• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 194
  • 19
  • 14
  • 7
  • 4
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 284
  • 284
  • 258
  • 254
  • 140
  • 103
  • 54
  • 47
  • 43
  • 39
  • 36
  • 31
  • 30
  • 29
  • 26
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

Efficient Elliptic Curve Processor Architectures for Field Programmable Logic

Orlando, Gerardo 27 March 2002 (has links)
Elliptic curve cryptosystems offer security comparable to that of traditional asymmetric cryptosystems, such as those based on the RSA encryption and digital signature algorithms, with smaller keys and computationally more efficient algorithms. The ability to use smaller keys and computationally more efficient algorithms than traditional asymmetric cryptographic algorithms are two of the main reasons why elliptic curve cryptography has become popular. As the popularity of elliptic curve cryptography increases, the need for efficient hardware solutions that accelerate the computation of elliptic curve point multiplications also increases. This dissertation introduces elliptic curve processor architectures suitable for the computation of point multiplications for curves defined over fields GF(2^m) and curves defined over fields GF(p). Each of the processor architectures presented here allows designers to tailor the performance and hardware requirements according to their performance and cost goals. Moreover, these architectures are well suited for implementation in modern field programmable gate arrays (FPGAs). This point was proved with prototyped implementations. The fastest prototyped GF(2^m) processor can compute an arbitrary point multiplication for curves defined over fields GF(2^167) in 0.21 milliseconds and the prototyped processor for the field GF(2^192-2^64-1) is capable of computing a point multiplication in about 3.6 milliseconds. The most critical component of an elliptic curve processor is its arithmetic unit. A typical arithmetic unit includes an adder/subtractor, a multiplier, and possibly a squarer. Some of the architectures presented in this work are based on multiplier and squarer architectures developed as part of the work presented in this dissertation. The GF(2^m) least significant bit super-serial multiplier architecture, the GF(2^m) most significant bit super-serial multiplier architecture, and a new GF(p) Montgomery multiplier architecture were developed as part of this work together with a new squaring architecture for GF(2^m).
142

Secure Computation Towards Practical Applications

Krell Loy, Fernando January 2016 (has links)
Secure multi-party computation (MPC) is a central area of research in cryptography. Its goal is to allow a set of players to jointly compute a function on their inputs while protecting and preserving the privacy of each player's input. Motivated by the huge growth of data available and the rise of global privacy concerns of entities using this data, we study the feasibility of using secure computation techniques on large scale data sets to address these concerns. An important limitation of generic secure computation protocols is that they require at least linear time complexity. This seems to rule out applications involving big amounts of data. On the other hand, specific applications may have particular properties that allow for ad-hoc secure protocols overcoming the linear time barrier. In addition, in some settings the full level of security guaranteed by MPC protocols may not be required, and some controlled amount of privacy leakage can be acceptable. Towards this end, we first take a theoretical point of view, and study whether sublinear time RAM programs can be computed securely with sublinear time complexity in the two party setting. We then take a more practical approach, and study the specific scenario of private database querying, where both the server's data and the client's query need to be protected. In this last setting we provide two private database management systems achieving different levels of efficiency, functionality, and security. These three results provide an overview of this three-dimensional trade-off space. For the above systems, we describe formal security definitions and stablish mathematical proofs of security. We also take a practical approach roviding an implementation of the systems and experimental analysis of their efficiency.
143

