• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 1
  • Tagged with
  • 3
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware

Gustafsson, Alex, Stensson, Carl January 2021 (has links)
Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. Post-quantum algorithms are therefore being developed to mitigate this issue. The National Institute of Standards and Technology (NIST) has started a standardization process for these algorithms. Objectives. In this work, we analyze what specialized features applicable for post-quantum algorithms are available in the mainframe architecture IBM Z. Furthermore, we study the performance of these algorithms on various hardware in order to understand what techniques may increase their performance. Methods. We apply a literature study to identify the performance characteristics of post-quantum algorithms as well as what features of IBM Z may accommodate and accelerate these. We further apply an experimental study to analyze the practical performance of the two prominent finalists NTRU and Classic McEliece on consumer, cloud and mainframe hardware. Results. IBM Z was found to be able to accelerate several key symmetric primitives such as SHA-3 and AES via the Central Processor Assist for Cryptographic Functions (CPACF). Though the available Hardware Security Modules (HSMs) did not support any of the studied algorithms, they were found to be able to accelerate them via a Field-Programmable Gate Array (FPGA). Based on our experimental study, we found that computers with support for the Advanced Vector Extensions (AVX) were able to significantly accelerate the execution of post-quantum algorithms. Lastly, we identified that vector extensions, Application-Specific Integrated Circuits (ASICs) and FPGAs are key techniques for accelerating these algorithms. Conclusions. When considering the readiness of hardware for the transition to post-quantum algorithms, we find that the proposed algorithms do not perform nearly as well as classical algorithms. Though the algorithms are likely to improve until the post-quantum transition occurs, improved hardware support via faster vector instructions, increased cache sizes and the addition of polynomial instructions may significantly help reduce the impact of the transition. / Bakgrund. Människor använder internet för bland annat kommunikation, arbete och bankärenden. Asymmetrisk kryptering möjliggör att detta sker säkert genom att erbjuda sekretess och tillit online. Även om dessa algoritmer förväntas vara säkra från attacker med klassiska datorer, riskerar framtida kvantdatorer att knäcka dem med Shors algoritm. Därför utvecklas kvantsäkra krypton för att mitigera detta problem. National Institute of Standards and Technology (NIST) har påbörjat en standardiseringsprocess för dessa algoritmer. Syfte. I detta arbete analyserar vi vilka specialiserade funktioner för kvantsäkra algoritmer som finns i stordator-arkitekturen IBM Z. Vidare studerar vi prestandan av dessa algoritmer på olika hårdvara för att förstå vilka tekniker som kan öka deras prestanda. Metod. Vi utför en litteraturstudie för att identifiera vad som är karaktäristiskt för kvantsäkra algoritmers prestanda samt vilka funktioner i IBM Z som kan möta och accelerera dessa. Vidare applicerar vi en experimentell studie för att analysera den praktiska prestandan av de två framträdande finalisterna NTRU och Classic McEliece på konsument-, moln- och stordatormiljöer. Resultat. Vi fann att IBM Z kunde accelerera flera centrala symmetriska primitiver så som SHA-3 och AES via en hjälpprocessor för kryptografiska funktioner (CPACF). Även om befintliga hårdvarusäkerhetsmoduler inte stödde några av de undersökta algoritmerna, fann vi att de kan accelerera dem via en på-plats-programmerbar grind-matris (FPGA). Baserat på vår experimentella studie, fann vi att datorer med stöd för avancerade vektorfunktioner (AVX) möjlggjorde en signifikant acceleration av kvantsäkra algoritmer. Slutligen identifierade vi att vektorfunktioner, applikationsspecifika integrerade kretsar (ASICs) och FPGAs är centrala tekniker som kan nyttjas för att accelerera dessa algortmer. Slutsatser. Gällande beredskapen hos hårdvara för en övergång till kvantsäkra krypton, finner vi att de föreslagna algoritmerna inte presterar närmelsevis lika bra som klassiska algoritmer. Trots att det är sannolikt att de kvantsäkra kryptona fortsatt förbättras innan övergången sker, kan förbättrat hårdvarustöd för snabbare vektorfunktioner, ökade cachestorlekar och tillägget av polynomoperationer signifikant bidra till att minska påverkan av övergången till kvantsäkra krypton.
2

