Angebote zu "Cryptographic" (9 Treffer)

Kategorien

Shops

Celator
49,00 € *
ggf. zzgl. Versand

Nowadays hi-tech secure products need more services and more security. Furthermore the corresponding market is now oriented towards more flexibility. In this thesis we propose as novel solution a Multi-algorithm Cryptographic Co-processor called Celator. Celator is able to encrypt or decrypt data blocks using private key encryption algorithms such as Advanced Encryption Standard (AES) or Data Encryption Standard (DES). Moreover Celator allows condensing data using the Secure Hash Algorithms (SHA). These algorithms are frequently implemented in hi-tech secure products in software or in hardware mode. Celator belongs to the class of the flexible hardware implementations, and allows an user implementing its own cryptographic algorithm under specific conditions. Celator architecture is based on a 4x4 Processing Elements (PE) systolic array, a Controller with a Finite State Machine (FSM) and a local memory. Data are encrypted or decrypted by the PE array. This thesis presents Celator architecture, as well as its AES, DES, and SHA basic operations. Celator performances are then given and compared to other securitycircuits.

Anbieter: Dodax
Stand: 23.02.2020
Zum Angebot
OCB Mode
29,00 € *
ggf. zzgl. Versand

High Quality Content by WIKIPEDIA articles! OCB mode (Offset Codebook Mode) is a mode of operation for cryptographic block ciphers. It was designed to provide both authentication and privacy. It is essentially a scheme for integrating a Message Authentication Code (MAC) into the operation of a block cipher. In this way, OCB mode avoids the need to use two systems, a MAC for authentication and a block cipher encryption for privacy. This results in lower computational cost compared to the application of separate encryption and authentication functions.

Anbieter: Dodax
Stand: 23.02.2020
Zum Angebot
Advances in Cryptology - EUROCRYPT 2018
82,68 € *
ggf. zzgl. Versand

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018. The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations, lattices, random oracle model, fully homomorphic encryption, permutations, galois counter mode, attribute-based encryption, secret sharing, blockchain, multi-collision resistance, signatures, private simultaneous messages, masking, theoretical multiparty computation, obfuscation, symmetric cryptanalysis, zero-knowledge, implementing multiparty computation, non-interactive zero-knowledge, anonymous communication, isogeny, leakage, key exchange, quantum, non-malleable codes, and provable symmetric cryptography.

Anbieter: Dodax
Stand: 23.02.2020
Zum Angebot
Advances in Cryptology - EUROCRYPT 2018
191,29 € *
ggf. zzgl. Versand

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018. The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations, lattices, random oracle model, fully homomorphic encryption, permutations, galois counter mode, attribute-based encryption, secret sharing, blockchain, multi-collision resistance, signatures, private simultaneous messages, masking, theoretical multiparty computation, obfuscation, symmetric cryptanalysis, zero-knowledge, implementing multiparty computation, non-interactive zero-knowledge, anonymous communication, isogeny, leakage, key exchange, quantum, non-malleable codes, and provable symmetric cyptography.

Anbieter: Dodax
Stand: 23.02.2020
Zum Angebot
Apricorn Aegis Secure Key 3z USB-Stick 16 GB US...
112,85 € *
ggf. zzgl. Versand

