Sök:

Sökresultat:

8672 Uppsatser om McEliece\'s cryptography system - Sida 1 av 579

Reed-Solomon-koder i ett McElieceskryptosystem : En kodteoretisk genomgång

Detta arbete är ett examensarbete i matematik på kandidatnivå vid Växjö universitet. Det är en studie av kodningsteori i allmänhet med fokusering på cykliska koder och Reed-Solomon-koder i synnerhet. Reed-Solomon-koderna används för att skapa McElieces kryptosystem. En kortfattad analys av McElieces kryptosystems säkerhet görs tillsammans med en genomgång av kända sätt att forcera denna typ av kryptosystem. Här visar det sig att användning av Reed-Solomon-kod försvagar kryptosystemet i förhållande till om den ursprungligt föreslagna Goppa-koden används.

Chinese Remainder Theorem

Chinese Remainder Theorem is used to solving problems in computing, coding and cryptography. In computing we can compute with shorter numbers instead of large numbers and this will make the computing-process faster and easier. In coding it can be used for error-searching and error-regulating.Cryptography means that we can send a coded message and that no one will be able to read it without the decode-key which is based on prim-numbers. I am writing about the history of mathematics and how the number- and decimal number-system is used in Babylon, Egypt, Greece and in China. Abacus was a very important aid to calculate advanced mathematical problems.

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

Rekommendationer för införande av public key infrastructure

The use of insecure networks -such as the Internet- to send and receive information has made the need for preventing unauthorised people reading it yet more important. One of the easiest way to do this is through public key cryptography. However, the problem with this solution is how to tie a specific public key to a certain subject. This is solved by letting a trusted third party issue a certificate that holds, as a minimum, the name of the subject and the subject's public key along with the issuer's digital signature on the information. The rules we make for issuing, revoking and verifying of certificates and the entities that are being used to do so are called PKI - Public Key Infrastructure.

Kryptografi och kryptering

This work is about cryptography in general but also how the encryption works, and what's needed for encryption to work. I will also take up a little around the history around the encryption..

Dolt i det öppna

Communication is a part of everyday life. The more sensitive information we handle, the more interesting the question around security of your information becomes. There are two ways of handling security around the information you want to communicate, either you control the means by which you are communicating. Or you control the way you communicate, making you able to use existing communication channels. Existing methods within cryptography enables two parties to communicate information securely.

Gage R&R studie på mätutrustning för förpackningsavstånd

The aim of the thesis is to analyse and understand resolution, repeatability and reproducibility of the measurement system for package distance. The measurement system for package distance is already in use, no Gage R&R has been performed on the system and before spreading use of the system the quality of the system has to be understood and approved.

System Monitor : Ett felsökningssystem för Paperline

When an error occurs in an IT system that is vital for the production of a major industry, the consequences can be great. To quickly identify and correct errors is important as a stop in a system can lead to a break in production, which is costly for the industry. Our task in this thesis has been to develop a system for ÅF that facilitates the debugging process of the system Paperline. The system's target audience is ÅF-call personnel that provides support for Paperline 24 hours a day if something goes wrong. The system consists of a Windows service, a database and a web application and is developed mainly with the techniques C#.NET, MVC 5, Google Charts, Javascript, HTML, CSS, and Entity Framework.

Tolkningen av L-system i realtid på grafikkortet

Arbetet undersöker grafikkortets lämplighet att tolka L-system i realtid. L-system är ett strängomskrivningssystem som beskriver strukturen hos botaniska former. Lsystem tolkas med hjälp av sköldpaddstolkningen för att få en geometrisk tolkning. För att utvärdera om grafikkortet är lämpat att tolka L-system i realtid har två system implementerats. Det ena systemet tolkar L-system på processorn och det andra systemet tolkar L-system på grafikkortet.

Analys, design och implementering av Orbit ones dokumenthanteringssystem

This report describes the development of a system for controlling documents. The report starts with a problem description which the company wants an intranet-based solution for. The report then continues to describe the development phase for the different parts of the system which results in a complete system. The company that wanted this system is called Orbit One and is located in Ronneby, Sweden. They have had a problem with old documents circulating in different versions and in different binders.

Applikationsportering till mobil plattform

När man lever i ett samhälle där användandet av mobila enheter som smartphones ökar, sker motsvarande ökning av frågan på tillgång till befintliga system i mobila enheter. Ett mobilt system kan utvecklas på olika sätt beroende på efterfrågan och kunskapsbasen hos utvecklarna. Det finns olika sorters mobila system, däribland webbaserade och plattformsspecifika system.Den här rapporten innehåller en förstudie för olika tillvägagångssätt för att skapa en mobil version av ett system. Rapporten redogör för olika tekniker som kan användas beroende på vilket system som önskas överföras, samt vilken målgruppen är. Rapporten beskriver också hur framtagandet av ett mobilt system för olika mobila plattformar har skett för ett redan befintligt system..

Behov av flexibilitet i COTS-system : Hur COTS-system möter användarnas behov i olika organisationer

This thesis examines if commercial-of-the-shelf (COTS) systems meet the needs in different types of organizations. This was investigated through a case study of a COTS system. The system is built for contact centers and used in different types of organizations. Contextual inquiries with users from six different organizations were held together with interviews with stakeholders of the system. This gave an understanding for how the system is used and the needs to be met in the different organizations were recognized.

Systemutveckling av Trouble Report : Hur väljer och prioriterar man tekniska funktioner i vidareutveckling av ett etablerat system?

As part of an internship at Ericsson, this report was written to enhance the understanding of how it is to develop a system that is well established at the workplace. To improve an already existing system is not always as easy as many developers may think. In this report the pros and cons of developing an already existing system has been researched and analyzed. Do note that the results are only from one development of a specific system and that comparison of other developments has been made from other reports and not from experiencing it firsthand. It was found that the choices made can have an impact on further developing and it is important to write down what has been done.

Foldback System

This project concentrates on musicians who work in a professional music studio.The task of this project was to design a new headphone system called Foldback system.The advantage of this system is that all involved in a music project could influence their ownlistening during the project. With a couple of adjustments should each and everyone get theirown individual listening from their headphone station.This report shows different methods, theories and results that came along in development ofFoldback system. The project has resulted in a finished product that will be in use atStudiomega..

1 Nästa sida ->