• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • Tagged with
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Namecoin as authentication for public-key cryptography / Namecoin som autentisering för asymmetrisk kryptering

Melin, Tomas, Vidhall, Tomas January 2014 (has links)
Public-key cryptography is a subject that is very important to everyone who wants confidentiality and privacy in networks. It is important to understand how public-key cryptography systems work and what flaws they have. In the first part of this report we describe some of the most common encryption schemes and key agreements. We carefully investigate their flaws, if they are broken and what threats have dire consequences. We find that the biggest issue is authentication and we present current solutions to the problem. The current solutions are flawed because they rely too much on trusting different entities. It is only required that one trusted entity becomes malicious for the entire authentication system to be compromised. Because of this we propose an alternative system in the second part, Namecoin. A risk analysis in form of an attack tree is performed on the Namecoin system, where we describe how the attacks are executed and what you can do to prevent them. We present different threats against the system and we describe how dire the consequences are and the probability of their execution. Since Namecoin is an implementation of the block chain algorithm we have also explained how the block chain works in detail. We present why we think that Namecoin is a system that should replace the currently used certificate authority system. The certificate authority system is flawed because it is centralized and dependant on that no authority makes any mistakes. The Namecoin system does not become compromised unless more than 50 % of the hashrate in the system is used with malicious intent. We have concluded that the biggest threats against Namecoin have such a low probability that they can be neglected.
2

Svensk e-legitimation; alla ägg i samma korg?

Ställvik, Emil, Bentell, Morgan January 2016 (has links)
A case study has been conducted on an electronic identification service called “Svensk e-legitimation”. The service has been developed on behalf of the Swedish government and is provided by a board created in 2011, E-legitimationsnämnden. The service, whose purpose is to assist with identification at Swedish authorities, also increases the competitiveness between the issuers of e-ID. By reviewing the documents published on websites regarding the service a risk area has been identified. To demonstrate the importance of addressing the risks four attack scenarios were created, scenarios which potential attackers might use. Finally, a solution which aims to secure the identified risks is presented. / En fallstudie har utförts på den elektroniska legitimeringstjänsten Svensk e-legitimation vilken tillhandahålls av E-legitimationsnämnden på uppdrag av Sveriges riksdag. Tjänsten, vars syfte är att bistå med legitimeringsmöjligheter för svenska myndigheter, ökar dessutom konkurrenskraften mellan utfärdare av e-legitimation. Genom att granska dokument publicerade på hemsidor för tjänsten har en hotbild identifierats. För att demonstrera vikten av att åtgärda riskerna inom hotbilden framställdes fyra angreppsscenarion vilka potentiella angripare skulle kunna använda. Slutligen presenterades en lösning vilken ämnar säkerställa de risker som identifierats.

Page generated in 0.0364 seconds