Sökning: "Tamper protection"

Hittade 4 uppsatser innehållade orden Tamper protection.

  1. 1. Designing a Physical Unclonable Function for Cryptographic Hardware

    Master-uppsats, Linköpings universitet/Institutionen för teknik och naturvetenskap; Linköpings universitet/Tekniska fakulteten

    Författare :Ludwig Bergfalck; Johannes Engström; [2021]
    Nyckelord :Hardware-based keyseed; Tamper protection; Physical Unclonable Function PUF ; Sensing mesh enclosure; Differential capacitance measurements;

    Sammanfattning : Hardware Security Modules (HSMs) are embedded systems that provide a physically secure data storage and handling environment. This master thesis evaluates an HSM method incorporating cryptographic key generation, key management, and tamper protection. LÄS MER

  2. 2. Tamper Protection for Cryptographic Hardware : A survey and analysis of state-of-the-art tamper protection for communication devices handling cryptographic keys

    Master-uppsats, Linköpings universitet/Informationskodning

    Författare :Emil Johansson; [2020]
    Nyckelord :;

    Sammanfattning : This master's thesis was conducted at Sectra Communications AB, where the aim of the thesis was to investigate the state of the art of physical hardware tampering attacks and corresponding protections and mitigations, and finally combining this to a protection model that conforms to the FIPS 140-2 standard. The methods used to investigate and evaluate the different attacks were literature searching, looking for articles presenting different attacks that have been used against real targets, and attacks that there are no records of being attempted on a real target, but are theoretically possible. LÄS MER

  3. 3. Aggregating Certificate Transparency Gossip Using Programmable Packet Processors

    Uppsats för yrkesexamina på avancerad nivå, Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Författare :Rasmus Dahlberg; [2018]
    Nyckelord :Certificate Transparency; CT; Gossip; P4;

    Sammanfattning : Certificate Transparency (CT) logs are append-only tamper-evident data structures that can be verified by anyone. For example, it is possible to challenge a log to prove certificate inclusion (membership) and log consistency (append-only, no tampering) based on partial information. LÄS MER

  4. 4. Design and Implementation of the Ephemerizer System

    Magister-uppsats, Institutionen för datavetenskap

    Författare :Shangjin Xu; [2007]
    Nyckelord :Ephemerizer; Javacard; Cryptography; Trusted Computing Base; Webservices;

    Sammanfattning : This thesis describes the system design and implementation of the secure Ephemerizer System that was first introduced by Radia Perlman in 2005. The system is designed to enable users to keep data for a finite period of time before making the data unrecoverable by destroying the keys with which the data was encrypted. LÄS MER