Essays about: "security performance in AES"

Showing result 11 - 15 of 20 essays containing the words security performance in AES.

  1. 11. Internet of Things Security : Encryption Capacity Comparison for IoT Based on Arduino Devices.

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Jamiu Olalekan Olaide; [2020]
    Keywords : Encryption; Security; Arduino; Performance;

    Abstract : Background: IoT is a system of devices with unique identifiers (UIDs) and can transfer data over a network. They are widely used in various sectors such as Health, Commercial, Transport, etc. READ MORE

  2. 12. Protecting Privacy: Automatic Compression and Encryption of Next-Generation Sequencing Alignment Data

    University essay from Uppsala universitet/Experimentell och klinisk onkologi

    Author : Wiktor Gustafsson; [2019]
    Keywords : data protection; compression; encryption; genomic data; privacy; cancer; ngs; next-generation sequencing; AES; Zstandard; sequencing;

    Abstract : As the field of next-generation sequencing (NGS) matures and the technology grows more advanced, it is becoming an increasingly strong tool for solving various biological problems. Harvesting and analysing the full genomic sequence of an individual and comparing it to a reference genome can unravel information about detrimental mutations, in particular ones that give rise to diseases such as cancer. READ MORE

  3. 13. A Comparison of EncryptionAlgorithms for Protecting data passed Through a URL

    University essay from Linnéuniversitetet/Institutionen för datavetenskap (DV)

    Author : Mohamed Osman; Adam Johansson; [2017]
    Keywords : Encryption; ASP.NET CORE; Security; web application; Query String; AES; DES;

    Abstract : This project starts off with giving an overview of what sensitive data is, encryption algorithms and other required knowledge for this thesis project.This is because of the aim of this thesis project, that is to find the best way to encrypt data passed through a URL with a focus on protecting sensitive data in web applications. READ MORE

  4. 14. Evaluation of VPNs

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Mustafa Al-Abaychi; Joanna Ellvin; [2016]
    Keywords : ;

    Abstract : This thesis evaluated the performance of four different virtual private networks (VPNs): IP security (IPsec), OpenVPN, SSH port forwarding and SSH using virtual interfaces. To evaluate these VPNs, three comparative performance tests were carried out in which the maximum throughput of each VPN was measured. READ MORE

  5. 15. Power Analysis of the Advanced Encryption Standard : Attacks and Countermeasures for 8-bit Microcontrollers

    University essay from Linköpings universitet/Informationskodning

    Author : Mattias Fransson; [2015]
    Keywords : power analysis; template attacks; countermeasures; microcontroller; AES;

    Abstract : The Advanced Encryption Standard is one of the most common encryption algorithms. It is highly resistant to mathematical and statistical attacks, however, this security is based on the assumption that an adversary cannot access the algorithm’s internal state during encryption or decryption. READ MORE