Sökning: "Kryptografiska algoritmer"

Visar resultat 1 - 5 av 14 uppsatser innehållade orden Kryptografiska algoritmer.

  1. 1. Improving deep learning assistedfar-field electromagnetic sidechannelattacks on AES : Effects on attack efficiency from using additive noise and otherdata augmentation techniques

    Master-uppsats, KTH/Mekatronik

    Författare :Axel Zedigh; [2022]
    Nyckelord :;

    Sammanfattning : Profiled side-channel attacks on hardware implemented cryptographic algorithms have been a well-researched topic for the past two decades and many countermeasures against these attacks have been proposed and adopted by the industry. Recently, a new form of far field EM side channel called "screaming channel attacks" have been highlighted. LÄS MER

  2. 2. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Qiao Jin; [2022]
    Nyckelord :Embedded systems; ESP 32; Cryptographic algorithms; Cryptographic hardware acceleration; AES; RSA; SHA-2; HTTPS; Inbyggda system; ESP 32; Kryptografiska algoritmer; Kryptografisk hårdvaruacceleration; AES; RSA; SHA-2; HTTPS;

    Sammanfattning : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. LÄS MER

  3. 3. Far Field EM Side-Channel Attack Based on Deep Learning with Automated Hyperparameter Tuning

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Keyi Liu; [2021]
    Nyckelord :Side-Channel Attack; Deep Learning; Far Field EM emission; Auto Hyperparameter Tuning; Auto-Keras; AES; Sidokanalattack; Machine Learning; Multilayer Perceptron; Hyperparameter Tuning; Bayesian Optimization; Auto-Keras; AES;

    Sammanfattning : Side-channel attacks have become a realistic threat to the implementations of cryptographic algorithms. By analyzing the unintentional, side-channel leakage, the attacker is able to recover the secret of the target. Recently, a new type of side-channel leakage has been discovered, called far field EM emissions. LÄS MER

  4. 4. VePMAD: A Vehicular Platoon Management Anomaly Detection System : A Case Study of Car-following Mode, Middle Join and Exit Maneuvers

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Weaam Bayaa; [2021]
    Nyckelord :MDS; GMMHMM; PMP; Machine Learning; Bayesian information Criterion BIC ; Platoon Behavior Recognition; MDS; GMMHMM; PMP; Maskininlärnings; BIC; Plutonbeteendeigenkänning;

    Sammanfattning : Vehicle communication using sensors and wireless channels plays an important role to allow exchanging information. Adding more components to allow exchanging more information with infrastructure enhanced the capabilities of vehicles and enabled the rise of Cooperative Intelligent Transport Systems (C-ITS). LÄS MER

  5. 5. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware

    Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Alex Gustafsson; Carl Stensson; [2021]
    Nyckelord :Public-Key Cryptography; Benchmark; x86; IBM Z; z15; Asymmetrisk Kryptering; Prestandatest; x86; IBM Z; z15;

    Sammanfattning : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. LÄS MER