• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 109
  • 35
  • 33
  • 16
  • 10
  • 9
  • 8
  • 6
  • 5
  • 4
  • 3
  • 2
  • 2
  • 1
  • Tagged with
  • 263
  • 48
  • 42
  • 42
  • 40
  • 36
  • 36
  • 33
  • 29
  • 23
  • 22
  • 22
  • 21
  • 18
  • 18
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

High Speed Vlsi Implementation Of The Rijndael Encryption Algorithm

Sever, Refik 01 January 2003 (has links) (PDF)
This thesis study presents a high speed VLSI implementation of the Rijndael Encryption Algorithm, which is selected to be the new Advanced Encryption Standard (AES) Algorithm. Both the encryption and the decryption algorithms of Rijndael are implemented as a single ASIC. Although data size is fixed to 128 bits in the AES, our implementation supports all the data sizes of the original Rijndael Algorithm. The core is optimised for both area and speed. Using 149K gates in a 0.35-&micro / m standard CMOS process, 132 MHz worst-case clock speed is achieved yielding 2.41 Gbit/s non-pipelined throughput in both encryption and decryption. iii The design has a latency of 30 clock periods for key expansion that takes 228 ns for this implementation. A single encryption or decryption of a data block requires at most 44 clock periods. The area of the chip is 12.8 mm2 including the pads. 0.35-&micro / m Standard Cell Libraries of the AMI Semiconductor Company are used in the implementation. The literature survey revealed that this implementation is the fastest published non-pipelined implementation for both encryption and decryption algorithms.
12

Proceso de reestructuración financiera de AES Gener.

Díaz Ortiz, María Eugenia, Riquelme Jorquera, Miguel January 2004
No description available.
13

Efficient Implementation and Power Estimation of Substitute-Box in Advanced Encryption Standard

Kamaraj, Abinaya 20 October 2016 (has links)
No description available.
14

Diseño de tres arquitecturas para un módulo criptográfico AES

Ceminari , Paola Anabella 13 July 2021 (has links)
La seguridad de la información cumple un rol cada vez más importante en la actualidad. Esto motivó al Centro de Micro y Nanoelectrónica del Bicentenario (CMNB) del Instituto Nacional de Tecnología Industrial (INTI) a incorporar a su biblioteca de bloques de Propiedad Intelectual (IP) un módulo criptográfico capaz de ser integrado en cualquier sistema de mayor complejidad en el que se requiera confidencialidad. Dentro de la diversidad de algoritmos criptográficos existentes se decidió implementar AES (Advanced Encryption Standard) por ser ampliamente usado hoy en día y estar libre de licencias o regalías. Cada una de las aplicaciones impone distintos requisitos en el módulo de cifrado. El diseño de un mismo módulo AES que cumpla con los requisitos de todo el rango de aplicaciones posibles no es factible en la práctica. En este trabajo se propone el diseño de tres arquitecturas para un módulo de cifrado en bloques AES, mediante distintas técnicas de diseño de circuitos integrados digitales. Estas arquitecturas se denominan básica, compacta y pipeline, cada una de ellas es destinada a un rango de aplicaciones distinto y su diseño se orienta a la implementación en FPGA. / Information security plays an increasingly important role today. This motivated CMNB to incorporate a cipher module to its IP library, capable of being integrated in a more complex system that needs confidenciality. Within the diversity of existing cryptographic algorithms, AES (Advanced Encryption Standard) was chosen to be implemented, since it is widely used today and is free of licenses or royalties. Each application imposes diferent requirements on the encryption module. Designing a single AES module that meets the requirements of the full range of possible applications is not feasible in practice. In this work, the design of three architectures for an AES block encryption module is proposed, using diferent digital integrated circuit design techniques. These architectures are called basic, compact and pipeline, each one intended for a particular range of applications and their design is oriented towards FPGA implementation.
15

3DES, AES i hårdvara - Förmåga att skala i en växande miljö

Andersson, Tommy, Torkelsson, Mattis, Wärlinge, Gustav January 2010 (has links)
<p>Den här rapporten beskriver arbetet och utförda studier inom området kryptering och VPN. Fokus ligger på hur väl krypteringsalgoritmerna Triple Data Encryption Standard (3DES) och Advanced Encryption Standard (AES) skalar i en förutbestämd miljö. Huvudfokus har varit att svara på frågan: Vilken av krypteringsalgoritmerna AES och 3DES kräver minst systemresurser? Under utbildningstiden har det flera gånger framförts att 3DES-algoritmen skulle vara mer krävande för krypteringsenheterna att utföra jämfört med AES. Denna rapport söker finna om det är så det förhåller sig och i så fall hur stor skillnaden är mellan algoritmerna. För att söka svar på frågorna genomfördes ett flertal experiment. Dessa syftade till att påvisa eller vederlägga ovan beskrivna påståenden kring 3DES och AES. Resultatet av utförda experiment blev att ingen större skillnad kunde noteras mellan 3DES och AES. Detta står i stark kontrast till de påståenden som ofta florerar kring krypteringsalgoritmerna 3DES och AES</p> / <p>This report describes the work and studies carried out in the field of encryption and VPN. The focus is on how well the encryption algorithms Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) perform in a predetermined environment. The main focus has been to answer the question: Which of the encryption algorithms AES and 3DES requires less system resources. During the period  of studies, lectures and literature have several times claimed the 3DES algorithm to require more resources of encryption devices, compared to AES. This report tries to find if it is a fact and if so how big is the difference between the algorithms. To seek  answers to the questions, a number of experiments was performed. These experiments were intended to demonstrate or refute the above claims about 3DES and AES. The results of the performed experiments shows no major differences between 3DES and AES. This differs from what have been publicly accepted concerning facts regarding encryption algorithms 3DES and AES.</p>
16