Understanding Flaws in the Deployment and Implementation of Web Encryption

Sivakorn, Suphannee January 2018 (has links)
In recent years, the web has switched from using the unencrypted HTTP protocol to using encrypted communications. Primarily, this resulted in increasing deployment of TLS to mitigate information leakage over the network. This development has led many web service operators to mistakenly think that migrating from HTTP to HTTPS will magically protect them from information leakage without any additional effort on their end to guar- antee the desired security properties. In reality, despite the fact that there exists enough infrastructure in place and the protocols have been “tested” (by virtue of being in wide, but not ubiquitous, use for many years), deploying HTTPS is a highly challenging task due to the technical complexity of its underlying protocols (i.e., HTTP, TLS) as well as the complexity of the TLS certificate ecosystem and this of popular client applications such as web browsers. For example, we found that many websites still avoid ubiquitous encryption and force only critical functionality and sensitive data access over encrypted connections while allowing more innocuous functionality to be accessed over HTTP. In practice, this approach is prone to flaws that can expose sensitive information or functionality to third parties. Thus, it is crucial for developers to verify the correctness of their deployments and implementations. In this dissertation, in an effort to improve users’ privacy, we highlight semantic flaws in the implementations of both web servers and clients, caused by the improper deployment of web encryption protocols. First, we conduct an in-depth assessment of major websites and explore what functionality and information is exposed to attackers that have hijacked a user’s HTTP cookies. We identify a recurring pattern across websites with partially de- ployed HTTPS, namely, that service personalization inadvertently results in the exposure of private information. The separation of functionality across multiple cookies with different scopes and inter-dependencies further complicates matters, as imprecise access control renders restricted account functionality accessible to non-secure cookies. Our cookie hijacking study reveals a number of severe flaws; for example, attackers can obtain the user’s saved address and visited websites from e.g., Google, Bing, and Yahoo allow attackers to extract the contact list and send emails from the user’s account. To estimate the extent of the threat, we run measurements on a university public wireless network for a period of 30 days and detect over 282K accounts exposing the cookies required for our hijacking attacks. Next, we explore and study security mechanisms purposed to eliminate this problem by enforcing encryption such as HSTS and HTTPS Everywhere. We evaluate each mechanism in terms of its adoption and effectiveness. We find that all mechanisms suffer from implementation flaws or deployment issues and argue that, as long as servers continue to not support ubiquitous encryption across their entire domain, no mechanism can effectively protect users from cookie hijacking and information leakage. Finally, as the security guarantees of TLS (in turn HTTPS), are critically dependent on the correct validation of X.509 server certificates, we study hostname verification, a critical component in the certificate validation process. We develop HVLearn, a novel testing framework to verify the correctness of hostname verification implementations and use HVLearn to analyze a number of popular TLS libraries and applications. To this end, we found 8 unique violations of the RFC specifications. Several of these violations are critical and can render the affected implementations vulnerable to man-in-the-middle attacks.
144

An algebraic attack on block ciphers

Unknown Date (has links)
The aim of this work is to investigate an algebraic attack on block ciphers called Multiple Right Hand Sides (MRHS). MRHS models a block cipher as a system of n matrix equations Si := Aix = [Li], where each Li can be expressed as a set of its columns bi1, . . . , bisi . The set of solutions Ti of Si is dened as the union of the solutions of Aix = bij , and the set of solutions of the system S1, . . . , Sn is dened as the intersection of T1, . . . , Tn. Our main contribution is a hardware platform which implements a particular algorithm that solves MRHS systems (and hence block ciphers). The case is made that the platform performs several thousand orders of magnitude faster than software, it costs less than US$1,000,000, and that actual times of block cipher breakage can be calculated once it is known how the corresponding software behaves. Options in MRHS are also explored with a view to increase its efficiency. / by Kenneth Matheis. / Thesis (M.S.C.S.)--Florida Atlantic University, 2010. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2010. Mode of access: World Wide Web.
145

Quantum cryptography and applications in the optical fiber network. / CUHK electronic theses & dissertations collection / Digital dissertation consortium

January 2005 (has links)
In this thesis research, a novel scheme to implement quantum key distribution based on multiphoton entanglement with a new protocol is proposed. Its advantages are: a larger information capacity can be obtained with a longer transmission distance and the detection of multiple photons is easier than that of a single photon. The security and attacks pertaining to such a system are also studied. / Lastly, a quantum random number generator based on quantum optics has been experimentally demonstrated. This device is a key component for quantum key distribution as it can create truly random numbers, which is an essential requirement to perform quantum key distribution. This new generator is composed of a single optical fiber coupler with fiber pigtails, which can be easily used in optical fiber communications. / Next, a quantum key distribution over wavelength division multiplexed (WDM) optical fiber networks is realized. Quantum key distribution in networks is a long-standing problem for practical applications. Here we combine quantum cryptography and WDM to solve this problem because WDM technology is universally deployed in the current and next generation fiber networks. The ultimate target is to deploy quantum key distribution over commercial networks. The problems arising from the networks are also studied in this part. / Quantum cryptography, as part of quantum information and communications, can provide absolute security for information transmission because it is established on the fundamental laws of quantum theory, such as the principle of uncertainty, No-cloning theorem and quantum entanglement. / Then quantum key distribution in multi-access networks using wavelength routing technology is investigated in this research. For the first time, quantum cryptography for multiple individually targeted users has been successfully implemented in sharp contrast to that using the indiscriminating broadcasting structure. It overcomes the shortcoming that every user in the network can acquire the quantum key signals intended to be exchanged between only two users. Furthermore, a more efficient scheme of quantum key distribution is adopted, hence resulting in a higher key rate. / Luo, Yuhui. / "January 2005." / Adviser: K. T. Chan. / Source: Dissertation Abstracts International, Volume: 67-01, Section: B, page: 0338. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2005. / Includes bibliographical references. / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. Ann Arbor, MI : ProQuest Information and Learning Company, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts in English and Chinese. / School code: 1307.
146

Asymmetric reversible parametric sequences approach to design a multi-key secure multimedia proxy: theory, design and implementation.

