Essays about: "cryptography"

Showing result 1 - 5 of 127 essays containing the word cryptography.

  1. 1. Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Nico Ferrari; [2019]
    Keywords : Internet of Things; Context-based authentication; Fuzzy commitment scheme; Cryptographic key establishment; Lightweight cryptography; Contiki; One-way accumulators;

    Abstract : The concept of the Internet of Things is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. With the rapidly increasing number of interconnected devices present in the life of a person, providing authentication and secure communication between them is considered a key challenge. READ MORE

  2. 2. On Pollard's rho method for solving the elliptic curve discrete logarithm problem

    University essay from Linnéuniversitetet/Institutionen för matematik (MA)

    Author : Jenny Falk; [2019]
    Keywords : elliptic curves; Pollard s rho method; elliptic curve discrete logarithm problem; cryptography; adding walk; mixed walk; cycle-detecting algorithm; iterating function; random walk;

    Abstract :     Cryptosystems based on elliptic curves are in wide-spread use, they are considered secure because of the difficulty to solve the elliptic curve discrete logarithm problem. Pollard's rho method is regarded as the best method for attacking the logarithm problem to date, yet it is still not efficient enough to break an elliptic curve cryptosystem. READ MORE

  3. 3. A Performance Evaluation of Post-Quantum Cryptography in the Signal Protocol

    University essay from Linköpings universitet/Informationskodning

    Author : Markus Alvila; [2019]
    Keywords : post-quantum; resistant; cryptography; commutative; supersingular; isogeny; Diffie-Hellman; CSIDH; Signal; protocol; X3DH; Double Ratchet; Curve25519; performance; evaluation; CPU; profiling; Android;

    Abstract : The Signal protocol can be considered state-of-the-art when it comes to secure messaging, but advances in quantum computing stress the importance of finding post-quantum resistant alternatives to its asymmetric cryptographic primitives. The aim is to determine whether existing post-quantum cryptography can be used as a drop-in replacement for the public-key cryptography currently used in the Signal protocol and what the performance trade-offs may be. READ MORE

  4. 4. Secure handling of encryption keys for small businesses : A comparative study of key management systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap; Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Jacob Gustafsson; Adam Törnkvist; [2019]
    Keywords : Key management system; encryption keys; cryptography; comparison; Nyckelhantering; krypteringsnycklar; kryptering; jämförelse;

    Abstract : Background: A recent study shows that key management in the cooperate world is very painful due to, among other reasons, a lack of knowledge and resources. Instead, some companies embed the encryption keys and other software secrets directly in the source code for the application that uses them, introducing the risk of exposing the secrets. READ MORE

  5. 5. Benchmarking Framework for Transparent Data Encryption Systems

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik; Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Feidias Moulianitakis; Konstantinos Asimakopoulos; [2019]
    Keywords : Transparent Data Encryption; benchmarking framework; encryption performance; Design Research; Cryptography;

    Abstract : In the digital world of today, information is always at risk regardless of its state, at rest or in transit. Cryptography is the technology that promises to address the security issues that emerge. Hence, it was a reasonable consequence to introduce cryptography to databases. READ MORE