Essays about: "Secret Key."

Showing result 16 - 20 of 55 essays containing the words Secret Key..

  1. 16. Design and Implementation of Key Exchange Mechanisms for Software Artifacts using Ocean Protocol.

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nishkal Gupta Myadam; Bhavith Patnam; [2020]
    Keywords : Bonseyes AI Marketplace; Ocean Protocol; Public Key Infrastructure; Distributed Public Key Infrastructure; Secret Store functionality;

    Abstract : During the modern times, innovators and researchers developed a key technology known as Artificial Intelligence (AI) Marketplace which leverages the power of AI to efficiently utilize the data generated by millions of devices to create new and better services and software products. H2020 Bonseyes is one such project that provides us a collaborative cloud based model of the AI marketplace for the users who generally don’t have access to large data sets, algorithms etc by allowing them to collaborate which each other and exchange the software artifacts. READ MORE

  2. 17. Far Field Electromagnetic Side Channel Analysis of AES

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zihao Zhao; [2020]
    Keywords : Side-channel analysis; far-feild electromagnetic emission; AES;

    Abstract : Side-Channel Attacks (SCAs) have become a realistic threat to implementations of cryptographic algorithms. By utilizing the unintentionally leaked side-channel information during the execution of a cryptographic algorithm, it is possible to bypass the theoretical strength of the algorithm and extract its secret key. READ MORE

  3. 18. On Asynchronous Group Key Agreement : Tripartite Asynchronous Ratchet Trees

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Phillip Gajland; [2020]
    Keywords : MLS; secure messaging; cryptography; MLS; säker meddelandehantering; kryptografi;

    Abstract : The subject of secure messaging has gained notable attention lately in the cryptographic community. For communications between two parties, paradigms such as the double ratchet, used in the Signal protocol, provide provably strong security guarantees such as forward secrecy and post-compromise security. READ MORE

  4. 19. Randomly perturbing the bytecode of white box cryptography implementations in an attempt to mitigate side-channel attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexander Koski; [2020]
    Keywords : ;

    Abstract : This study takes one step further towards constructing a tool able to automatically amplify the security on your cryptographic implementations. In white box cryptography the encryption key is hidden inside the encryption algorithm out of plain sight. READ MORE

  5. 20. An FPGA Implementation of Arbiter PUF with 4x4 Switch Blocks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Can Aknesil; [2020]
    Keywords : ;

    Abstract : Theft of services, private information, and intellectual property have become significant dangers to the general public and industry. Cryptographic algorithms are used for protection against these dangers. All cryptographic algorithms rely on secret keys that should be generated by an unpredictable process and securely stored. READ MORE