• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 107
  • 35
  • 33
  • 16
  • 10
  • 9
  • 8
  • 6
  • 5
  • 4
  • 3
  • 2
  • 2
  • 1
  • Tagged with
  • 260
  • 47
  • 42
  • 41
  • 38
  • 36
  • 36
  • 32
  • 28
  • 22
  • 22
  • 21
  • 20
  • 18
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Hardwarová akcelerace šifrování síťového provozu / Hardware Accelerated Encryption of Network Traffic

Novotňák, Jiří January 2010 (has links)
The aim of this thesis is to draft and implement high-speed encryptor of network trafic with throughput 10Gb/s in one way. It has been implementated for FPGA Xilinx Virtex5vlx155t placed on card COMBOv2-LXT. The encryption is based on AES algorithm using 128 bit key length. The security protokol is ESP in version for protokol IPv4. Design is fully synthesizable with tool Xilinx ISE 11.3, however it is not tested on real hardware. Tests in simulation works fine.
72

Valorización de Empresa AES Gener S.A.

Villalobos H., Elisa 03 1900 (has links)
Tesis para optar al grado de Magíster en Finanzas / El presente trabajo tiene como objetivo valorizar, al 30 de junio de 2016, a la compañía de generación eléctrica Aes Gener S.A. La metodología utilizada para valorizar la compañía es el método de flujos de caja libres descontado. Aes Gener es la tercera generadora eléctrica en el Sistema Interconectado Central (SIC), según capacidad instalada a diciembre de 2015 y la segunda generadora en el Sistema Interconectado Norte Grande (SING), según capacidad instalada al mismo año. Además, tiene presencia en el Sistema Interconectado Nacional (SIN) de Colombia y en el Sistema Argentino de Interconexión (SADI). La compañía es controlada por la sociedad estadounidense Aes Corp, que a través de Inversiones Cachagua SpA mantiene una participación de 66,7% en la propiedad de Aes Gener. Los mayores desafíos en proyectar los flujos provienen de los diferentes mercados en los que está presente la compañía, cada uno con sus diferentes regulaciones, junto con la diversificación de las fuentes de generación y la consecuente diversidad de márgenes de cada una de ellas. Con todo lo anterior, realizada la valorización se pudo llegar a que el valor de los activos operacionales de Aes Gener al 30 de junio de 2016 es de UF 188,96 millones, sumado los activos prescindibles y el exceso de capital de trabajo, el total de los activos alcanza a UF 208,96 millones. La deuda financiera de la compañía es de UF 103,8 millones al 30 de junio de 2016. Descontando este valor del total de activos, se tiene que el patrimonio económico de la compañía es de UF 105,12 millones. Así, dado el número de acciones en que está dividida la compañía, igual a 8.400 millones, el precio por acción alcanzado es de $325,83, un 0,7% superior al precio de la acción al 30 de junio de 2016. Sin embargo, a contar de agosto de 2016 la industria eléctrica en el país, principal mercado para Aes Gener, atravesó por cambios estructurales dado por la fuerte arremetida de la energía renovable no convencional (ERNC) en la licitación1 para clientes regulados, finalizada en agosto de 2016. El precio promedio ponderado de esta licitación fue de US$ 47,55 por MWh, siendo el precio más bajo en comparación a las subastas eléctricas realizadas en el pasado (la licitación anterior de volúmenes similares fue la de diciembre de 2014 con un precio medio de US$ 99 por MWh). La sustancial reducción de los costos para implementar proyectos a base de ERNC, como la solar y eólica, ha permitido que estas fuentes de energía se vuelvan fuertemente competitivas. Lo anterior, afectó el nivel de precios de los contratos de largo plazo que cobran las generadoras, por lo que la valorización se ve afectada por esta nueva composición de fuentes de generación y precios de largo plazo. Además, la empresa ha experimentado importantes retrasos y sobrecostos en la construcción de la central de pasada Alto Maipo de 531 MW, cuya propiedad es compartida por Norgener, filial de Aes Gener (con el 60% de la propiedad) y Antofagasta Minerals (con el 40% restante). Así la compañía señaló en agosto de 2016 que el sobrecosto de la central sería del 22%. Bajo estos nuevos escenarios de cambios estructurales en el mercado energético y en el sobrecosto de la principal inversión que está realizando la compañía, se obtuvo una nueva valorización patrimonial para la compañía igual a UF 86,46 millones, equivalente a un precio por acción de $258,71, lo que significa una caída de un 21,4% respecto al cierre de la acción al 30 de junio de 2016 y una diferencia de un 6,7% respecto del precio promedio de la acción desde agosto de 2016 a la fecha.
73