January 2003 (has links)
Yeung Siu Fung. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. / Includes bibliographical references (leaves 52-53). / Abstracts in English and Chinese. / Abstract --- p.ii / Acknowledgement --- p.v / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Multi-Key Encryption Theory --- p.7 / Chapter 2.1 --- Reversible Parametric Sequence --- p.7 / Chapter 2.2 --- Implementation of ARPSf --- p.11 / Chapter 3 --- Multimedia Proxy: Architectures and Protocols --- p.16 / Chapter 3.1 --- Operations to Request and Cache Data from the Server --- p.16 / Chapter 3.2 --- Operations to Request Cached Data from the Multimedia Proxy --- p.18 / Chapter 3.3 --- Encryption Configuration Parameters (ECP) --- p.19 / Chapter 4 --- Extension to multi-level proxy --- p.24 / Chapter 5 --- Secure Multimedia Library (SML) --- p.27 / Chapter 5.1 --- Proxy Pre-fetches and Caches Data --- p.27 / Chapter 5.2 --- Client Requests Cached Data From the Proxy --- p.29 / Chapter 6 --- Implementation Results --- p.31 / Chapter 7 --- Related Work --- p.40 / Chapter 8 --- Conclusion --- p.42 / Chapter A --- Function Prototypes of Secure Multimedia Library (SML) --- p.44 / Chapter A.1 --- CONNECTION AND AUTHENTICATION --- p.44 / Chapter A.1.1 --- Create SML Session --- p.44 / Chapter A.1.2 --- Public Key Manipulation --- p.44 / Chapter A.1.3 --- Authentication --- p.45 / Chapter A.1.4 --- Connect and Accept --- p.46 / Chapter A.1.5 --- Close Connection --- p.47 / Chapter A.2 --- SECURE DATA TRANSMISSION --- p.47 / Chapter A.2.1 --- Asymmetric Reversible Parametric Sequence and En- cryption Configuration Parameters --- p.47 / Chapter A.2.2 --- Bulk Data Encryption and Decryption --- p.48 / Chapter A.2.3 --- Entire Data Encryption and Decryption --- p.49 / Chapter A.3 --- Secure Proxy Architecture --- p.49 / Chapter A.3.1 --- Proxy-Server Connection --- p.49 / Chapter A.3.2 --- ARPS and ECP --- p.49 / Chapter A.3.3 --- Initial Sever Encryption --- p.50 / Chapter A.3.4 --- Proxy Re-Encryption --- p.51 / Chapter A.3.5 --- Client Decryption --- p.51 / Bibliography --- p.52
147

AnÃlise e resultados experimentais de sistemas de distribuiÃÃo quÃntica de chaves usando fÃtons isolados e estados coerentes mesoscÃpicos. / Theorical analysis and experimental results of quantum key distribution systems using single-photons and mesoscopic coherent states

