Essays about: "säkerhetsprotokoll"

Showing result 1 - 5 of 10 essays containing the word säkerhetsprotokoll.

  1. 1. Formal security analysis of authentication in an asynchronous communication model

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jacob Wahlgren; Sam Yousefzadegan Hedin; [2020]
    Keywords : formal verification; Tamarin Prover; formal analysis; information security; authentication; formell verifiering; Tamarin Prover; formell analys; informationssäkerhet; autentisering;

    Abstract : Formal analysis of security protocols is becoming increasingly relevant. In formal analysis, a model is created of a protocol or system, and propositions about the security of the model are written. A program is then used to verify that the propositions hold, or find examples of where they do not. READ MORE

  2. 2. Secure and Privacypreserving V2X multicast DNS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ayub Atif; Justin Arieltan; [2020]
    Keywords : Vehicular Communications; DNS; Security and Privacy; PKI; Pseudonym; Bloom Filter; Vehicle Multi-hop Protocol; Fordonskommunikation; DNS; Säkerhet och integritet; PKI; Pseudonym; Bloom filter; Fordons multihopp-protokoll;

    Abstract : The Domain Name System is a hierarchical naming system that provides information of network resources or services given domain names. DNS applications in vehicular networks raise new challenges with regards to security and privacy of vehicles. READ MORE

  3. 3. Evaluation of Certificate Enrollment over Application Layer Security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexandros Krontiris; [2018]
    Keywords : Certificate Enrollment Management; application layer security; Ephemeral Diffie-Hellman Over COSE EDHOC ; key exchange protocol.; Certifikat inskrivning förvaltning; applikationslager säkerhet; Ephemeral Diffie-Hellman Over COSE EDHOC ; nyckelutbytesprotokoll.;

    Abstract : This thesis analyzes Application Layer security protocols for certificate enrollment and management. EDHOC, Ephemeral Diffie-HellmanOver COSE, is a recently developed key exchange protocol whichis designed to provide authentication and key-exchange functionality with compact message sizes and minimum round-trip-time. READ MORE

  4. 4. A reverse proxy for VoIP : Or how to improve security in a ToIP network

    University essay from KTH/Kommunikationsnät

    Author : Guillaume Dhainaut; [2016]
    Keywords : VoIP; ToIP; SIP; SIPS; RTP; SRTP; SBC; session border controller; security; toll fraud;

    Abstract : The need for security is crucial in Telephony over IP (ToIP). Secure protocols have been designed as well as specific devices to fulfill that need. This master thesis examines one of such devices called Session Border Controller (SBC), which can be compared to reverse proxies for ToIP. The idea is to apply message filters to increase security. READ MORE

  5. 5. Verification of security protocols with state in ProVerif : Avoiding false attacks when verifying freshness

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Pasi Saarinen; [2015]
    Keywords : formal verification ProVerif state counter applied pi calculus freshness security protocols;

    Abstract : One of the issues when attempting to verify security properties of a protocol is how to model the protocol. We introduce a method for verifying event freshness in tools which use the applied π-calculus and are able to verify secrecy. Event freshness can be used to prove that a protocol never generates the same key twice. READ MORE