Essays about: "block cipher"
Showing result 1 - 5 of 8 essays containing the words block cipher.
-
1. Characterization of cipher suite selection, downgrading, and other weaknesses observed in the wild
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : The importance of security on the web is growing every day. How domains handle and prioritize their level of security is varying. Tradeoffs between security and convenience have to be made to uphold a website's public image. This thesis uses a subset of domains from the Alexa Top 1M list. READ MORE
-
2. Implementation and Benchmarking of a Crypto Processor for a NB-IoT SoC Platform
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The goal of this Master’s Thesis is to investigate the implementation of cryptographic algorithms for IoT and how these encryption systems can be integrated in a NarrowBand IoT platform. Following 3rd Generation Partnership Project (3GPP) specifications, the Evolved Packet System (EPS) Encryption Algorithms (EEA) and EPS Integrity Algorithms (EIA) have been implemented and tested. READ MORE
-
3. Modified and Efficient Image Encryption Algorithm Based on Chaos Theory, DNA Complementary Rules and SHA-256
University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystemAbstract : The emerging topic, symmetric encryption technique for digital imagesusing chaotic function and DNA bases has recently drawn a lot ofattentions from the research community. The use of voice and visualmaterial as an addition to textual data has become more widespread. READ MORE
-
4. Constructions for efficient MDS diffusion layers
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : Matrices are widely used in Block Cipher Diffusion layers, usually chosen for offering maximal branch numbers, and allowing lightweight hardware implementations through their low XOR Count. When implemented in software however, is XOR Count the only metric? This project will utilize the parallelism provided by modern SIMD vector instructions to evaluate metrics, by implementing different algorithmic approaches. READ MORE
-
5. A practical comparison between algebraic and statistical attacks on the lightweight cipher SIMON
University essay from Uppsala universitet/Avdelningen för datalogiAbstract : In the summer of 2013 NSA released a new family of lightweight block ciphers called SIMON. However they did not publish any assessment of the security of SIMON. Since then only a few papers on this topic have been released and none of them have included an algebraic analysis. READ MORE