FÃbio Alencar MendonÃa 13 September 2006 (has links)
FundaÃÃo de Amparo à Pesquisa do Estado do Cearà / Nesta dissertaÃÃo à realizado um estudo da polarizaÃÃo da luz e suas aplicaÃÃes em sistemas de comunicaÃÃes quÃnticas. Inicialmente, sÃo apresentadas as ferramentas matemÃticas necessÃrias ao tratamento da polarizaÃÃo da luz de fÃtons isolados e estados coerentes: matriz coerÃncia, parÃmetro de Stokes e grau de polarizaÃÃo. Em seguida à apresentada, atravÃs de simulaÃÃo numÃrica, a dinÃmica do grau de polarizaÃÃo da luz de um fÃton durante a propagaÃÃo em um canal despolarizador. Por fim, o resultado de um experimento usando estados coerentes, objetivando medir o grau de polarizaÃÃo da luz apÃs propagaÃÃo em um trecho de 200 m de fibra, à apresentado. O experimento à Ãtil para a determinaÃÃo do parÃmetro do modelo de canal despolarizador de qubits. Sendo a polarizaÃÃo da luz uma propriedade facilmente alterada por condiÃÃes ambientais, sÃo estudados os esquemas Ãpticos que, dentro de certas restriÃÃes, podem corrigir variaÃÃes aleatÃrias da polarizaÃÃo da luz durante a propagaÃÃo na fibra. Tais esquemas sÃo empregados como corretores de erros em sistemas de comunicaÃÃes quÃnticas. Baseados em esquemas de correÃÃo encontrados na literatura, foram propostos dois novos esquemas, um para a utilizaÃÃo em sistemas que empregam polarizaÃÃo de luz de fÃtons isolados e outro para sistemas que empregam polarizaÃÃo de estados coerentes bimodais, sendo o primeiro ativo, isto Ã, requer um protocolo de controle e sincronismo, e o segundo passivo. Por fim, à feita a anÃlise da seguranÃa de um sistema de distribuiÃÃo quÃntica de chaves, empregando o esquema proposto de correÃÃo de erros, quando o mesmo sofre o ataque de Fuchs-Peres-Brandt. à mostrado que a utilizaÃÃo do esquema de correÃÃo de erros proposto favorece a visibilidade da presenÃa de um espiÃo monitorando o canal quÃntico. / In this dissertation it is realized a study about quantum key distribution (QKD) in optical networks. Initially, a review of the theory of quantum key distribution and some of its implementations with strongly attenuated coherent states, as well a review of an optical system for physical encryptation using mesoscopic coherent states are realized. Following, it is analyzed the use of an error correction scheme in the physical encryptation system, and two new schemes for quantum key distribution are proposed. The first is a possible implementation of a hybrid system, that is, using weak and mesoscopic coherent states, for QKD and quantum authentication of classical messages. The second is an implementation of a QKD system based on relative phase modulation of sidebands frequency, using two RF carriers and an amplitude modulator in Alice and a phase modulator in Bob. After, an experimental realization of a simple QKD setup using polarization states of strongly attenuated coherent states for B92 protocol is presented. At last, it is realized an experimental characterization of an optical receiver for optical communication applications.
148

CorreÃÃo de erro em sistemas de comunicaÃÃo quÃntica utilizando polarizaÃÃo de estados coerentes e fÃtons isolados / Error correction in quantum communication system using polarization of coherent states and single-photons

Josà ClÃudio do Nascimento 14 September 2006 (has links)
Nesta dissertaÃÃo à realizado um estudo da polarizaÃÃo da luz e suas aplicaÃÃes em sistemas de comunicaÃÃes quÃnticas. Inicialmente, sÃo apresentadas as ferramentas matemÃticas necessÃrias ao tratamento da polarizaÃÃo da luz de fÃtons isolados e estados coerentes: matriz coerÃncia, parÃmetro de Stokes e grau de polarizaÃÃo. Em seguida à apresentada, atravÃs de simulaÃÃo numÃrica, a dinÃmica do grau de polarizaÃÃo da luz de um fÃton durante a propagaÃÃo em um canal despolarizador. Por fim, o resultado de um experimento usando estados coerentes, objetivando medir o grau de polarizaÃÃo da luz apÃs propagaÃÃo em um trecho de 200 m de fibra, à apresentado. O experimento à Ãtil para a determinaÃÃo do parÃmetro do modelo de canal despolarizador de qubits. Sendo a polarizaÃÃo da luz uma propriedade facilmente alterada por condiÃÃes ambientais, sÃo estudados os esquemas Ãpticos que, dentro de certas restriÃÃes, podem corrigir variaÃÃes aleatÃrias da polarizaÃÃo da luz durante a propagaÃÃo na fibra. Tais esquemas sÃo empregados como corretores de erros em sistemas de comunicaÃÃes quÃnticas. Baseados em esquemas de correÃÃo encontrados na literatura, foram propostos dois novos esquemas, um para a utilizaÃÃo em sistemas que empregam polarizaÃÃo de luz de fÃtons isolados e outro para sistemas que empregam polarizaÃÃo de estados coerentes bimodais, sendo o primeiro ativo, isto Ã, requer um protocolo de controle e sincronismo, e o segundo passivo. Por fim, à feita a anÃlise da seguranÃa de um sistema de distribuiÃÃo quÃntica de chaves, empregando o esquema proposto de correÃÃo de erros, quando o mesmo sofre o ataque de Fuchs-Peres-Brandt. à mostrado que a utilizaÃÃo do esquema de correÃÃo de erros proposto favorece a visibilidade da presenÃa de um espiÃo monitorando o canal quÃntico. / In this dissertation, it is realized a study of light polarization and its applications in quantum communications. Initially, the mathematical tools needed for single-photon and coherent states polarization analyses are presented: coherence matrix, Stokes parameters and polarization degree. Following, using numerical simulations, it is presented the variation of the degree of polarization of a single-photon pulse during depolarizing channel propagation. At last, the result of an experiment using coherent states, aiming to measure the degree of polarization after propagation in 200 m optical fiber is presented. The experiment is useful for determination of the parameter of the qubit depolarizing channel model. Since light polarization is easily changed when environment fluctuations are present during fiber propagation, optical schemes able to correct unpredictable polarization changes are studied. Such schemes are employed for error correction in quantum communication systems. Based on already proposed error correction schemes, two new schemes are proposed, one for systems that employs polarization of singlephoton light, and other for systems that employs polarization of two-mode coherent states, being the first active, that is, requiring a control and synchronism protocol, while the second is passive. At last, it is realized a security analysis of a quantum key distribution system, employing the proposed error correction scheme, when the same is under Fuch-Peres-Brandt attack. It is shown that using the proposed error correction scheme the presence of an eavesdropper monitoring the quantum channel is more visible.
149

