Essays about: "encrypt algorithm"

Showing result 1 - 5 of 11 essays containing the words encrypt algorithm.

  1. 1. Performance benchmarking of data-at-rest encryption in relational databases

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Stewart Istifan; Mattias Makovac; [2022]
    Keywords : Data-at-rest; encryption; performance comparison; relational database management system; MariaDB; MySQL; advanced encryption standard AES ;

    Abstract : This thesis is based on measuring how Relational Database Management Systems utilizing data-at-rest encryption with varying AES key lengths impact the performance in terms of transaction throughput of operations through the process of a controlled experiment. By measuring the effect through a series of load tests followed by statistical analysis, the impact of adopting a specific data-at-rest encryption algorithm could be displayed. READ MORE

  2. 2. Towards Video Secure Streaming - Feasibility Study of Using an Obscuring Algorithm in Conjunction of H.264 Encoding and Compression

    University essay from Blekinge Tekniska Högskola/Institutionen för teknik och estetik

    Author : Deepika Challa; Surya Teja Vulavakayala; [2021]
    Keywords : H.264 codecs; H.264; video streaming; security in video streaming;

    Abstract : Technology advancement increases the usage of the internet day by day. One of the most used internet services is video streaming. The major advantage of video streaming is that it allows long distance communication between people without any delay. READ MORE

  3. 3. TLS Decryption in passive monitoring system with server private key

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Emil Käck; [2021]
    Keywords : TLS; Decryption; Passive monitoring; Server private key;

    Abstract : Many network operators need to be able to ensure that customers get the level of service they pay for. To avoid bandwidth and server performance bottlenecks, and easily troubleshoot network problems, the network providers need to be able to see what payload data is sent. READ MORE

  4. 4. Board and Chip Diversity in Deep Learning Side-Channel Attacks : On ATtiny85 Implementations Featuring Encryption and Communication

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Filip Björklund; Niklas Landin; [2021]
    Keywords : side-channel attack; deep learning; poweranalysis; ATtiny85; diversity; sidokanalsattack; djupinlärning; effektanalys; ATtiny85; mångfald;

    Abstract : Hardware security is an increasingly relevant topic because more and more systems and products are equipped with embedded microcontrollers. One type of threat against hardware security is attacks against encryption implementations in embedded hardware. READ MORE

  5. 5. Encrypted Documents Retrieval From The Cloud With Searchable Encryption : A Searchable Encryption Scheme Implementation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Salim Rabat; [2021]
    Keywords : searchable encryption; cloud storage; security; privacy-enhancing; sökbar kryptering; molnlagring; säkerhet; integritetsförbättring;

    Abstract : Encrypting data is a solution to enhance the privacy and confidentiality of the data owners when outsourcing storage to cloud storage providers. However, using conventional encryption algorithms would render search queries based on the content of the data useless. READ MORE