Sök:

Sökresultat:

7 Uppsatser om Decryption - Sida 1 av 1

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

Minnet sviker Aldrig : Att utnyttja volatil data i Krypterade system

When the use of encryption amongst the regular computer user grows morewidespread than ever it makes the life of the IT-forensics experts difficult.Hampering the judicial investigations that otherwise could have lead to convictions.In this report we will treat the subject of crypto analysis with a focus on decrypting files and devices encrypted with the software TrueCrypt. A solution will be presented that can facilitate the future work involving encryption. The application DFEAT that has been developed during the writings of this report is faster than the corresponding software EFDD, and attacks both partitions and bitwise copies of entire harddrives where PKF fails.DFEAT is a lightweight application that is almost 50 times smaller compared to EFDD and 200 times smaller than PKF's portable version..

Diskkrypteringsprestanda i GNU/Linux

This thesis compares the impact on disk performance in a GNU/Linux  environmentwith three encryption algorithms: AES,  Serpent and Twofish in three different implementations: DM-crypt, Loop-AES and Truecrypt. For all three algorithms a key length of 256 bits is used.The thesis shows that the least performance impact during data encryption, and thus file writing, is reached by using AES or Twofish encryption implemented in DM-crypt or TrueCrypt. The thesis shows that some data operations with a sufficiently low processor utilization barely affects disk performance at all if encrypted using the optimal implementation and algorithm.It is also discovered that the performance impact during data Decryption, or file reading, can be minimized by using the most efficient implementation and algorithm. The best results are met with the AES or Twofish cipher, regardless of implementation.An important conclusion that  is  drawn is that it is hard to determine a superior encryption solution for all purposes. However, by reviewing and examining the collected data from all aspects of disk performance the AES implementation in TrueCrypt is, with small marginals, determined to be the most optimal..

Emulerad single sign-on

The goal of the project was to create an extension to Internet Explorer forStatens Tjänstepensionsverk (SPV) which would give the staff the experience ofSingle sign-on (SSO) to external web service providers as well as manage andupdate their passwords in a secure manner. The survey focused on the providersPalasso, ProCompetence and Wera. The extension was created as a BrowserHelper Object (BHO) with C# in .NET. The solution was implemented as aCOM object in a DLL-file that was running in-process with the browser. Theprogram used a locally stored XML file containing URLs, usernames andencrypted passwords to the providers.

Utvärdering av lösningar för hårddiskkryptering

Information stored on unprotected computers that gets lost or stolen, and falls intothe wrong hands, can easily be accessed by moving the hard disk to a controlledcomputer, or by booting the computer from a removable medium, in order to getaround the operating system login. This is something that largely affects companieswhere customer information, trade secrets and other sensitive information can becompromised. A classic solution to the problem is encryption of individual files, but ithas some drawbacks as it puts a great responsibility on the users and unencryptedinformation can be left by mistake. A better solution to the problem is transparentencryption of the entire hard disk, i.e. that encryption and Decryption of informationis performed automatically and without the user being affected.

Car Lock Improved by Configurable Key

When a car owner want to lock or unlock his or her car today, it?s preferable done by using aremote control. The system is really comfortable when the car owner is using the remote.A problem arises if a thief gets the remote.The thief doesn?t have to know where the car is parked, an approximate estimation where thecar is parked is enough.For instance, it?s enough to know which car park the car is parked in. If the thief knows that,he/she can repeatedly activate the remote control while looking for a car indicating with lightsand sounds.Because of the fact that a car usually indicates that it has been unlocked by making a shortsound indication, there will be no problem finding the car.The purpose with this project is to make a prototype which makes it harder for a thief to findthe car.