Privacy preserving in serial data and social network publishing.

January 2010 (has links)
Liu, Jia. / "August 2010." / Thesis (M.Phil.)--Chinese University of Hong Kong, 2010. / Includes bibliographical references (p. 69-72). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Related Work --- p.3 / Chapter 3 --- Privacy Preserving Network Publication against Structural Attacks --- p.5 / Chapter 3.1 --- Background and Motivation --- p.5 / Chapter 3.1.1 --- Adversary knowledge --- p.6 / Chapter 3.1.2 --- Targets of Protection --- p.7 / Chapter 3.1.3 --- Challenges and Contributions --- p.10 / Chapter 3.2 --- Preliminaries and Problem Definition --- p.11 / Chapter 3.3 --- Solution:K-Isomorphism --- p.15 / Chapter 3.4 --- Algorithm --- p.18 / Chapter 3.4.1 --- Refined Algorithm --- p.21 / Chapter 3.4.2 --- Locating Vertex Disjoint Embeddings --- p.30 / Chapter 3.4.3 --- Dynamic Releases --- p.32 / Chapter 3.5 --- Experimental Evaluation --- p.34 / Chapter 3.5.1 --- Datasets --- p.34 / Chapter 3.5.2 --- Data Structure of K-Isomorphism --- p.37 / Chapter 3.5.3 --- Data Utilities and Runtime --- p.42 / Chapter 3.5.4 --- Dynamic Releases --- p.47 / Chapter 3.6 --- Conclusions --- p.47 / Chapter 4 --- Global Privacy Guarantee in Serial Data Publishing --- p.49 / Chapter 4.1 --- Background and Motivation --- p.49 / Chapter 4.2 --- Problem Definition --- p.54 / Chapter 4.3 --- Breach Probability Analysis --- p.57 / Chapter 4.4 --- Anonymization --- p.58 / Chapter 4.4.1 --- AG size Ratio --- p.58 / Chapter 4.4.2 --- Constant-Ratio Strategy --- p.59 / Chapter 4.4.3 --- Geometric Strategy --- p.61 / Chapter 4.5 --- Experiment --- p.62 / Chapter 4.5.1 --- Dataset --- p.62 / Chapter 4.5.2 --- Anonymization --- p.63 / Chapter 4.5.3 --- Evaluation --- p.64 / Chapter 4.6 --- Conclusion --- p.68 / Bibliography --- p.69
150

APPLICATION OF BLOCKCHAIN NETWORK FOR THE USE OF INFORMATION SHARING

Unknown Date (has links)
The Blockchain concept was originally developed to provide security in the Bitcoin cryptocurrency network, where trust is achieved through the provision of an agreed-upon and immutable record of transactions between parties. The use of a Blockchain as a secure, publicly distributed ledger is applicable to fields beyond finance, and is an emerging area of research across many other fields in the industry. This thesis considers the feasibility of using a Blockchain to facilitate secured information sharing between parties, where a lack of trust and absence of central control are common characteristics. Implementation of a Blockchain Information Sharing system will be designed on an existing Blockchain network with as a communicative party members sharing secured information. The benefits and risks associated with using a public Blockchain for information sharing will also be discussed. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2019. / FAU Electronic Theses and Dissertations Collection

Page generated in 0.104 seconds