CHAOS-BASED ADVANCED ENCRYPTION STANDARD

Abdulwahed, Naif B. 05 1900 (has links)
This thesis introduces a new chaos-based Advanced Encryption Standard (AES). The AES is a well-known encryption algorithm that was standardized by U.S National Institute of Standard and Technology (NIST) in 2001. The thesis investigates and explores the behavior of the AES algorithm by replacing two of its original modules, namely the S-Box and the Key Schedule, with two other chaos- based modules. Three chaos systems are considered in designing the new modules which are Lorenz system with multiplication nonlinearity, Chen system with sign modules nonlinearity, and 1D multiscroll system with stair case nonlinearity. The three systems are evaluated on their sensitivity to initial conditions and as Pseudo Random Number Generators (PRNG) after applying a post-processing technique to their output then performing NIST SP. 800-22 statistical tests. The thesis presents a hardware implementation of dynamic S-Boxes for AES that are populated using the three chaos systems. Moreover, a full MATLAB package to analyze the chaos generated S-Boxes based on graphical analysis, Walsh-Hadamard spectrum analysis, and image encryption analysis is developed. Although these S-Boxes are dynamic, meaning they are regenerated whenever the encryption key is changed, the analysis results show that such S-Boxes exhibit good properties like the Strict Avalanche Criterion (SAC) and the nonlinearity and in the application of image encryption. Furthermore, the thesis presents a new Lorenz-chaos-based key expansion for the AES. Many researchers have pointed out that there are some defects in the original key expansion of AES and thus have motivated such chaos-based key expansion proposal. The new proposed key schedule is analyzed and assessed in terms of confusion and diffusion by performing the frequency and SAC test respectively. The obtained results show that the new proposed design is more secure than the original AES key schedule and other proposed designs in the literature. The proposed design is then enhanced to increase the operating speed using the divide- and-conquer concept. Such enhancement, did not only make the AES algorithm more secure, but also enabled the AES to be faster, as it can now operate on higher frequencies, and more area-efficient.
74

Partitioning oracle attacks against variants of AES-GCM and ChaCha20-Poly1305

Tordsson, Pontus January 2021 (has links)
We investigate so-called partitioning oracle attacks against AES-GCM and ChaCha20-Poly1305 along with some improvements. Such attacks against these two cryptosystems are efficient because they can be reduced to solving linear systems of equations over finite fields. We show, with some randomness assumptions, that such linear systems must have at least as many columns as rows. We have also chosen two finite (non-field) rings, as replacement for the respective fields used by AES-GCM and ChaCha20-Poly1305 for message authentication. These rings make the problem of linear system arrangement in a partitioning oracle attack extremely hard for large linear system dimensions.
75

A method development for measuring lithium uptake inCaco-2 cells in a complex matrix using MP-AES – Appliedto evaluate the impact of humic acids on lithium uptake

