Essays about: "Symmetric cryptography"

Showing result 6 - 10 of 23 essays containing the words Symmetric cryptography.

  1. 6. Client controlled, secure endpointto-endpoint storage in the cloud

    University essay from KTH/Hälsoinformatik och logistik

    Author : Maximilian Michelson; [2020]
    Keywords : ;

    Abstract : Abstract Softronic's customers do not want them to store sensitive data in a cloud environment as theydistrust the cloud providers with keeping sensitive data secret and are afraid of violating GDPR.Softronic wants to prove that data can be kept protected using encryption, even though it is storedin a cloud, and the goal of this thesis is to find a cryptographic solution with good security and performance. READ MORE

  2. 7. Puncturable Symmetric KEMs for Forward-Secret 0-RTT Key Exchange

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Matilda Backendal; [2019]
    Keywords : cryptography; cryptographic protocols; session resumption; forward secrecy; 0-RTT; TLS 1.3; puncturable PRFs; key encapsulation mechanisms; Technology and Engineering;

    Abstract : The latest version of the Transport Layer Security protocol (TLS 1.3) introduces a pre-shared key zero round-trip time (0-RTT) mode. This enables session resumption with no latency before the first application data can be sent, at the cost of losing forward secrecy and replay protection. READ MORE

  3. 8. A Web-Based Application for the Secure Transfer of NGS data

    University essay from Uppsala universitet/Experimentell och klinisk onkologi

    Author : Ina Odén Österbo; [2019]
    Keywords : NGS; next generation sequencing; security; transfer; cryptography; AES; RSA;

    Abstract : During the last decade, the use of Next-Generation Sequencing(NGS) technologies has sky-rocketed. The vast amount of data produced by these platforms require processing and analysis. This is usually performed at locations remote from the sequencing facilities thereby introducing the need for data-transportation to the place of analysis. READ MORE

  4. 9. Enhancing the security of an audit log

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Kristoffer Smedlund; [2018]
    Keywords : ;

    Abstract : In todays society data breaches have become an all too common issue. Insecure databases allows intruders to access sensitive data. This thesis examines how to enhance the security of a relational database. The database is used as an audit log in a system platform at LeanOn AB. READ MORE

  5. 10. Modified and Efficient Image Encryption Algorithm Based on Chaos Theory, DNA Complementary Rules and SHA-256

    University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystem

    Author : Rizwan Haider; [2017]
    Keywords : block encryption; image cryptography; DNA; chaos; SHA-256;

    Abstract : The emerging topic, symmetric encryption technique for digital imagesusing chaotic function and DNA bases has recently drawn a lot ofattentions from the research community. The use of voice and visualmaterial as an addition to textual data has become more widespread. READ MORE