Essays about: "Symmetric cryptography"

Showing result 16 - 20 of 23 essays containing the words Symmetric cryptography.

  1. 16. On the Properties of S-boxes : A Study of Differentially 6-Uniform Monomials over Finite Fields of Characteristic 2

    University essay from KTH/Matematik (Avd.)

    Author : Léo Paul Perrin; [2013]
    Keywords : Symmetric cryptography; Differential uniformity; Differential spectrum; Kloosterman sum; Power function; Roots of trinomial; x⟶x^ 2t-1 ; Dickson polynomial; Differential Cryptanalysis;

    Abstract : S-boxes are key components of many symmetric cryptographic primitives. Among them, some block ciphers and hash functions are vulnerable to attacks based on differential cryptanalysis, a technique introduced by Biham and Shamir in the early 90’s. READ MORE

  2. 17. Symmetric Key Management for Mobile Financial Applications : A Key Hierarchy Approach

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Junaid Azam; [2013]
    Keywords : Symmetric Key Management; Key Hierarchy; Key Security; Financial Transaction; Mobile Phone; Mobile Application Security; mCommerce.;

    Abstract : In recent times the usage of smart phones has significantly increased. Businesses are transforming to make more out of smart phones. As a consequence, there is an increasing demand to have more and more mobile applications. Among other areas, mobile applications are also being used to make financial transactions. READ MORE

  3. 18. Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques

    University essay from Högskolan Dalarna/Datateknik

    Author : Bhupathi Rajan Guruswamy Aarumugam; [2011]
    Keywords : Image watermarking; LSB; Vigenere Square; AI Techniques; Computer Vision; Steganography and Cryptography;

    Abstract : The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. READ MORE

  4. 19. Design and implementation of Wireless Packet Level Authentication

    University essay from

    Author : Abdullah Al Hasib; [2009]
    Keywords : ;

    Abstract : Secure user authentication, authorization and access control have become the major challenges in any wireless security system, often due to certain wireless network characteristics such as lack of infrastructure, low power availability and mobility. Taking advantage of such network characteristics, an attacker can launch several security attacks like Denial of Service (DoS) attacks, packet spoofing and session hijacking attacks. READ MORE

  5. 20. Encryption in Delocalized Access Systems

    University essay from Institutionen för teknik och naturvetenskap

    Author : Henrik Ahlström; Karl-Johan Skoglund; [2008]
    Keywords : Access systems; Cryptography; Public Key; Embedded system; Large integer arithmetic.;

    Abstract : The recent increase in performance of embedded processors has enabled the use of computationally heavy asymmetric cryptography in small and power efficient embedded systems. The goal of this thesis is to analyze whether it is possible to use this type of cryptography to enhance the security in access systems. READ MORE