Essays about: "encryption"

Showing result 1 - 5 of 160 essays containing the word encryption.

  1. 1. Tiny Security : Evaluating energy   use for security in an IoT application

    University essay from Mittuniversitetet/Institutionen för data- och systemvetenskap

    Author : Mårten Söderquist; [2019]
    Keywords : Security; constrained device; AES; IoT; sensors; AEAD; ATmega1284P; ACORN128;

    Abstract : IoT devices are   increasingly used in the process of gathering scientific data. In   environmental monitoring IoT devices can be used as remote sensing devices to   collect information about e.g. temperature. READ MORE

  2. 2. Secure Intermittent Computing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Erik Henricus Wouters; [2019]
    Keywords : ;

    Abstract : Low-power embedded systems exist in many forms. Using batteries for these devices generally imposes high maintenance costs and there are many applications where a grid connection is not feasible [1]. A solution for powering this class of embedded systems is energy harvesting. READ MORE

  3. 3. Secure handling of encryption keys for small businesses : A comparative study of key management systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap; Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Jacob Gustafsson; Adam Törnkvist; [2019]
    Keywords : Key management system; encryption keys; cryptography; comparison; Nyckelhantering; krypteringsnycklar; kryptering; jämförelse;

    Abstract : Background: A recent study shows that key management in the cooperate world is very painful due to, among other reasons, a lack of knowledge and resources. Instead, some companies embed the encryption keys and other software secrets directly in the source code for the application that uses them, introducing the risk of exposing the secrets. READ MORE

  4. 4. Local And Network Ransomware Detection Comparison

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Filip Ahlgren; [2019]
    Keywords : Ransomware; Detection; Machine Learning;

    Abstract : Background. Ransomware is a malicious application encrypting important files on a victim's computer. The ransomware will ask the victim for a ransom to be paid through cryptocurrency. After the system is encrypted there is virtually no way to decrypt the files other than using the encryption key that is bought from the attacker. READ MORE

  5. 5. Deep-Learning Side-Channel Attacks on AES

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Martin Brisfors; Sebastian Forsmark; [2019]
    Keywords : AES; Machine Learning; Side Channel Attack; Encryption; AES; maskinlarning; sidokanalattack; kryptering;

    Abstract : Nyligen har stora framsteg gjorts i att tillämpa djupinlärning på sidokanalat- tacker. Detta medför ett hot mot säkerheten för implementationer av kryp- tografiska algoritmer. Konceptuellt är tanken att övervaka ett chip medan det kör kryptering för informationsläckage av ett visst slag, t.ex. READ MORE