Sökning: "Kryptografiska algoritmer"

Visar resultat 11 - 15 av 17 uppsatser innehållade orden Kryptografiska algoritmer.

  1. 11. An FPGA Implementation of Arbiter PUF with 4x4 Switch Blocks

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Can Aknesil; [2020]
    Nyckelord :;

    Sammanfattning : Theft of services, private information, and intellectual property have become significant dangers to the general public and industry. Cryptographic algorithms are used for protection against these dangers. All cryptographic algorithms rely on secret keys that should be generated by an unpredictable process and securely stored. LÄS MER

  2. 12. Side-Channel Analysis of AES Based on Deep Learning

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Huanyu Wang; [2019]
    Nyckelord :Side-Channel Attack; Deep Learning; Convolutional Neural Network;

    Sammanfattning : Side-channel attacks avoid complex analysis of cryptographic algorithms, instead they use side-channel signals captured from a software or a hardware implementation of the algorithm to recover its secret key. Recently, deep learning models, especially Convolutional Neural Networks (CNN), have been shown successful in assisting side-channel analysis. LÄS MER

  3. 13. Migration of Signing Algorithms : An investigation in migration of signing algorithms used in certificate authorities.

    M1-uppsats, KTH/Hälsoinformatik och logistik

    Författare :Yusuf Hassan; [2019]
    Nyckelord :signing; algorithm; migration; post-quantum; certificate; x.509; backwards; compatibility; signeringsalgoritm; signeringsalgoritmer; migration; postkvantum; certifikat; x.509; kompatibilitet;

    Sammanfattning : The migration of signing algorithms is a process which can be used to move from signing algorithms which are regarded as less safe to algorithms which are regarded as safer. The safety of cryptographic algorithms has been compromised before, algorithms such as SHA-1 has been proven to be broken. LÄS MER

  4. 14. Characterization of FPGA-based Arbiter Physical Unclonable Functions

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Jingnan Shao; [2019]
    Nyckelord :Arbiter PUF; FPGA; Altera; Verilog HDL; Arbiter PUF; FPGA; Altera; Verilog HDL;

    Sammanfattning : The security of service, confidential data, and intellectual property are threatened by physical attacks, which usually include reading and tampering the data. In many cases, attackers can have access to the tools and equipment that can be used to read the memory or corrupt it, either by invasive or non-invasive means. LÄS MER

  5. 15. Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms

    Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Louise Bergman Martinkauppi; Qiuping He; [2019]
    Nyckelord :cryptography; performance; SM2; SM3; SM4; kryptering; prestanda; SM2; SM3; SM4;

    Sammanfattning : Background. China is regulating the import, export, sale, and use of encryption technology in China. If any foreign company wants to develop or release a product in China, they need to report their use of any encryption technology to the Office of State Commercial Cryptography Administration (OSCCA) to gain approval. LÄS MER