Essays about: "shared secret keys"

Found 4 essays containing the words shared secret keys.

  1. 1. Puncturable Symmetric KEMs for Forward-Secret 0-RTT Key Exchange

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Matilda Backendal; [2019]
    Keywords : cryptography; cryptographic protocols; session resumption; forward secrecy; 0-RTT; TLS 1.3; puncturable PRFs; key encapsulation mechanisms; Technology and Engineering;

    Abstract : The latest version of the Transport Layer Security protocol (TLS 1.3) introduces a pre-shared key zero round-trip time (0-RTT) mode. This enables session resumption with no latency before the first application data can be sent, at the cost of losing forward secrecy and replay protection. READ MORE

  2. 2. Out-of-band transfer with Android to configure pre-shared secrets into sensor nodes

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Johannes Nilsson; Jameel Habbosh; [2018]
    Keywords : performance-constrained sensor nodes; out-of-band communications; pre key-exchange problem; smartphone-based transmitter; Technology and Engineering;

    Abstract : Applications based on Wireless Sensor Networks are making their way into all kinds of industries. Today, they can do anything from off-loading hospitals by monitoring patients in their homes to regulating production lines in factories. More often than not, they perform some kind of surveillance and tracking. READ MORE

  3. 3. A framework to implement delegation in offline PACS : A strategy to restrict user’s path

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Tati Bharath; [2013]
    Keywords : smart card authentication; offline physical access control; delegation; shared secret keys; design science;

    Abstract : Physical access control systems (PACS) deal with the security of the availability of resources. They work as an alternative to traditional manual security access control. Access control has two variants, the logical which deals with computer environments and the physical which deals with the physical entry into a property or warehouses. READ MORE

  4. 4. Elliptic Curve Digital Signatures in RSA Hardware

    University essay from Informationskodning; Tekniska högskolan

    Author : Martin Krisell; [2012]
    Keywords : Cryptography; Digital Signatures; Elliptic Curves; ECC; ECDSA; ECIES; RSA; Kryptering; Digitala signaturer; Elliptiska kurvor; ECC; ECSDA; ECIES; RSA;

    Abstract : A digital signature is the electronic counterpart to the hand written signature. It can prove the source and integrity of any digital data, and is a tool that is becoming increasingly important as more and more information is handled electronically. Digital signature schemes use a pair of keys. READ MORE