Multiparty adversarial neural cryptography with symmetric and asymmetric encryption

Ju, Tianpeng January 2021 (has links)
Deep learning has shown excellent performance in image recognition, speech recognition, natural language processing and other fields over the recent decades. Cryptography is a technical science that studies the preparation and decoding of ciphers. With the development of artificial intelligence, people pay more and more attention to whether artificial intelligence can be applied to cryptography. A Google team designed a multiagent system a few years ago, which includes encrypting neural network, cracking network and eavesdropping network. Based on symmetric encryption, through deep learning training, the system achieves that the cracker can crack the encrypted text with minimal error and prevent the eavesdropper from cracking the plaintext. This research has aroused the interest of many scholars. Based on the research of the system, this thesis discusses the basic principle and related experiments of the system, as well as the design based on asymmetric encryption and the application in multiparty systems. / Djupinlärning har visat utmärkta resultat inom bildigenkännande, taligenkänning, naturligt språkbehandling och andra områden under de senaste årtiondena. Kryptografi är en teknisk vetenskap som studerar beredning och avkodning av chiffer. I och med utvecklingen av artificiell intelligens lägger människor allt större vikt vid huruvida artificiell intelligens kan användas för kryptografi. Ett Googleteam designade ett multiagent system för några år sedan, vilket inkluderar kryptering av neuralt nätverk, sprickbildning av nätverk och avlyssning. På grundval av symmetrisk kryptering, genom djup inlärning, uppnår systemet att dekrypteraren kan avkoda den krypterade texten med minimala fel och förhindra att tjuvlyssnaren gör detsamma. Denna forskning har väckt intresse hos många forskare. På grundval av systemets forskning diskuteras i denna tes den grundläggande principen och relaterade experiment med systemet, liksom den konstruktion som bygger på asymmetrisk kryptering och tillämpningen i flerpartssystem.
3

Från bläck till klick – en modernisering av ärvdabalkens formkrav? Särskilt om elektronisk underskrift kan förstärka skyddet av testators vilja / A modernized Inheritance Code with electronic signatures?

Le, Lilian January 2024 (has links)
This master thesis examines the interpretation of formal requirements when establishing a will according to the Inheritance Code. Chapter 10, paragraph 1 contains the main formal requirements for an ordinary will. The formal requirements are based on principles to preserve the testator’s intent. According to the legislator, the testator’s intent should be considered and preserved to the greatest extent possible, if the testator has established a valid will before deceasing. To gain validity, the will must contain a declaration and the testator’s signature in writing. The signature must also be signed or declared in front of two witnesses. However, the law does not specify any requirements of personal signatures, or if the signature needs to be written by a pen. This opens for a discussion if wills can be signed with electronic signatures. Additionally, the law does not protect a valid will from disappearing since the formal requirements do not require any formal registration that a will exist. Hence, there is a lack of regulation and interoperation of the formal requirements. The purpose of this thesis is to examine if the formal requirements fulfill their essential purposes of the protection of a testator’s intent and if the protection can be enhanced with electronic signatures.  The results of the research are as follows: Chapter 10, paragraph 1 does not explicitly prohibit electronic signature, although a personal signature is customary. Advanced electronic signatures, based on EU regulations and the interpretation of Swedish legislation and case law, should not be denied legal effect unless there is a specific national law that requires a personal signature. Although there is no explicit law that prohibits an electronic signature on ordinary wills, the legislator has not commented on this. There is a substantial need for guidance by the legislator on this issue, and guidance whether a copy of a will is equally valid as the original document.  In conclusion, the Inheritance Code does not require a personal signature for a valid ordinary will. Protection of the testator’s intent can be enhanced with an electronic registration of the will; however, this requires that the will can be established in an electronic way. Hence, the signature must be an electronic signature. The formal requirements should not extend to a mandatory registration of the will, but the registration should be voluntary.

Page generated in 0.1698 seconds