Sökning: "Key-recovery"

Hittade 4 uppsatser innehållade ordet Key-recovery.

  1. 1. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    M1-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Sarmed Almjamai; [2022]
    Nyckelord :Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Sammanfattning : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. LÄS MER

  2. 2. Advanced Side-Channel Analysis of USIMs, Bluetooth SoCs and MCUs

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Martin Brisfors; [2021]
    Nyckelord :Side Channel Attack; Deep Learning; AES; USIM; Milenage; Screaming Channels; Transformer; Security; Sidokanalsattack; Djupinlärning; AES; USIM; Milenage; Screaming Channels; Transformer; Säkerhet;

    Sammanfattning : The use of deep learning for side channel analysis has shown a lot of success in recent years. Impressive results have been presented by many researchers. However, critics of this approach have voiced concerns about the ad hoc methodologies and bespoke neural network designs used in many presented approaches. LÄS MER

  3. 3. A practical comparison between algebraic and statistical attacks on the lightweight cipher SIMON

    Uppsats för yrkesexamina på avancerad nivå, Uppsala universitet/Avdelningen för datalogi

    Författare :Berghult Astrid; [2016]
    Nyckelord :;

    Sammanfattning : In the summer of 2013 NSA released a new family of lightweight block ciphers called SIMON. However they did not publish any assessment of the security of SIMON. Since then only a few papers on this topic have been released and none of them have included an algebraic analysis. LÄS MER

  4. 4. Voice over IP and Lawful Intercept : Good cop/Bad cop

    Master-uppsats, KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Författare :Muhammad Morshed; [2010]
    Nyckelord :;

    Sammanfattning : Lawful interception is a common practice for monitoring a telecommunication network by law enforcement agencies all over the world. It plays a vital role to ensure national security and to control crimes by providing authorized monitoring of communicating parties in a communication network. LÄS MER