Essays about: "aes implementation"

Showing result 6 - 10 of 33 essays containing the words aes implementation.

  1. 6. Encrypted Documents Retrieval From The Cloud With Searchable Encryption : A Searchable Encryption Scheme Implementation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Salim Rabat; [2021]
    Keywords : searchable encryption; cloud storage; security; privacy-enhancing; sökbar kryptering; molnlagring; säkerhet; integritetsförbättring;

    Abstract : Encrypting data is a solution to enhance the privacy and confidentiality of the data owners when outsourcing storage to cloud storage providers. However, using conventional encryption algorithms would render search queries based on the content of the data useless. READ MORE

  2. 7. Development of Generic Communication Middleware for Embedded Sensor Systems Transmitting Health Parameters

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Subaharan Kailayanathan; Saji Kamdod; [2020]
    Keywords : Health technology; e-Health; Embedded Sensor Systems; Middleware; IPSec; MQTT; Cyber Security; Bluetooth 5.0;

    Abstract : Health technology or e-Health is one of the most rapidly growing areas in healthcare today and it has been an important requirement as a new concept of healthcare industry. Since global society has been changed to aging society and the healthcare cost has been increasing in the 21st century since 2007. READ MORE

  3. 8. Far Field Electromagnetic Side Channel Analysis of AES

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zihao Zhao; [2020]
    Keywords : Side-channel analysis; far-feild electromagnetic emission; AES;

    Abstract : Side-Channel Attacks (SCAs) have become a realistic threat to implementations of cryptographic algorithms. By utilizing the unintentionally leaked side-channel information during the execution of a cryptographic algorithm, it is possible to bypass the theoretical strength of the algorithm and extract its secret key. READ MORE

  4. 9. Deep Learning Based Side-Channel Analysis of AES Based on Far Field Electromagnetic Radiation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ruize Wang; [2020]
    Keywords : Side-Channel Attacks; EM; Far-Field; Deep Learning;

    Abstract : Advanced Encryption Standard (AES) is a widely accepted encryption algorithm used in Internet-of-Things (IoT) devices such as Bluetooth devices. Although the implementation of AES is complicated enough, attackers can still acquire the cryptographic information generated from the AES execution to perform Side-Channel Attack (SCA). READ MORE

  5. 10. Data Link Layer Security for Spacecraft Communication Implementation on FPGA

    University essay from Linköpings universitet/Informationskodning

    Author : Sarah Sundberg; [2020]
    Keywords : AES-GCM; FPGA; VHDL; Spacecraft; Communication; Timing attacks; Security;

    Abstract : With increasing awareness of potential security threats there is a growing interest in communication security for spacecraft control and data. Traditionally commercial and scientific missions have relied on their uniqueness to prevent security breaches. READ MORE