Aegis Secure Key 3z Merges Advanced Data Protection, Affordability, and Mass Configurability Easy to use USB 3.0 flash drive with on-the-fly 256-bit AES hardware encryption, onboard secure PIN access and FIPS 140-2 Level 3 validation. With software-free operation, cross-platform compatibility, USB 3.0 speed, Aegis Configurator compatibility, and our most advanced security feature set, Apricorn’s Aegis Secure Key 3z takes advanced data security to a new level of efficiency and affordability. FIPS 140-2 Level 3 to meet the U.S. government standards for information technology and computer security. NIST FIPS 140 is the cryptography standard program required by the US federal government for protection of sensitive data. The Aegis Secure Key’s FIPS 140-2 validation covers 11 areas of its cryptographic security system, including physical security, cryptographic key management and design integrity. Available in four levels, the Aegis Secure Key’s FIPS 140-2 Level 3 validation encompasses both the Aegis Secure Key’s physical tamper-resistant features as well as its identity-based authentication. Utilizes Military Grade 256-bit AES XTS Hardware Encryption All data on the Aegis Secure Key is encrypted on the fly with the built-in 256-bit AES XTS hardware encryption. Onboard Alphanumeric Keypad – Prevents Hardware and Software Key Logging Using a rechargeable battery, the Aegis Secure Key enables the user to unlock the drive with a 7-16 digit PIN BEFORE connecting to the USB port on your computer, tablet or mobile device. The embedded keypad prevents hardware and software key logging attempts to capture your password entered via the host system. Software-Free Design – With no admin rights to contend with, the Aegis Secure Key is a breeze to implement Aegis Configurator Compatible Create custom profiles and simultaneously mass configure multiple Secure Keys in a matter of seconds with Apricorn’s new Aegis Configurator / Powered Hub bundle. Independent User and Admin PINs The Aegis Secure Key can be configured with independent User and Admin PINs, making it ideal for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN which can then clear the forgotten User PIN and allow for the User to set a new PIN. User Forced Enrollment Once a device is configured by the Admin, it can then be deployed in a state of USER FORCED ENROLLMENT in which the User must first establish his or her own User PIN before the drive can be accessed or used. Data Recovery PINs In the event that a User PIN is forgotten, up to 4 one-time use recovery PINs can be programmed to permit access to the drives data by creating a new state of User Forced Enrollment. Drive Reset Feature The Aegis Secure Key also includes a drive reset feature which clears both User and Admin PINs, destroys the data, creates a new randomly generated encryption key and allows the drive to be reused. The Aegis Secure Key is capable of generating an infinite number of randomly generated encryption keys, allowing the user to reset the drive as often as required. Dust and Water Resistant Durable Aluminum Housing - IP57 Certification Protecting data goes well beyond encryption. Tough enough to go anywhere, the Aegis Secure Key 3z's resilient design makes it perfect for travel and field applications. With its rugged, extruded aluminum crush-resistant casing, the Aegis Secure Key 3z is tamper evident and well-protected against physical damage. Sealed from Physical Attacks by Tough Epoxy Coating The internal drive components are completely protected by a super tough epoxy compound, making it virtually impossible to remove without causing permanent damage to the electronics. This barrier prevents a potential hacker from accessing the encryption circuitry and launching a variety of potential attacks. Brute Force Self Destruct Feature As the Aegis Secure Key is unlocked using its own keypad and not via a keyboard, it is not vulnerable to software/hardware based key-loggers or brute force attacks. In addition the Aegis Secure Key further protects your data with a programmable “Brute Force Hack Defense Mechanism” which deletes the encryption key and destroys all stored data if the incorrect PIN is entered up to a total of 20 consecutive times. Unattended Auto Lock feature The Aegis Secure Key automatically locks once you unplug the drive from your computer's USB port or power to the USB port is turned off or after a pre-programmed period of inactivity Wear Resistant Key Pad Designed with protection in mind, the entire Aegis Secure Drive family incorporates ‘wear resistant’ keypads to hide key usage and avoid tipping off a potential hacker to the commonly used keys. Two Read-Only Modes The Secure Key 3z has two read-only modes. One is set by the admin in the admin mode and can’t be modified or disabled by anyone other than the admin. The second read-only mode can be set and disabled by a user but can also be overridden by the admin as well. Ideal for situations where the contents of the Secure Key needs to be accessed by several people in a public setting, or for forensic applications where the drive's contents must be kept intact and unaltered for later examination. Lock Override Mode Designated for specific cases in which the key needs to remain unlocked through USB port re-enumeration such as during reboot, or passing through a virtual machine.