Studies of reversed phase high performance liquid chromatography (RP-HPLC) stationary phases

Watson, Richard Charles January 1996 (has links)
No description available.
17

Distributed cipher chaining for increased security in password storage

Odelberg, David, Holm, Carl Rasmus January 2014 (has links)
As more services move on to the web and more people use the cloud for storage of important information, it is important that providers of such services can guarantee that information is kept safe. The most common way of protecting that data is to make it impossible to access without being authenticated as the user owning the data. The most common way for a user to authenticate and thereby becoming authorized to access the data, or service, is by making use of a password. The one trying to safeguard that password must make sure that it is not easy to come by for someone trying to attack the system. The most common way to store a password is by first running that password through a one way function, known as a hash function, that obfuscates it into something that does not at all look related to the password itself. Whenever a user tries to authenticate, they type in their password and it goes through the same function and the results are compared. While this model makes sure that the password is not stored in plain text it contains no way of taking action in case the database of hashed passwords is leaked. Knowing that it is nearly impossible to be fully protected from malevolent users, the ones trying to safe guard information always need to try to make sure that it is difficult to extract information about users' passwords. Since the 70s the password storage has to a large extent looked the same. What is researched and implemented in this thesis is a different way of handling passwords, where the main focus is on making sure there are countermeasures in case the database leaks. The model described and implemented consist of software that make use of the current best practices, with the addition of encrypting the passwords with a symmetric cipher. This is all done in a distributed way to move towards a paradigm where a service provider does not need to rely on one point of security. The end result of this work is a working proof-of-concept software that runs in a distributed manner to derive users' passwords to an obfuscated form. The system is at least as secure as best current practice for storing users passwords but introduces the notion of countermeasures once information has found its way into an adversary's hands.
18

Metallutvinning med fokus på zinkfrån avfallsflygaska med hjälp avsura processvatten / Metal mining focusing on zinc from waste fly ash by means of acidic process water

Abed, Samah, Al-Kaisee, Farah January 2016 (has links)
Syftet med projektet är att behandla flygaskan med hjälp av surt processvatten för att utvinna olika metaller, som zink, så att det sedan kan deponeras på ett enklare och billigare sätt, samt även at utveckla en metod för att utvinna mer zink med minsta möjliga andel surt processvatten (5 % HCl). Olika metaller med fokus på zink studerades i labbskala på Högskolan i Borås. Flygaskan och det sura processvattnet som har använts i denna studie är från Renova ABs anläggning. Resultatet visar att vid behandling av flygaskan med surt processvatten var den maximala mängden zink som utvanns 88% under de olika försöken som gjordes i labbet. Det finns olika faktorer bakom resultatet, såsom halten av surt processvatten, pH, blandningstiden och askans elementsammansättning, vilka kan påverka halten utvunnen zink. / Sweden produces large amount of fly ash from waste combustion annually. Combustion the waste generates two types of ashes, bottom ash/slag, and fly ash. Bottom ash is considered to be more environmentally friendly and has a wide area of application such as road constructions on landfills. While the fly ash has high level of heavy metals and for instance dioxines which are harmful for the environment. This type of ash are deposited in a landfill and gets classified as a hazardous waste which is expensive given that the deposit fee is high. The fact that fly ash contains valuable metals as zinc, methods of recovering it are being developed such as acid leaching. This is a promising method as the leachate used are acid process water making the usage of the chemicals substantially lower which makes it financially viable. Waste incinerators in Sweden produce approximately 200 000 tons of fly ash annually and the majority of it is transfered to Norway to get treated and put on a landfill. Some waste management companies, e.g. Renova, are using another method called “the Bamberg method” where fly ash is mixed with sludge to form a cake and put in the company’s own landfill. The projects goal is to leach the fly ash by using acidic process water to obtain the metallic substance particularly zinc making it easier and cheaper to landfill the ash and also to optimize this method to get the most zinc out of the ash using minimum amount of the acidic process water (5% HCI). The laboratory work took place in the University of Borås. Fly ash and the acid process water which were used under the laboratory work was obtained from RenovaAB. The results shows that leaching the fly ash with acidic process water gave different release of zinc but was 88% at most. The variation in the results depends on a few factors such as amount of acidic process water, pH, time, blending time and the ashes content. This project took environment and access to acidic water in consideration, which optimized the method of using less amount of acid process water to get the most zinc as possible. The results shows that leaching fly ash with acid process water is cost efficient and easy way to recover zinc, which satisfy the goals of the project.
19

