Sökning: "Twofish"

Hittade 3 uppsatser innehållade ordet Twofish.

  1. 1. Diskkrypteringsprestanda i GNU/Linux

    M1-uppsats, Institutionen för datavetenskap (DV)

    Författare :Sebastian Ahlstedt; David Granath Karlsson; [2013]
    Nyckelord :Encryption; AES; Rijndael; Serpent; Twofish; DM-crypt; Loop-AES; Truecrypt; hard drive; performance; benchmark; Kryptering; AES; Rijndael; Serpent; Twofish; DM-crypt; Loop-AES; Truecrypt; hårddisk; prestandamätning;

    Sammanfattning : This thesis compares the impact on disk performance in a GNU/Linux  environmentwith three encryption algorithms: AES,  Serpent and Twofish in three different implementations: DM-crypt, Loop-AES and Truecrypt. For all three algorithms a key length of 256 bits is used. LÄS MER

  2. 2. Performance differences in encryption software versus storage devices

    M1-uppsats, Institutionen för datavetenskap, fysik och matematik, DFM

    Författare :Robin Olsson; [2012]
    Nyckelord :Encryption; Symmetric Encryption; AES; Twofish; Serpent; TrueCrypt; BestCrypt; DiskCryptor; SSD; Mechanical hard drive; Performance; Benchmarks;

    Sammanfattning : This thesis looked at three encryption applications that all use the symmetric encryption algorithms AES, Twofish and Serpent but differ in their implementation and how this difference would illustrate itself in performance benchmarks depending on the type of storage device that they were used on. Three mechanical hard drives and one solid state drive were used in the performance benchmarks which measured a variety of different disk operations across the three encryption applications and their algorithms. LÄS MER

  3. 3. Encryption in Delocalized Access Systems

    Uppsats för yrkesexamina på grundnivå, Institutionen för teknik och naturvetenskap

    Författare :Henrik Ahlström; Karl-Johan Skoglund; [2008]
    Nyckelord :Access systems; Cryptography; Public Key; Embedded system; Large integer arithmetic.;

    Sammanfattning : The recent increase in performance of embedded processors has enabled the use of computationally heavy asymmetric cryptography in small and power efficient embedded systems. The goal of this thesis is to analyze whether it is possible to use this type of cryptography to enhance the security in access systems. LÄS MER