394 research outputs found

    Comparison of different ways to avoid internet traffic interception

    Get PDF
    Projecte fet en col.laboració amb la Norwegian University of Science and Technology. Department of Telematic EngineeringEnglish: The main objective of this thesis is to analyze and compare different ways to avoid the Internet traffic eavesdropping (carried out both by governments or malicious particulars). The analysis consists on a description of the different protocols and technologies involved in each option as well as the difficulties to implement them and the technical knowledge of the users in order to take profit of them

    Survey and Analysis of Android Authentication Using App Locker

    Full text link
    Android Smart phones have gained immense popularity over the years and is undoubtedly more popular than other operating system phones. Following the similar lines android wear was introduced. Steadily android wear is making its way into our daily lives. It helps keep track of the sleep you have, helps you reach fitness goals, keeps track of phone and helps users have easy authentication. Due to the usage of smart lock which enables phone to be unlocked as long as connected to the android wear, this leads to almost no security on both the ends as android wear before Android 5.0 has no lock. We aim to produce the existing authentication methods in android phones and wear and the threats that plague both kinds of devices. As authentication is one of the major building blocks of security, through research we aim at designing a system for android phones which will be able to protect the sensitive data on devices which will be at risk through smart lock using encryption techniques. In this proposed system, the user would be able to decide which applications are needed to be secured when he is using smart lock. This application will enable lock for those user chosen applications as soon as the smart phone device is connected to android wear and similarly disables the lock when connection is disabled between the devices and communication between devices is made secure using encryption algorithms. This application does not interfere with easy phone authentication which users demand but it makes sure data is protected and users are authenticated with the help of multiple authentication layering

    The InfoSec Handbook

    Get PDF
    Computer scienc

    Secure Messaging with in-app user defined schemes

    Get PDF
    Cryptography has been the culmination of human trials and mistrials in an attempt to keep information safe from unintended access. We have learned from our mistakes in the past, and today with the help of both academician and software developers, we have robust cryptographic technologies. Cryptography however, is a race between increasing processing power of modern machines and the complexity of cryptographic systems. With quantum computing on the horizon, our present cryptographic systems seem to fall behind in this race. There is a need to catalyze research in the field. Here, an application is proposed, which empowers users to write their own cryptographic schemes. It hopes to create a platform where people can share their cryptographic schemes and have an application that can help them share information securely. The author hopes, that an application which sources cryptographic schemes from users, would help catalyze research in the field. An application where the security implementation is dependent on the whim of the user could prove a hard target for attack. The thesis starts with a preliminary study of the Android platform. The thesis then analyzes im- plementations of a few secure messaging applications and then delves into details of NFC. Using the background information accumulated during the course of this study, the authors attempt to formulate a sound implementation of a messaging application. The thesis is also accompanied with a proof-of-concept Android application that checks the viability of concepts discussed herein
    corecore