Anbieter: Dodax
Stand: 23.02.2020
Zum Angebot
Apricorn 64GB Aegis Secure Key 3z USB-Stick USB...
170,53 € *
ggf. zzgl. Versand

Aegis Secure Key 3z Merges Advanced Data Protection, Affordability, and Mass Configurability Easy to use USB 3.0 flash drive with on-the-fly 256-bit AES hardware encryption, onboard secure PIN access and FIPS 140-2 Level 3 validation. With software-free operation, cross-platform compatibility, USB 3.0 speed, Aegis Configurator compatibility, and our most advanced security feature set, Apricorn’s Aegis Secure Key 3z takes advanced data security to a new level of efficiency and affordability. FIPS 140-2 Level 3 to meet the U.S. government standards for information technology and computer security. NIST FIPS 140 is the cryptography standard program required by the US federal government for protection of sensitive data. The Aegis Secure Key’s FIPS 140-2 validation covers 11 areas of its cryptographic security system, including physical security, cryptographic key management and design integrity. Available in four levels, the Aegis Secure Key’s FIPS 140-2 Level 3 validation encompasses both the Aegis Secure Key’s physical tamper-resistant features as well as its identity-based authentication. Utilizes Military Grade 256-bit AES XTS Hardware Encryption All data on the Aegis Secure Key is encrypted on the fly with the built-in 256-bit AES XTS hardware encryption. Onboard Alphanumeric Keypad – Prevents Hardware and Software Key Logging Using a rechargeable battery, the Aegis Secure Key enables the user to unlock the drive with a 7-16 digit PIN BEFORE connecting to the USB port on your computer, tablet or mobile device. The embedded keypad prevents hardware and software key logging attempts to capture your password entered via the host system. Software-Free Design – With no admin rights to contend with, the Aegis Secure Key is a breeze to implement Aegis Configurator Compatible Create custom profiles and simultaneously mass configure multiple Secure Keys in a matter of seconds with Apricorn’s new Aegis Configurator / Powered Hub bundle. Independent User and Admin PINs The Aegis Secure Key can be configured with independent User and Admin PINs, making it ideal for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN which can then clear the forgotten User PIN and allow for the User to set a new PIN. User Forced Enrollment Once a device is configured by the Admin, it can then be deployed in a state of USER FORCED ENROLLMENT in which the User must first establish his or her own User PIN before the drive can be accessed or used. Data Recovery PINs In the event that a User PIN is forgotten, up to 4 one-time use recovery PINs can be programmed to permit access to the drives data by creating a new state of User Forced Enrollment. Drive Reset Feature The Aegis Secure Key also includes a drive reset feature which clears both User and Admin PINs, destroys the data, creates a new randomly generated encryption key and allows the drive to be reused. The Aegis Secure Key is capable of generating an infinite number of randomly generated encryption keys, allowing the user to reset the drive as often as required. Dust and Water Resistant Durable Aluminum Housing - IP57 Certification Protecting data goes well beyond encryption. Tough enough to go anywhere, the Aegis Secure Key 3z's resilient design makes it perfect for travel and field applications. With its rugged, extruded aluminum crush-resistant casing, the Aegis Secure Key 3z is tamper evident and well-protected against physical damage. Sealed from Physical Attacks by Tough Epoxy Coating The internal drive components are completely protected by a super tough epoxy compound, making it virtually impossible to remove without causing permanent damage to the electronics. This barrier prevents a potential hacker from accessing the encryption circuitry and launching a variety of potential attacks. Brute Force Self Destruct Feature As the Aegis Secure Key is unlocked using its own keypad and not via a keyboard, it is not vulnerable to software/hardware based key-loggers or brute force attacks. In addition the Aegis Secure Key further protects your data with a programmable “Brute Force Hack Defense Mechanism” which deletes the encryption key and destroys all stored data if the incorrect PIN is entered up to a total of 20 consecutive times. Unattended Auto Lock feature The Aegis Secure Key automatically locks once you unplug the drive from your computer's USB port or power to the USB port is turned off or after a pre-programmed period of inactivity Wear Resistant Key Pad Designed with protection in mind, the entire Aegis Secure Drive family incorporates ‘wear resistant’ keypads to hide key usage and avoid tipping off a potential hacker to the commonly used keys. Two Read-Only Modes The Secure Key 3z has two read-only modes. One is set by the admin in the admin mode and can’t be modified or disabled by anyone other than the admin. The second read-only mode can be set and disabled by a user but can also be overridden by the admin as well. Ideal for situations where the contents of the Secure Key needs to be accessed by several people in a public setting, or for forensic applications where the drive's contents must be kept intact and unaltered for later examination. Lock Override Mode Designated for specific cases in which the key needs to remain unlocked through USB port re-enumeration such as during reboot, or passing through a virtual machine.

