'n Kriptologiese stawingsanalise en getalteoretiese stroomsyfer
- Authors: Van der Walt, Werner
- Date: 2014-03-18
- Subjects: Cryptography , Error-correcting codes (Information theory) , Digital communications
- Type: Thesis
- Identifier: uj:4391 , http://hdl.handle.net/10210/9739
- Description: M.Ing. (Electric and Electrical Engineering) , From the day the first 'apple' was eaten, a species of people existed that wants to misuse other people, This species is normally the first to use new technology to their advantage. It is essential for our own security to restrict the boundaries of their playing-field and to fill the field it self with potholes. This however should be a continuous process, for their dexterity tends to evolveas fast as new techniques are mastered. Firstly this thesis entails the analysis of the boundaries of the playing field of authentication systems without security. The boundaries of authentication systems with security is established with a unique technique. Concluding the first part of the thesis, a new method of code designing for this playing-field is proposed. Reordering the potholes on the playing-field is the subject of the second part of the thesis. Anew public key system is described for this purpose. A novel implementation of insertion/deletion error correcting codes is presented in this new system. To conclude the thesis, a thorough analysis of this public key system is presented.
- Full Text:
- Authors: Van der Walt, Werner
- Date: 2014-03-18
- Subjects: Cryptography , Error-correcting codes (Information theory) , Digital communications
- Type: Thesis
- Identifier: uj:4391 , http://hdl.handle.net/10210/9739
- Description: M.Ing. (Electric and Electrical Engineering) , From the day the first 'apple' was eaten, a species of people existed that wants to misuse other people, This species is normally the first to use new technology to their advantage. It is essential for our own security to restrict the boundaries of their playing-field and to fill the field it self with potholes. This however should be a continuous process, for their dexterity tends to evolveas fast as new techniques are mastered. Firstly this thesis entails the analysis of the boundaries of the playing field of authentication systems without security. The boundaries of authentication systems with security is established with a unique technique. Concluding the first part of the thesis, a new method of code designing for this playing-field is proposed. Reordering the potholes on the playing-field is the subject of the second part of the thesis. Anew public key system is described for this purpose. A novel implementation of insertion/deletion error correcting codes is presented in this new system. To conclude the thesis, a thorough analysis of this public key system is presented.
- Full Text:
The effectiveness of encryption methods in mitigating information technology security risks
- Authors: Mokoena, Troy
- Date: 2016
- Subjects: Auditing - Computer security , Information technology - Security measures , Cryptography
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/225589 , uj:22789
- Description: Abstract: Data protection is a critical area that is currently receiving much attention worldwide. Easy access to the internet and an increase in information transfer over communication networks contributes greatly to the need for data to be protected. Reports of data breaches from corporations and government institutions across the world have increased. Data breaches are mostly executed through the internet and other networks. Data loss and breaches can have significant consequences for concerned parties, such as reputational damage and litigation, when personal information is exposed to unauthorised persons. Mitigating controls, such as encryption methods, are generally implemented to protect data at rest and during transmission. Such controls, however, are useful only when they are effective in mitigating related risk exposure. This study focuses on investigating whether the current encryption methods being used are perceived by IT security managers from the Big Four audit firms and Dimension Data, as effective in mitigating IT security risks. Although it has been reported in the literature that specific symmetric and asymmetric encryption methods are effective, this study revealed the following: Symmetric encryption is perceived in practice as a highly breakable method at 15%, least breakable at 75%, and rated as not yet used at 10%. Asymmetric encryption is perceived slightly higher, as a highly breakable method at 25%, least breakable at 62%, and not yet used at 13%. , M.Com. (Computer Auditing)
- Full Text:
- Authors: Mokoena, Troy
- Date: 2016
- Subjects: Auditing - Computer security , Information technology - Security measures , Cryptography
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/225589 , uj:22789
