Essays about: "idea cryptography"

Found 5 essays containing the words idea cryptography.

  1. 1. Procedures of investigation around online child sexual abuse : Comparison between Belgian and Swedish Police

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Marine de Wilde d'Estmael; [2023]
    Keywords : ;

    Abstract : The primary aim of this master's thesis is to explore the differences between the methods usedby the Belgian and Swedish Police in their investigations of online child sexual abuse in orderto answer my research question “What could those specialised teams improve?” The first partof this work is theoretical and provides information on the structure of the Belgian and SwedishPolice. This will be followed by a brief discussion of the role of Europol and Interpol in thefight against child sexual abuse, as well as a short chapter on cryptography to understand howinternational communications are conducted. READ MORE

  2. 2. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE

  3. 3. A Comparative Study Of Proof of Stake Algorithms

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Antonio Saaranen; [2022]
    Keywords : Blockchain; consensus algorithms; cryptography; Proof of Stake; Technology and Engineering;

    Abstract : Cryptocurrencies are growing at a rapid pace. It is well established that the mining operation fueling the cryptocurrency Bitcoin consumes a significant amount of energy. This study aims to determine if there is an alternative to the consensus model, maintaining security, integrity, and decentralization. READ MORE

  4. 4. Investigation of cryptographic algorithms for the transfer of financial information

    University essay from Linnéuniversitetet/Institutionen för datavetenskap, fysik och matematik, DFM

    Author : Mykola Martynenko; [2010]
    Keywords : encryption; cryptography; hashing; client; server; compressing; digital signature;

    Abstract : The purpose of the investigation is to determine the most effective solution, which allows safe storing and transmitting of financial information in terms of execution speed, resistance to hacking and ease of implementation. Research object is subject area related to the transfer of encrypted financial information like: encryption algorithms, algorithm of hashing functions, algorithm of electronic digital signature. READ MORE

  5. 5. Random Stream Cipher

    University essay from Matematiska och systemtekniska institutionen

    Author : Saeed Aghaee; [2007]
    Keywords : Cryptography; Random stream cipher; symmetric encryption;

    Abstract : Stream ciphers are counted as an important part of symmetric encryption method. Their basic idea comes from One-Time-Pad cipher using XOR operator on the plain text and the key to generate the cipher. READ MORE