Sökning: "cryptography"

Visar resultat 11 - 15 av 203 uppsatser innehållade ordet cryptography.

  1. 11. LSTM-attack on polyalphabetic cyphers with known plaintext : Case study on the Hagelin C-38 and Siemens and Halske T52

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Oriol Closa; [2023]
    Nyckelord :;

    Sammanfattning : Polyalphabetic cyphers have been used for centuries and well into the 1970s to transmit all kinds of messages. Since then, computers and modern cryptography have taken over making bruteforce attacks unfeasible when designed properly. LÄS MER

  2. 12. Confidential Federated Learning with Homomorphic Encryption

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Zekun Wang; [2023]
    Nyckelord :Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Sammanfattning : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. LÄS MER

  3. 13. Automated Generation of EfficientBitslice Implementations forArbitrary Sboxes

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Augustin Bariant; [2023]
    Nyckelord :Bitslicing; Cryptography; Whitebox; Compilation; Boolean circuits.; Parallélisation au bit; Cryptographie; Boîte blanche; Compilation; Circuits booléens.; Bitslicing; Kryptografi; Vit låda; Kompilering; Booleska kretsar.;

    Sammanfattning : Whitebox cryptography aims at protecting standard cryptographic algorithmsthat execute in attacker-controlled environments. In these, the attacker is ableto read a secret key directly from memory. Common implementations mask alldata at runtime and operate on masked data by using many small precomputedtables. LÄS MER

  4. 14. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Linus Backlund; [2023]
    Nyckelord :Public-key Cryptography; Post-Quantum Cryptography; Kyber; Saber; Side-Channel Attack; Power Analysis; Asymetrisk Kryptering; Kvantsäker Kryptografi; Kyber; Saber; Sidokanalsattack; Effektanalys;

    Sammanfattning : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. LÄS MER

  5. 15. Procedures of investigation around online child sexual abuse : Comparison between Belgian and Swedish Police

    Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Marine de Wilde d'Estmael; [2023]
    Nyckelord :;

    Sammanfattning : The primary aim of this master's thesis is to explore the differences between the methods usedby the Belgian and Swedish Police in their investigations of online child sexual abuse in orderto answer my research question “What could those specialised teams improve?” The first partof this work is theoretical and provides information on the structure of the Belgian and SwedishPolice. This will be followed by a brief discussion of the role of Europol and Interpol in thefight against child sexual abuse, as well as a short chapter on cryptography to understand howinternational communications are conducted. LÄS MER