Hjelm, Erica January 2019 (has links)
Lithium, together with hydrogen and helium, were the only elements formed duringthe big bang. Lithium today, is a component in various products, some examples aregrease, ceramics, lithium-ion batteries and medication for bipolar disorder. Eventhough the knowledge of lithium’s interactions with biota and our environment islimited, the use of lithium is increasing. In humans, lithium is primarily absorbed in thesmall intestine through Na-channels. The average daily intake varies a lot, but in1985 it was estimated to range from 650 to 3100 μg for a 70 kg adult, according tointernational studies. However, it is not considered as a micronutrient and does nothave a recommended daily intake. Levels in some drinking waters are estimated toreach 170 μg L-1but no definite limit values are set. Humic substances are omnipresent in soil and freshwaters and is well known to formcomplexes with various cations such as most metals. In plants, the complexation ofcadmium and zinc with humic substances decreases their toxicity. However,currently, no studies have been published regarding if this is valid for animal cells aswell. To investigate if this is the case, in vitro tests were performed on Caco-2 cells,which originate from a colon carcinoma. These cells were exposed to a lithium concentration of 10 μg L-1in a nutrient medium for 2 hours. To a series of thesamples, humic acid was added to give a final concentration of 9.86 μg L-1 in thesolution to investigate if that would influence the lithium uptake. The study also includes a methodological evaluation if the performance of microplasma atomic emission spectroscopy (MP-AES) is suitable for the analyses of heavymatrices, e.g. nutrient medium and 1% Triton X solution. After optimization of instrumental parameters, it was concluded that MP-AES can beused for analysis of heavy and complex matrices. It requires, however, the use ofmatrix matched calibration solutions and addition of caesium as ionization buffer incombination with lithium signal correction using internal standards. It is alsoconcluded that lithium is absorbed by Caco-2 cells and that there was no indicationthat humic acid altered this uptake. / Litium är en viktig komponent in många produkter, bland annat smörjmedel, keramik,litium-jonbatterier och medicin mot bipolär sjukdom. Även fast dagens kunskap omlitium och dess interaktioner med miljö och organismer är begränsad, ökaranvändandet av litium. I människor absorberas litium primärt i tunntarmen genomNa-kanaler. Det dagliga intaget av litium varierar geografiskt och med livsstil och detfinnas inga bestämda gränsvärden. I USA var det dagliga intaget av litium 1985uppskattat att ligga kring 650 till 3100 μg hos en vuxen som väger 70 kg. Humusämnen är väl kända för att bilda komplex med flertalet metaller. I växter hardet påvisats att humusämnen kan bilda komplex med kadmium och zink vilketminskar toxiciteten av dessa för växten. Inga studier har dock hittats gällandehumusämnens eventuella möjligheter att minska toxiciteten av litium, eller andrametaller, hos djur eller människor. För att undersöka detta närmare har denna studiegjorts för att få ökad förståelse kring absorptionen av litium till Caco-2 celler samt föratt se om närvaro av humussyra kan påverka ett eventuellt upptag. Vidare presenteras resultat från en metodologisk utvärdering om MP-AES kananvändas för att kvantifiera litium i tyngre matriser, såsom näringsmedium för celleroch Triton X-100. Resultaten visar att MP-AES kan användas för dessa matriser genom att användamatrismatchade kalibreringslösningar och cesium som jonisationshämmare ikombination med korrigering av litiumsignalen med hjälp av signalen från internstandard. Sammanfattningsvis så absorberar Caco-2 celler litium och ingenindikation på att humusämnen påverkar detta upptag kunde hittas.
76

Side-Channel-Attack Resistant AES Design Based on Finite Field Construction Variation

Shvartsman, Phillip 29 August 2019 (has links)
No description available.
77

Minimal Implementation of a Secure Remote Keyless Encryption Protocol Using CMAC Mode Of AES

Gade, Dinesh Reddy 20 May 2010 (has links)
No description available.
78

Viability and Implementation of a Vector Cryptography Extension for Risc-V

Skelly, Jonathan W 01 June 2022 (has links) (PDF)
RISC-V is an open-source instruction-set architecture (ISA) forming the basis of thousands of commercial and experimental microprocessors. The Scalar Cryptography extension ratified in December 2021 added scalar instructions that target common hashing and encryption algorithms, including SHA2 and AES. The next step forward for the RISC-V ISA in the field of cryptography and digital security is the development of vector cryptography instructions. This thesis examines if it is viable to add vector implementations of existing RISC-V scalar cryptography instructions to the existing vector instruction format, and what improvements they can make to the execution of SHA2 and AES algorithms. Vector cryptography instructions vaeses, vaesesm, vaesds, vaesdsm, vsha256sch, and vsha256hash are proposed to optimize AES encryption and decryption, SHA256 message scheduling, and SHA256 hash rounds, with pseudocode, assembly examples, and a full 32-bit instruction format for each. Both algorithms stand to benefit greatly from vector instructions in reduction of computation time, code length, and instruction memory utilization due to large operand sizes and frequently repeated functions. As a proof of concept for the vector cryptography operations proposed, a full vector-based AES-128 encryption and SHA256 message schedule generation are performed on the 32-bit RISC-V Ibex processor and 128-bit Vicuna Vector Coprocessor in the Vivado simulation environment. Not counting stores or loads for fair comparison, the new Vector Cryptography extension completes a full encryption round in a single instruction compared to sixteen with the scalar extension, and can generate eight SHA256 message schedule double-words in a single instruction compared to the forty necessary on the scalar extension. These represent a 93.75% and 97.5% reduction in required instructions and memory for these functions respectively, at a hardware cost of 19.4% more LUTs and 1.44% more flip-flops on the edited Vicuna processor compared to the original.
79

