Essays about: "encryption keys"

Showing result 1 - 5 of 40 essays containing the words encryption keys.

  1. 1. Development of a QRNG front-end for shot noise measurement : analysis of quantum shot noise originating from photodiodes

    University essay from Linköpings universitet/Informationskodning

    Author : Martin Clason; [2023]
    Keywords : shot noise; quantum random number generator; photodiode; transimpedance amplifier; skottbrus; kvantslumptalsgenerator; fotodiod; transimpedansförstärkare;

    Abstract : As one of the more mature quantum technologies, quantum random number generators (QRNGs) fill an important role in producing secure and private keys for use in cryptogra- phy in e.g. quantum key distribution (QKD) systems. Many available QRNGs are expen- sive and optical QRNGs often require complex optical setups. READ MORE

  2. 2. Cost and efficiency comparison of Quantum Key Distribution schemes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Erik Lidbjörk; Rasmus Söderström Nylander; [2023]
    Keywords : ;

    Abstract : The development of quantum computing exposes critical vulnerabilities in classical encryption systems. However, quantum computing also enables new methods of secure communication. Quantum key distribution (QKD) is one class of such methods. READ MORE

  3. 3. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability

    University essay from KTH/Hälsoinformatik och logistik

    Author : Ahmad Al Khateeb; Abdulrazzaq Summaq; [2023]
    Keywords : Access Control; Authorization; Keycloak; GPG Keys; Encryption; GitLab; Version Control; Neo4j; Data Security;

    Abstract : The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. READ MORE

  4. 4. Anonymization of Sensitive Data through Cryptography

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Isac Holm; Johan Dahl; [2023]
    Keywords : Cryptography; Encryption; Decryption; AES; Camellia; Anonymization; Sensitive Data;

    Abstract : In today's interconnected digital landscape, the protection of sensitive information is of great importance. As a result, the field of cryptography plays a vital role in ensuring individuals' anonymity and data integrity. READ MORE

  5. 5. Cryptography Executed in Web Browsers – Achieving Convenient End-to-End Security for Lock Access Control

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Chanvuth Chea; [2023]
    Keywords : ;

    Abstract : Many client-server applications are not protected with end-to-end security, allowing the web server to control all data. In this thesis, the feasibility of executing modern cryptography on the web browser has been evaluated and proposed an end-to-end security design for cloud-based lock access control. READ MORE