Essays about: "cipher"
Showing result 16 - 20 of 33 essays containing the word cipher.
-
16. Modified and Efficient Image Encryption Algorithm Based on Chaos Theory, DNA Complementary Rules and SHA-256
University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystemAbstract : The emerging topic, symmetric encryption technique for digital imagesusing chaotic function and DNA bases has recently drawn a lot ofattentions from the research community. The use of voice and visualmaterial as an addition to textual data has become more widespread. READ MORE
-
17. Constructions for efficient MDS diffusion layers
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : Matrices are widely used in Block Cipher Diffusion layers, usually chosen for offering maximal branch numbers, and allowing lightweight hardware implementations through their low XOR Count. When implemented in software however, is XOR Count the only metric? This project will utilize the parallelism provided by modern SIMD vector instructions to evaluate metrics, by implementing different algorithmic approaches. READ MORE
-
18. The Performance of TLS Protocol in Vehicular Embedded Computers
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Transport Layer Security (TLS) is a protocol that is widely used to secure Hypertext Transfer Protocol (HTTP) data transported across the Internet. This protocol comes with a set of operations that are for encryption, decryption, sharing keys for encryption etc. Studies have shown that these operations often cause performance degradation. READ MORE
-
19. A practical comparison between algebraic and statistical attacks on the lightweight cipher SIMON
University essay from Uppsala universitet/Avdelningen för datalogiAbstract : In the summer of 2013 NSA released a new family of lightweight block ciphers called SIMON. However they did not publish any assessment of the security of SIMON. Since then only a few papers on this topic have been released and none of them have included an algebraic analysis. READ MORE
-
20. Implementation and Evaluation of Espresso Stream Cipher in 65nm CMOS
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : With the upcoming 5G networks and expected growth of the Internet of Things (IoT), the demand for fast and reliable encryption algorithms will increase. As many systems might be time critical and run on internal power sources, the algorithms must be small, fast, energy efficient and have low latency. READ MORE