Essays about: "cryptography and network security"

Showing result 11 - 15 of 33 essays containing the words cryptography and network security.

  1. 11. Implementation and Benchmarking of a Crypto Processor for a NB-IoT SoC Platform

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Sébastien Fuhrmann; Luis Cavo; [2018]
    Keywords : 3GPP; IoT; HLS; security; cryptography; AES; SNOW; ZUC; hardware; ASIC; confidentiality; integrity; cipher; Technology and Engineering;

    Abstract : The goal of this Master’s Thesis is to investigate the implementation of cryptographic algorithms for IoT and how these encryption systems can be integrated in a NarrowBand IoT platform. Following 3rd Generation Partnership Project (3GPP) specifications, the Evolved Packet System (EPS) Encryption Algorithms (EEA) and EPS Integrity Algorithms (EIA) have been implemented and tested. READ MORE

  2. 12. On Statistical Properties of Arbiter Physical Unclonable Functions

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Phillip Gajland; [2018]
    Keywords : PUF; Boolean function; function distribution; arbiter path; digital fingerprint; secure key storage; cryptography; system security; hardware security.;

    Abstract : The growing interest in the Internet of Things (IoT) has led to predictions claiming that by 2020 we can expect to be surrounded by 50 billion Internet connected devices. With more entry points to a network, adversaries can potentially use IoT devices as a stepping stone for attacking other devices connected to the network or the network itself. READ MORE

  3. 13. Cryptographic Attestation of the Origin of Surveillance Images

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Anton Eliasson; [2017]
    Keywords : Video signing; Video surveillance; H.264 AVC; Public-key cryptography; Axis Communications AB; Technology and Engineering;

    Abstract : A method is devised that provides authentication and integrity protection for H.264 encoded surveillance video. A digital signature is created at the H. READ MORE

  4. 14. Consistent authentication in disitrbuted networks

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Niklas Lindskog; [2016]
    Keywords : Authentication; Distributed Hash Table; Kademlia; Distributed Networking; Network Security; Calvin; Cryptography; Technology and Engineering;

    Abstract : In a time where peer-to-peer networks, often with previously unconnected devices, are increasing in relevance, new storage solutions are needed. Storage can no longer rely on a single central entity but rather needs to depend on the resources of the entire network. READ MORE

  5. 15. SecuRES: Secure Resource Sharing System : AN INVESTIGATION INTO USE OF PUBLIC LEDGER TECHNOLOGY TO CREATE DECENTRALIZED DIGITAL RESOURCE-SHARING SYSTEMS

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Philip Leung; Daniel Svensson; [2015]
    Keywords : Public ledger; Blockchain; Bitcoin; Non-repudiation; Trust; Secre transactions; Resource sharing; Decentralisation; Elliptic curve cryptography; Integrity; Confidentiality.; Publik liggare; Blockkedja; Bitcoin; Oförnekbarhet; Tillit; Säkra transaktioner; Resursdelning; Decentralisering; Elliptic curve cryptografi; Integritet; Konfidentialitet.;

    Abstract : The project aims at solving the problem of non-repudiation, integrity and confidentiality of data when digitally exchanging sensitive resources between parties that need to be able to trust each other without the need for a trusted third party. This is done in the framework of answering to what extent digital resources can be shared securely in a decentralized public ledger-based system compared to trust-based alternatives. READ MORE