Tài liệu miễn phí An ninh - Bảo mật

Download Tài liệu học tập miễn phí An ninh - Bảo mật

A fast implementation of the rsa algorithm using the GNU MP library

Organizations in both public and private sectors have become increasingly dependent on electronic data processing. Protecting these important data is of utmost concern to the organizations and cryptography is one of the primary ways to do the job.

8/30/2018 4:28:13 AM +00:00

A Hardware implementation of Winograd Fourier Transform algorithm for Cryptography

This paper presents a hardware implementation of efficient algorithms that uses the mathematical framework. The framework based on the Winograd’s Fourier Transform Algorithm, obtaining a set of formulations that simplify cyclic convolution (CC) computations and CRT.

8/30/2018 4:28:13 AM +00:00

A High-Performance Reconfigurable Elliptic Curve Processor for GF (2m)

This work proposes a processor architecture for elliptic curves cryptosystems over fields GF (2m ). This is a scalable architecture in terms of area and speed that exploits the abilities of reconfigurable hardware to deliver optimized circuitry for different elliptic curves and finite fields.

8/30/2018 4:28:13 AM +00:00

An efficient implementation of the digital signature algorithm

Digital Signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication, authenticated key transport, and authenticated key agreement.

8/30/2018 4:28:13 AM +00:00

Digital Signature Schemes

This thesis will attempt to describe in detail the concepts of digital signatures and the related background issues. We will begin with a general introduction to cryptography and digital signatures and follow with an overview of the requisite math involved in cryptographic applications.

8/30/2018 4:28:13 AM +00:00

Digital signature standard (DSS)

This standard specifies a suite of algorithms which can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature in proving to a third party that the signature was in fact generated by the signatory.

8/30/2018 4:28:13 AM +00:00

Digital Signatures Do Not Guarantee Exclusive Ownership

Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer of trust in the other direction, from the signed data to the public key.

8/30/2018 4:28:13 AM +00:00

ECC in X.509

The X.509 standard itself does not go into details concerning formatting of signatures andpublic keys. Instead, it provides the means to identify the formatting of these fields. This is done by means of an Algorithm Identifier.

8/30/2018 4:28:13 AM +00:00

Efficient Hardware Architectures for Modular Multiplication

This thesis describes the research which I conducted while completing my graduate work at the University of Applied Sciences Offenburg, Germany. The work produced scalable hardware implementations of existing and newly proposed algorithms for performing modular multiplication.

8/30/2018 4:28:13 AM +00:00

Efficient Pattern Matching Algorithm for Memory Architecture

Network intrusion detection system is used to inspect packet contents against thousands of predefined malicious or suspicious patterns. Because traditional software alone pattern matching approaches can no longer meet the high throughput of today’s networking, many hardware approaches are proposed to accelerate pattern matching.

8/30/2018 4:28:13 AM +00:00

Efficient Unified Arithmetic for Hardware Cryptography

Recently, identity based cryptography based on pairing operations defined over elliptic curve points has stimulated a significant level of interest in the arithmetic of ternary extension fields, GF (3n ).

8/30/2018 4:28:13 AM +00:00

Efficient VLSI Implementation for Montgomery Multiplication in GF(2m)

The Montgomery multiplication algorithm without division operations is popular both in prime field GF(p) and Finite field GF(2m). However, the Montgomery multiplication algorithm has the time-dependent problem.

8/30/2018 4:28:13 AM +00:00

Efficient Hash-Based Signatures on Embedded Devices

Authentication and message integrity are essential building blocks for protocols of many security related verification processes like data origin authentication for valid software updates or device authentication.

8/30/2018 4:28:13 AM +00:00

Efficient Software-Implementation of Finite Fields with Applications to Cryptography

In this work, we present a survey of efficient techniques for software implementation of finite field arithmetic especially suitable for cryptographic applications.

8/30/2018 4:28:13 AM +00:00

Elliptic Curve Cryptography An Implementation Guide

The paper gives an introduction to elliptic curve cryptography (ECC) and how it is used in the implementation of digital signature (ECDSA) and key agreement (ECDH) Algorithms. The paper discusses the implementation of ECC on two finite fields, prime field and binary field.

8/30/2018 4:28:13 AM +00:00

Elliptic Curve Cryptosystem

This paper describes elliptic curve cryptosystems (ECCs), which are expected to be-come the next-generation public key cryptosystems, and also describes Fujitsu Labo-ratories’ study of ECCs.

8/30/2018 4:28:13 AM +00:00

Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field

In the underlying finite field arithmetic of an elliptic curve cryptosystem, field multiplication is the next computational costly operation other than field inversion. We present two novel algorithms for efficient implementation of field multiplication and modular reduction used frequently in an elliptic curve cryptosystem defined over GF (2n ).