Advances in the Side-Channel Analysis of Symmetric Cryptography

Taha, Mostafa Mohamed Ibrahim 10 June 2014 (has links)
Side-Channel Analysis (SCA) is an implementation attack where an adversary exploits unintentional outputs of a cryptographic module to reveal secret information. Unintentional outputs, also called side-channel outputs, include power consumption, electromagnetic radiation, execution time, photonic emissions, acoustic waves and many more. The real threat of SCA lies in the ability to mount attacks over small parts of the key and to aggregate information over many different traces. The cryptographic community acknowledges that SCA can break any security module if the adequate protection is not implemented. In this dissertation, we propose several advances in side-channel attacks and countermeasures. We focus on symmetric cryptographic primitives, namely: block-ciphers and hashing functions. In the first part, we focus on improving side-channel attacks. First, we propose a new method to profile highly parallel cryptographic modules. Profiling, in the context of SCA, characterizes the power consumption of a fully-controlled module to extract power signatures. Then, the power signatures are used to attack a similar module. Parallel designs show excessive algorithmic-noise in the power trace. Hence, we propose a novel attack that takes design parallelism into consideration, which results in a more powerful attack. Also, we propose the first comprehensive SCA of the new secure hashing function mbox{SHA-3}. Although the main application of mbox{SHA-3} is hashing, there are other keyed applications including Message Authentication Codes (MACs), where protection against SCA is required. We study the SCA properties of all the operations involved in mbox{SHA-3}. We also study the effect of changing the key-length on the difficulty of mounting attacks. Indeed, changing the key-length changes the attack methodology. Hence, we propose complete attacks against five different case studies, and propose a systematic algorithm to choose an attack methodology based on the key-length. In the second part, we propose different techniques for protection against SCA. Indeed, the threat of SCA can be mitigated if the secret key changes before every execution. Although many contributions, in the domain of leakage resilient cryptography, tried to achieve this goal, the proposed solutions were inefficient and required very high implementation cost. Hence, we highlight a generic framework for efficient leakage resiliency through lightweight key-updating. Then, we propose two complete solutions for protecting AES modes of operation. One uses a dedicated circuit for key-updating, while the other uses the underlying AES block cipher itself. The first one requires small area (for the additional circuit) but achieves negligible performance overhead. The second one has no area overhead but requires small performance overhead. Also, we address the problem of executing all the applications of hashing functions, e.g. the unkeyed application of regular hashing and the keyed application of generating MACs, on the same core. We observe that, running unkeyed application on an SCA-protected core will involve a huge loss of performance (3x to 4x). Hence, we propose a novel SCA-protected core for hashing. Our core has no overhead in unkeyed applications, and negligible overhead in keyed ones. Our research provides a better understanding of side-channel analysis and supports the cryptographic community with lightweight and efficient countermeasures. / Ph. D.
80

Message Authentication Codes On Ultra-Low SWaP Devices

Liao, Che-Hsien 27 May 2022 (has links)
This thesis focuses on specific crypto algorithms, Message Authentication Codes (MACs), running on ultra-low SWaP devices. The type of MACs we used is hash-based message authentication codes (HMAC) and cipher-block-chaining message authentication code (CBC-MAC). The most important thing about ultra-low SWaP devices is their energy usage. This thesis measures different implementations' execution times on ultra-low SWaP devices. We could understand which implementation is suitable for a specific device. In order to understand the crypto algorithm we used, this thesis briefly introduces the concept of hash-based message authentication codes (HMAC) and cipher-block-chaining message authentication code (CBC-MAC) from a high level, including their usage and advantage. The research method is empirical research. This thesis determines the execution times of different implementations. These two algorithms (HMAC and CBC-MAC) contain three implementations. The result comes from those implementations running on the devices we used. / Master of Science / The deployments of 5G cellular networks are now onboard. The demand increased due to consumers and the availability of more affordable devices. The amount of investment in 5G technology and infrastructure increases market interest in IoT. The 5G network security is essential. How to secure user privacy and their sensitive data while they use 5g network has become a big issue and needs to be solved. However, not all popular crypto algorithms are suited to all devices, especially in those resource-limited microcontrollers. In this thesis, we will deal with Message Authentication Codes that provide the data integrity check. With resource limit devices, energy usage is an important issue. We will identify which implementations have better energy usage depending on the device features. This thesis will use three implementations for each algorithm. The result of our experiment provide a straightforward way that helps people understand which implementation can run more efficiently on specific ultra-low devices.

Page generated in 0.0347 seconds