Essays about: "Secure hash algorithm"

Found 4 essays containing the words Secure hash algorithm.

  1. 1. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qiao Jin; [2022]
    Keywords : Embedded systems; ESP 32; Cryptographic algorithms; Cryptographic hardware acceleration; AES; RSA; SHA-2; HTTPS; Inbyggda system; ESP 32; Kryptografiska algoritmer; Kryptografisk hårdvaruacceleration; AES; RSA; SHA-2; HTTPS;

    Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE

  2. 2. Secure Automotive Ethernet : Balancing Security and Safety in Time Sensitive Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Martin Lang; [2019]
    Keywords : Automotive Ethernet; Information Security; Integrity; Time Sensitive Systems; Automotive Ethernet; Informationssäkerhet; Integritet; tidskänsliga system;

    Abstract : Background.As a result of the digital era, vehicles are being digitalised in arapid pace. Autonomous vehicles and powerful infotainment systems are justparts of what is evolving within the vehicles. These systems require more in-formation to be transferred within the vehicle networks. READ MORE

  3. 3. Evaluation and Implementation for Pushing Automatic Updates to IoT Devices

    University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologi

    Author : Menglei Min; [2017]
    Keywords : Automatic update; Internet of things; Digital signature; Secure sockets layer communication; Secure hash algorithm;

    Abstract : In recent years, Internet of Things has developed rapidly, and now has penetrated into human life and industrial production. It is speculated that the internet of things will become ubiquitous in the future, which will bring a series of problems. READ MORE

  4. 4. Security Enhanced Firmware Update Procedures in Embedded Systems

    University essay from Institutionen för datavetenskap

    Author : David Abrahamsson; [2008]
    Keywords : Secure firmware update; threat analysis; embedded security; embedded systems; Säker uppdatering; hotanalys; säkerhet; inbyggda system; firmware; mjukvara;

    Abstract : Many embedded systems are complex, and it is often required that the firmware in these systems are updatable by the end-user. For economical and confidentiality reasons, it is important that these systems only accept firmware approved by the firmware producer. READ MORE