8/30/2018 4:28:13 AM +00:00

Fast implementation of digital signature algorithms on smartcards without coprocessor

The advancement of information and communications technology, especially the Internet, has created an opportunity to improve the administrative efficiency and service quality in governments of many nations.

8/30/2018 4:28:13 AM +00:00

On the FPGA Implementation of HAVAL Hash Function

Security is a very important issue, which has attracted the interest of the research community the latest years, at a great factor. Hash functions belong to the category of encryption algorithms. In this work, a novel architecture and the VLSI implementation of HAVAL hash function is proposed.

8/30/2018 4:28:13 AM +00:00

ECC-based Wireless Authentication Protocol on an ARM Microprocessor

In this paper, we present the results of our implementation of elliptic curve cryptography (ECC) over the field GF (p) on an 80-MHz, 32-bit ARM microprocessor. We have produced a practical software library which supports variable length implementation of the elliptic curve digital signature algorithm (ECDSA).

8/30/2018 4:28:13 AM +00:00

Acceleration of the Elliptic Cryptography with Vector Finite Fields

Implementation of the cryptographic algorisms based on elliptic curves (ECs) over VFFs provides significantly higher performance than the implementation of the EC-based algorithms, in which the ECs are defined over the ground fields and extension finite fields of polynomials.

8/30/2018 4:28:13 AM +00:00

Blind Signature Protocols from Digital Signature Standards

Using Russian digital signature (DS) standards as the underlying scheme there are designed the blind DS protocols that are the first known implementation of the blind DS based on signature standards. There are also proposed blind collective DS protocols based on the DS standards.

8/30/2018 4:28:13 AM +00:00

Implementation of Elliptic Curve Cryptosystems on a Reconfigurable Computer

During the last few years, a considerable effort has been devoted to the development of reconfigurable computers, machines that are based on the close interoperation of traditional microprocessors and Field Programmable Gate Arrays (FPGAs).

8/30/2018 4:28:13 AM +00:00

Lectures on the NTRU encryption algorithm and digital signature scheme

Lattices have been studied by cryptographers for quite some time, in both the field of cryptanalysis and as a source of hard problems on which to build encryption schemes. In this lecture, we describe the NTRU encryption algorithm, and the lattice problems on which this is based.

8/30/2018 4:28:13 AM +00:00

Bài giảng Tổng quan về an ninh mạng - PGS. TSKH. Hoàng Đăng Hải

Bài giảng Tổng quan về an ninh mạng nhằm trình bày các nội dung chính: không gian mạng và một số khái niệm cơ bản, khái niệm không gian mạng, khái niệm cơ sở hạ tầng thông tin trọng yếu quốc gia, cơ sở hạ tầng thông tin trọng yếu của Mỹ, khái niệm về an ninh mạng và an ninh thông tin.

8/30/2018 4:28:10 AM +00:00

Bài giảng Các kỹ thuật tấn công, xâm nhập hệ thống - PGS. TSKH. Hoàng Đăng Hải

Bài giảng Các kỹ thuật tấn công, xâm nhập hệ thống nhằm trình bày các nội dung chính: sự phát triển của tấn công mạng, xu thế kết hợp worms, viruses và DDoS, tống tiền, tin tặc, phân loại tấn công mạng, 5 giai đoạn của quá trình phá hoại, cấu trúc và cơ chế hoạt động của Virus

8/30/2018 4:28:10 AM +00:00

Bài giảng Mô hình, nguyên lý, kỹ thuật đảm bảo an ninh mạng - PGS.TSK. H.Đ.Hải

Nội dung Bài giảng Mô hình, nguyên lý, kỹ thuật đảm bảo an ninh mạng nhằm trình bày các nội dung chính: các mô hình, nguyên lý đảm bảo an ninh mạng, phát hiện và chống xâm nhập trên mạng, bảo vệ hệ thống thông tin trên mạng, bảo vệ ứng dụng mạng.

8/30/2018 4:28:10 AM +00:00

SSH cơ bản - Phạm Công Lý

Cuốn sách SSH cơ bản gồm có 4 chương: lý thuyết an toàn mạng, giới thiệu SSH, bên trong giao thức SSH12, tìm hiểu và nhận xét về một số ứng dụng SSH. Tài liệu cung cấp các kiến thức tổng quan về giao thức SSH và ứng dụng của nó trong lĩnh vực bảo mật.

8/30/2018 4:26:21 AM +00:00

Hacking the art of exploitation

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

8/30/2018 4:26:05 AM +00:00

Tìm hiểu Virus máy tính

Có thể nói virus máy tính có một quá trình phát triển khá dài, và nó luôn song hành cùng “người bạn đồng hành” của nó là những chiếc máy tính. Tài liệu tìm hiểu Virus máy tính sẽ giới thiệu đến các bạn một số kiến thức cơ bản về Virus máy tính.

8/30/2018 4:26:04 AM +00:00