Essays about: "Tamper-evident"

Found 2 essays containing the word Tamper-evident.

  1. 1. Keeping an Indefinitely Growing Audit Log

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Måns Andersson; [2022]
    Keywords : Cryptography; Audit Log; Tamper-evident; Merkle tree; Kryptografi; Granskningslogg; Manipuleringsupptäckbarhet; Merkle träd;

    Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE

  2. 2. Aggregating Certificate Transparency Gossip Using Programmable Packet Processors

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Rasmus Dahlberg; [2018]
    Keywords : Certificate Transparency; CT; Gossip; P4;

    Abstract : Certificate Transparency (CT) logs are append-only tamper-evident data structures that can be verified by anyone. For example, it is possible to challenge a log to prove certificate inclusion (membership) and log consistency (append-only, no tampering) based on partial information. READ MORE