Essays about: "thesis for symmetric key cryptography"

Showing result 6 - 10 of 10 essays containing the words thesis for symmetric key cryptography.

  1. 6. On the Properties of S-boxes : A Study of Differentially 6-Uniform Monomials over Finite Fields of Characteristic 2

    University essay from KTH/Matematik (Avd.)

    Author : Léo Paul Perrin; [2013]
    Keywords : Symmetric cryptography; Differential uniformity; Differential spectrum; Kloosterman sum; Power function; Roots of trinomial; x⟶x^ 2t-1 ; Dickson polynomial; Differential Cryptanalysis;

    Abstract : S-boxes are key components of many symmetric cryptographic primitives. Among them, some block ciphers and hash functions are vulnerable to attacks based on differential cryptanalysis, a technique introduced by Biham and Shamir in the early 90’s. READ MORE

  2. 7. Design and implementation of Wireless Packet Level Authentication

    University essay from

    Author : Abdullah Al Hasib; [2009]
    Keywords : ;

    Abstract : Secure user authentication, authorization and access control have become the major challenges in any wireless security system, often due to certain wireless network characteristics such as lack of infrastructure, low power availability and mobility. Taking advantage of such network characteristics, an attacker can launch several security attacks like Denial of Service (DoS) attacks, packet spoofing and session hijacking attacks. READ MORE

  3. 8. Encryption in Delocalized Access Systems

    University essay from Institutionen för teknik och naturvetenskap

    Author : Henrik Ahlström; Karl-Johan Skoglund; [2008]
    Keywords : Access systems; Cryptography; Public Key; Embedded system; Large integer arithmetic.;

    Abstract : The recent increase in performance of embedded processors has enabled the use of computationally heavy asymmetric cryptography in small and power efficient embedded systems. The goal of this thesis is to analyze whether it is possible to use this type of cryptography to enhance the security in access systems. READ MORE

  4. 9. Implementing the Transport Layer Security Protocol for Embedded Systems

    University essay from Institutionen för systemteknik

    Author : Bengt Werstén; [2007]
    Keywords : TLS; SSL; embedded systems; cryptography; hardware support; export laws;

    Abstract : Web servers are increasingly being used in embedded devices as a communication medium. As more systems connect to the Internet, the need for security is increasing. The Transport Layer Protocol (TLS) is the successor of Secure Socket Layer (SSL) and provides security in almost all secure Internet transactions. READ MORE

  5. 10. ARTSY : A Reproduction Transaction System

    University essay from Bildbehandling; Tekniska högskolan

    Author : Mårten Björk; Sofia Max; [2003]
    Keywords : Technology; distributed system; XML; Java; cryptography; computer security; key establishment protocol; CORBA; Java RMI; RSA; DES; security threats; TEKNIKVETENSKAP;

    Abstract : A Transaction Reproduction System (ARTSY) is a distributed system that enables secure transactions and reproductions of digital content over an insecure network. A field of application is reproductions of visual arts: A print workshop could for example use ARTSY to print a digital image that is located at a remote museum. READ MORE