Essays about: "cryptography"

Showing result 1 - 5 of 121 essays containing the word cryptography.

  1. 1. On Pollard's rho method for solving the elliptic curve discrete logarithm problem

    University essay from Linnéuniversitetet/Institutionen för matematik (MA)

    Author : Jenny Falk; [2019]
    Keywords : elliptic curves; Pollard s rho method; elliptic curve discrete logarithm problem; cryptography; adding walk; mixed walk; cycle-detecting algorithm; iterating function; random walk;

    Abstract :     Cryptosystems based on elliptic curves are in wide-spread use, they are considered secure because of the difficulty to solve the elliptic curve discrete logarithm problem. Pollard's rho method is regarded as the best method for attacking the logarithm problem to date, yet it is still not efficient enough to break an elliptic curve cryptosystem. READ MORE

  2. 2. A Performance Evaluation of Post-Quantum Cryptography in the Signal Protocol

    University essay from Linköpings universitet/Informationskodning

    Author : Markus Alvila; [2019]
    Keywords : post-quantum; resistant; cryptography; commutative; supersingular; isogeny; Diffie-Hellman; CSIDH; Signal; protocol; X3DH; Double Ratchet; Curve25519; performance; evaluation; CPU; profiling; Android;

    Abstract : The Signal protocol can be considered state-of-the-art when it comes to secure messaging, but advances in quantum computing stress the importance of finding post-quantum resistant alternatives to its asymmetric cryptographic primitives. The aim is to determine whether existing post-quantum cryptography can be used as a drop-in replacement for the public-key cryptography currently used in the Signal protocol and what the performance trade-offs may be. READ MORE

  3. 3. Secure handling of encryption keys for small businesses : A comparative study of key management systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap; Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Jacob Gustafsson; Adam Törnkvist; [2019]
    Keywords : Key management system; encryption keys; cryptography; comparison; Nyckelhantering; krypteringsnycklar; kryptering; jämförelse;

    Abstract : Background: A recent study shows that key management in the cooperate world is very painful due to, among other reasons, a lack of knowledge and resources. Instead, some companies embed the encryption keys and other software secrets directly in the source code for the application that uses them, introducing the risk of exposing the secrets. READ MORE

  4. 4. Puncturable Symmetric KEMs for Forward-Secret 0-RTT Key Exchange

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Matilda Backendal; [2019]
    Keywords : cryptography; cryptographic protocols; session resumption; forward secrecy; 0-RTT; TLS 1.3; puncturable PRFs; key encapsulation mechanisms; Technology and Engineering;

    Abstract : The latest version of the Transport Layer Security protocol (TLS 1.3) introduces a pre-shared key zero round-trip time (0-RTT) mode. This enables session resumption with no latency before the first application data can be sent, at the cost of losing forward secrecy and replay protection. READ MORE

  5. 5. Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap; Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Louise Bergman Martinkauppi; Qiuping He; [2019]
    Keywords : cryptography; performance; SM2; SM3; SM4; kryptering; prestanda; SM2; SM3; SM4;

    Abstract : Background. China is regulating the import, export, sale, and use of encryption technology in China. If any foreign company wants to develop or release a product in China, they need to report their use of any encryption technology to the Office of State Commercial Cryptography Administration (OSCCA) to gain approval. READ MORE