Essays about: "cipher"

Showing result 1 - 5 of 19 essays containing the word cipher.

  1. 1. Implementation and Benchmarking of a Crypto Processor for a NB-IoT SoC Platform

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Sébastien Fuhrmann; Luis Cavo; [2018]
    Keywords : 3GPP; IoT; HLS; security; cryptography; AES; SNOW; ZUC; hardware; ASIC; confidentiality; integrity; cipher; Technology and Engineering;

    Abstract : The goal of this Master’s Thesis is to investigate the implementation of cryptographic algorithms for IoT and how these encryption systems can be integrated in a NarrowBand IoT platform. Following 3rd Generation Partnership Project (3GPP) specifications, the Evolved Packet System (EPS) Encryption Algorithms (EEA) and EPS Integrity Algorithms (EIA) have been implemented and tested. READ MORE

  2. 2. Modified and Efficient Image Encryption Algorithm Based on Chaos Theory, DNA Complementary Rules and SHA-256

    University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystem

    Author : Rizwan Haider; [2017]
    Keywords : block encryption; image cryptography; DNA; chaos; SHA-256;

    Abstract : The emerging topic, symmetric encryption technique for digital imagesusing chaotic function and DNA bases has recently drawn a lot ofattentions from the research community. The use of voice and visualmaterial as an addition to textual data has become more widespread. READ MORE

  3. 3. Constructions for efficient MDS diffusion layers

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Nikolaos Tatsis; [2017]
    Keywords : ;

    Abstract : Matrices are widely used in Block Cipher Diffusion layers, usually chosen for offering maximal branch numbers, and allowing lightweight hardware implementations through their low XOR Count. When implemented in software however, is XOR Count the only metric? This project will utilize the parallelism provided by modern SIMD vector instructions to evaluate metrics, by implementing different algorithmic approaches. READ MORE

  4. 4. The Performance of TLS Protocol in Vehicular Embedded Computers

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Isack Mrema Jackson; [2016-09-19]
    Keywords : Security; Embedded Computing; Communication; TLS Protocol;

    Abstract : Transport Layer Security (TLS) is a protocol that is widely used to secure HypertextTransfer Protocol (HTTP) data transported across the Internet. This protocol comes with a set of operations that are for encryption, decryption, sharing keys forencryption etc. Studies have shown that these operations often cause performancedegradation. READ MORE

  5. 5. A practical comparison between algebraic and statistical attacks on the lightweight cipher SIMON

    University essay from Uppsala universitet/Avdelningen för datalogi

    Author : Berghult Astrid; [2016]
    Keywords : ;

    Abstract : In the summer of 2013 NSA released a new family of lightweight block ciphers called SIMON. However they did not publish any assessment of the security of SIMON. Since then only a few papers on this topic have been released and none of them have included an algebraic analysis. READ MORE