Anbieter: Dodax
Stand: 23.02.2020
Zum Angebot
Host Identity Protocol (HIP)
90,00 CHF *
ggf. zzgl. Versand

'Within the set of many identifier-locator separationdesigns for the Internet, HIP has progressed further than anythingelse we have so far. It is time to see what HIP can do in largerscale in the real world. In order to make that happen, the worldneeds a HIP book, and now we have it.' - Jari Arkko,Internet Area Director, IETF One of the challenges facing the current Internet architectureis the incorporation of mobile and multi-homed terminals (hosts),and an overall lack of protection against Denial-of-Service attacksand identity spoofing. The Host Identity Protocol (HIP) is beingdeveloped by the Internet Engineering Task Force (IETF) as anintegrated solution to these problems. The book presents awell-structured, readable and compact overview of the core protocolwith relevant extensions to the Internet architecture andinfrastructure. The covered topics include the Bound End-to-EndTunnel Mode for IPsec, Overlay Routable Cryptographic HashIdentifiers, extensions to the Domain Name System, IPv4 and IPv6interoperability, integration with SIP, and support for legacyapplications. Unique features of the book: * All-in-one source for HIP specifications * Complete coverage of HIP architecture and protocols * Base exchange, mobility and multihoming extensions * Practical snapshots of protocol operation * IP security on lightweight devices * Traversal of middleboxes, such as NATs and firewalls * Name resolution infrastructure * Micromobility, multicast, privacy extensions * Chapter on applications, including HIP pilot deployment in aBoeing factory * HOWTO for HIP on Linux (HIPL) implementation An important compliment to the official IETF specifications,this book will be a valuable reference for practicing engineers inequipment manufacturing companies and telecom operators, as well asnetwork managers, network engineers, network operators and telecomengineers. Advanced students and academics, IT managers,professionals and operating system specialists will also find thisbook of interest.

Anbieter: Orell Fuessli CH
Stand: 23.02.2020
Zum Angebot
Host Identity Protocol (HIP)
82,99 € *
ggf. zzgl. Versand

'Within the set of many identifier-locator separationdesigns for the Internet, HIP has progressed further than anythingelse we have so far. It is time to see what HIP can do in largerscale in the real world. In order to make that happen, the worldneeds a HIP book, and now we have it.' - Jari Arkko,Internet Area Director, IETF One of the challenges facing the current Internet architectureis the incorporation of mobile and multi-homed terminals (hosts),and an overall lack of protection against Denial-of-Service attacksand identity spoofing. The Host Identity Protocol (HIP) is beingdeveloped by the Internet Engineering Task Force (IETF) as anintegrated solution to these problems. The book presents awell-structured, readable and compact overview of the core protocolwith relevant extensions to the Internet architecture andinfrastructure. The covered topics include the Bound End-to-EndTunnel Mode for IPsec, Overlay Routable Cryptographic HashIdentifiers, extensions to the Domain Name System, IPv4 and IPv6interoperability, integration with SIP, and support for legacyapplications. Unique features of the book: * All-in-one source for HIP specifications * Complete coverage of HIP architecture and protocols * Base exchange, mobility and multihoming extensions * Practical snapshots of protocol operation * IP security on lightweight devices * Traversal of middleboxes, such as NATs and firewalls * Name resolution infrastructure * Micromobility, multicast, privacy extensions * Chapter on applications, including HIP pilot deployment in aBoeing factory * HOWTO for HIP on Linux (HIPL) implementation An important compliment to the official IETF specifications,this book will be a valuable reference for practicing engineers inequipment manufacturing companies and telecom operators, as well asnetwork managers, network engineers, network operators and telecomengineers. Advanced students and academics, IT managers,professionals and operating system specialists will also find thisbook of interest.

Anbieter: Thalia AT
Stand: 23.02.2020
Zum Angebot