If any foreign company wants to develop or release a product in China, they need to report their use of any encryption technology to the Office of State Commercial Cryptography Administration (OSCCA) to gain approval. READ MORE

  3. 13. A Web-Based Application for the Secure Transfer of NGS data

    University essay from Uppsala universitet/Experimentell och klinisk onkologi

    Author : Ina Odén Österbo; [2019]
    Keywords : NGS; next generation sequencing; security; transfer; cryptography; AES; RSA;

    Abstract : During the last decade, the use of Next-Generation Sequencing(NGS) technologies has sky-rocketed. The vast amount of data produced by these platforms require processing and analysis. This is usually performed at locations remote from the sequencing facilities thereby introducing the need for data-transportation to the place of analysis. READ MORE

  4. 14. Secure Automotive Ethernet : Balancing Security and Safety in Time Sensitive Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Martin Lang; [2019]
    Keywords : Automotive Ethernet; Information Security; Integrity; Time Sensitive Systems; Automotive Ethernet; Informationssäkerhet; Integritet; tidskänsliga system;

    Abstract : Background.As a result of the digital era, vehicles are being digitalised in arapid pace. Autonomous vehicles and powerful infotainment systems are justparts of what is evolving within the vehicles. These systems require more in-formation to be transferred within the vehicle networks. READ MORE

  5. 15. The blockchain based system to guarantee the data integrity of IIoT

    University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologi

    Author : Yifei Shen; [2018]
    Keywords : SHA-256; blockchain; data integrity; IoT; IIoT;

    Abstract : With the advent of big data era, there is countless data produced from various kinds of machines every second. These data are used to help people to do studies, produce goods, improve the efficiency of the industrial development, and so on. READ MORE