Diskkrypteringsprestanda i GNU/Linux

Ahlstedt, Sebastian, Granath Karlsson, David January 2013 (has links)
This thesis compares the impact on disk performance in a GNU/Linux  environmentwith three encryption algorithms: AES,  Serpent and Twofish in three different implementations: DM-crypt, Loop-AES and Truecrypt. For all three algorithms a key length of 256 bits is used. The thesis shows that the least performance impact during data encryption, and thus file writing, is reached by using AES or Twofish encryption implemented in DM-crypt or TrueCrypt. The thesis shows that some data operations with a sufficiently low processor utilization barely affects disk performance at all if encrypted using the optimal implementation and algorithm. It is also discovered that the performance impact during data decryption, or file reading, can be minimized by using the most efficient implementation and algorithm. The best results are met with the AES or Twofish cipher, regardless of implementation. An important conclusion that  is  drawn is that it is hard to determine a superior encryption solution for all purposes. However, by reviewing and examining the collected data from all aspects of disk performance the AES implementation in TrueCrypt is, with small marginals, determined to be the most optimal. / Undersökningen jämför hur krypteringsalgoritmerna AES, Serpent och Twofish implementerade i DM-crypt, Loop-AES och TrueCrypt påverkar diskprestandan i en GNU/Linux-miljö. Samtliga krypteringsalgoritmer tillämpas med en nyckellängd på 256 bitar. Undersökningen visar att högst skrivhastighet och således krypteringshastighet uppnås med algoritmerna AES och Twofish i DM-crypt eller Truecrypt. Krypteringens påverkan på diskprestanda är beroende av vilka typer av operationer som utförs och hur hög processorsysselsättningsgraden är. Vid  simplare  I/O-operationer har  den mest optimala  krypteringslösningen knappt någon påverkan på diskprestandan överhuvudtaget. Undersökningen visar också att påverkan av prestanda vid dekryptering är minst vid tillämpning av AES eller Twofish oavsett implementering. En viktig slutsats som dras är att det inte finns en överlägsen krypteringslösning för samtliga användningsområden. Genom att sammanställa och granska insamlad data gällande samtliga aspekter beträffande diskprestanda fastställs TrueCrypts implementation av AES till att vara den mest optimala, trots små marginaler.
20

Krypteringsalgoritmer i OpenCL : AES-256 och ECC ElGamal / Crypthography algorithms in OpenCL : AES-256 and ECC ElGamal

Sjölander, Erik January 2012 (has links)
De senaste åren har grafikkorten genomgått en omvandling från renderingsenheter till att klara av generella beräkningar, likt en vanlig processor. Med hjälp av språk som OpenCL blir grafikkorten kraftfulla enheter som går att använda effektivt vid stora beräkningar. Målet med detta examensarbete var att visa krypteringsalgoritmer som passar bra att accelerera med OpenCL på grafikkort. Ytterligare mål var att visa att programmet inte behöver omfattande omskrivning för att fungera i OpenCL. Två krypteringsalgoritmer portades för att kunna köras på grafikkorten. Den första algoritmen AES-256 testades i två olika implementationer, en 8- samt 32-bitars. Den andra krypteringsalgoritmen som användes var ECC ElGamal. Dessa två är valda för visa att både symmetrisk och öppen nyckelkryptering går att accelerera. Resultatet för AES-256 i ECB mod på GPU blev 7 Gbit/s, en accelerering på 25 gånger jämfört med CPU. För elliptiska kurvor ElGamal blev resultatet en acceleration på 55 gånger för kryptering och 67 gånger för avkryptering. Arbetet visar skalärmultiplikation med kurvan B-163 som tar 65us. Båda implementationerna bygger på dataparallellisering, där dataelementen distribueras över tillgänglig hårdvara. Arbetet är utfört på Syntronic Software Innovations AB i Linköping. / Last years, the graphic cards have become more powerful than ever before. A conversion from pure rendering components to more general purpose computing devices together with languages like OpenCL have created a new division for graphics cards. The goal of this thesis is to show that crypthography algorithms are well suited for acceleration with OpenCL using graphics cards. A second goal was to show that C-code can be easily translated into OpenCL kernel with just a small syntax change. The two algorithms that have been used are AES-256 implemented in 8- and 32-bits variants, and the second algorithm is Elliptic Curve Crypthography with the ElGamal scheme. The algoritms are chosen to both represent fast symmetric and the slower public-key schemes. The results for AES-256 in ECB mode on GPU, ended up with a throughtput of 7Gbit/s which is a acceleration of 25 times compared to a CPU. For Elliptic Curve, a single scalar point multiplication for the B-163 NIST curve is computed on the GPU in 65us. Using this in the ElGamal encryption scheme, an acceleration of 55 and 67 times was gained for encryption and decryption. The work has been made at Syntronic Software Innovations AB in Linköping, Sweden.

Page generated in 0.0424 seconds