Essays about: "krypteringsnycklar"

Showing result 1 - 5 of 6 essays containing the word krypteringsnycklar.

  1. 1. Sharing Quantum Resources Across a Metropolitan Network

    University essay from KTH/Tillämpad fysik

    Author : Martin Carlnäs; [2022]
    Keywords : QKD; Entanglement; SNSPD; Quantum Dot; Exciton; Biexciton; QKD; Kvantsammanflätning; SNSPD; Kvant Prick; Exciton; Biexciton;

    Abstract : Kvantsammanflätning har varit ett populärt ämne bland fysiker i snart 100 år då det tydligt belyser hur annorlunda kvantmekanikens värld är jämfört med den klassiska verklighet vi lever i. Med tiden har kvantsammanflätning blivit mer och mer välförstått och teknologier ämnade att utnyttja det har de senaste årtionden kommit allt närmare till industriell använding. READ MORE

  2. 2. Using Correlation Analysis to Locate Encryption Activity in Electromagnetic Side-Channels

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tore Johansson; Simon Weideskog; [2021]
    Keywords : AES; Cross correlation; Side-channel; SCA; Encryption; EM; Far-field;

    Abstract : Physical implementations of cryptographic algorithmscan leak sensitive information through different kindsof side-channels. This information can potentially be used forrecovering the secret key used in the algorithms. Recently, sidechannelattacks on CPU implementations of Advanced EncryptionStandard (AES) has been presented. READ MORE

  3. 3. Secure handling of encryption keys for small businesses : A comparative study of key management systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Jacob Gustafsson; Adam Törnkvist; [2019]
    Keywords : Key management system; encryption keys; cryptography; comparison; Nyckelhantering; krypteringsnycklar; kryptering; jämförelse;

    Abstract : Background: A recent study shows that key management in the cooperate world is very painful due to, among other reasons, a lack of knowledge and resources. Instead, some companies embed the encryption keys and other software secrets directly in the source code for the application that uses them, introducing the risk of exposing the secrets. READ MORE

  4. 4. Puncturable Symmetric KEMs for Forward-Secret 0-RTT Key Exchange

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Matilda Backendal; [2019]
    Keywords : cryptography; cryptographic protocols; session resumption; forward secrecy; 0-RTT; TLS 1.3; puncturable PRFs; key encapsulation mechanisms; Technology and Engineering;

    Abstract : The latest version of the Transport Layer Security protocol (TLS 1.3) introduces a pre-shared key zero round-trip time (0-RTT) mode. This enables session resumption with no latency before the first application data can be sent, at the cost of losing forward secrecy and replay protection. READ MORE

  5. 5. Securing LBO VoLTE roaming with multiple Escrow Agents : A dynamic approach to distribute cryptographic keys to Escrow Agents

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Nathanael Eneroth; [2018]
    Keywords : LTE; VoLTE; LBO; Lawful Intercept; Multiple Escrow Agents; Shamir’s Secret Sharing; LTE; VoLTE; LBO; laglig avlyssning; flera Escrow Agents ; Shamirs krypteringsmetod;

    Abstract : The fourth generation cellular mobile broadband, Long-Term Evolution (LTE), provides high speed Internet via Internet Protocol (IP). Today’s wireless infrastructure paves the way to a connected society where high speed Internet is seamlessly available at all times for anyone to use. READ MORE