Essays about: "hemligheter"

Showing result 1 - 5 of 8 essays containing the word hemligheter.

  1. 1. LSTM-attack on polyalphabetic cyphers with known plaintext : Case study on the Hagelin C-38 and Siemens and Halske T52

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oriol Closa; [2023]
    Keywords : ;

    Abstract : Polyalphabetic cyphers have been used for centuries and well into the 1970s to transmit all kinds of messages. Since then, computers and modern cryptography have taken over making bruteforce attacks unfeasible when designed properly. READ MORE

  2. 2. Reverse Engineering of Deep Learning Models by Side-Channel Analysis

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xuan Wang; [2023]
    Keywords : Side-Channel Attack; Deep Learning; Reverse Engineering; Perceptron Neural Network; Sidokanalattack; Djup lärning; Omvänd Konstruktion; Perceptron Neurala Nätverk;

    Abstract : Side-Channel Analysis (SCA) aims to extract secrets from cryptographic systems by exploiting the physical leakage acquired from implementations of cryptographic algorithms. With the development of Deep Learning (DL), a new type of SCA called Deep Learning Side-Channel Analysis (DLSCA) utilizes the advantages of DL techniques in data features processing to break cryptographic systems more efficiently. READ MORE

  3. 3. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Crone; [2021]
    Keywords : trusted execution environment; remote attestation; sel4; microkernel; arm trustzone; intel sgx; side-channels; transient execution attacks; trusted execution environment; remote attestation; sel4; microkernel; arm trustzone; intel sgx; side-channels; transient execution attacks;

    Abstract : In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. READ MORE

  4. 4. Investigation of Impact Parameter Profiles in Multi-Parton Interactions

    University essay from Lunds universitet/Teoretisk partikelfysik - Geonomgår omorganisation

    Author : Martin Korsfeldt; [2020]
    Keywords : Angantyr; Impact Parameter; Multiparton Interaction; Physics and Astronomy;

    Abstract : The purpose of this thesis was to implement an alternative method to calculate the overlap function, which describe to what extent two protons overlap with each other spatially, into PYTHIA8 in order to determine how it affected the average number of multiparton interactions. The new overlap function is based on an explicit impact parameter picture, whereas PYTHIA8s overlap function uses an implicit impact parameter picture. READ MORE

  5. 5. Automatic secret synchronisation across heterogeneous IT environments

    University essay from KTH/Hälsoinformatik och logistik

    Author : Johan Wedin; Filip Ek Johansson; [2019]
    Keywords : security; secrets; secret management; system integration; cryptography; computer security; säkerhet; hemligheter; hemlighetshantering; systemintegration; kryptografi; datasäkerhet;

    Abstract : Following circumstances such as mergers and acquisitions, the IT systemsassociated with the participating organisations may need to share access towardsservices and systems with eachother. Access towards systems and services is oftencontrolled using secret information such as passwords or keys. READ MORE