- Description: Abstract: Data protection is a critical area that is currently receiving much attention worldwide. Easy access to the internet and an increase in information transfer over communication networks contributes greatly to the need for data to be protected. Reports of data breaches from corporations and government institutions across the world have increased. Data breaches are mostly executed through the internet and other networks. Data loss and breaches can have significant consequences for concerned parties, such as reputational damage and litigation, when personal information is exposed to unauthorised persons. Mitigating controls, such as encryption methods, are generally implemented to protect data at rest and during transmission. Such controls, however, are useful only when they are effective in mitigating related risk exposure. This study focuses on investigating whether the current encryption methods being used are perceived by IT security managers from the Big Four audit firms and Dimension Data, as effective in mitigating IT security risks. Although it has been reported in the literature that specific symmetric and asymmetric encryption methods are effective, this study revealed the following: Symmetric encryption is perceived in practice as a highly breakable method at 15%, least breakable at 75%, and rated as not yet used at 10%. Asymmetric encryption is perceived slightly higher, as a highly breakable method at 25%, least breakable at 62%, and not yet used at 13%. , M.Com. (Computer Auditing)
- Full Text:
Differential power analysis of an AES software implementation
- Moabalobelo, Phindile Terrence
- Authors: Moabalobelo, Phindile Terrence
- Date: 2014-04-16
- Subjects: Computer security , Data encryption (Computer science) , Algorithms , Cryptography
- Type: Thesis
- Identifier: uj:10801 , http://hdl.handle.net/10210/10308
- Description: M.Ing. (Electrical and Electronic Engineering) , Please refer to full text to view abstract
- Full Text:
- Authors: Moabalobelo, Phindile Terrence
- Date: 2014-04-16
- Subjects: Computer security , Data encryption (Computer science) , Algorithms , Cryptography
- Type: Thesis
- Identifier: uj:10801 , http://hdl.handle.net/10210/10308
- Description: M.Ing. (Electrical and Electronic Engineering) , Please refer to full text to view abstract
- Full Text:
A secure steganographic file system with non-duplicating properties
- Authors: Ellefsen, Ian David
- Date: 2012-09-11
- Subjects: Cryptography , Computer security , Data encryption (Computer science)
- Type: Thesis
- Identifier: uj:9972 , http://hdl.handle.net/10210/7367
- Description: M.Sc. , This dissertation investigates the possibility of a steganographic file system which does not have to duplicate hidden data in order to avoid "collisions" between the hidden and non-hidden data. This will ensure the consistency of the hidden data, and avoid unnecessary data duplication while at the same time providing an acceptable level of information security. The dissertation will critically analyse a number of existing steganographic file systems in order to determine the problems which are faced by this field. These problems will then be addressed, which will allow for the definition of a possible solution. In order to provide a more complete understanding of the implementation discussed in the latter part of this dissertation, a number of background concepts are discussed. This includes a discussion of file systems, cryptography, and steganography, each of which contributes to the body of knowledge required for later chapters. The latter part of this dissertation outlines the Secure Steganographic File System (SSFS). This implementation will attempt to effectively manage the storage of hidden data which is embedded within a host file system. The dissertation will outline how SSFS will allow fragments of hidden data to exist in any physical location on a storage device, while still maintaining a consistent file system structure. The dissertation will then critically analyse the impact of such a system, by examining the impact on the host file system's performance. This will allow the feasibility of such a system to be demonstrated.
- Full Text:
- Authors: Ellefsen, Ian David
- Date: 2012-09-11
- Subjects: Cryptography , Computer security , Data encryption (Computer science)
- Type: Thesis
- Identifier: uj:9972 , http://hdl.handle.net/10210/7367
- Description: M.Sc. , This dissertation investigates the possibility of a steganographic file system which does not have to duplicate hidden data in order to avoid "collisions" between the hidden and non-hidden data. This will ensure the consistency of the hidden data, and avoid unnecessary data duplication while at the same time providing an acceptable level of information security. The dissertation will critically analyse a number of existing steganographic file systems in order to determine the problems which are faced by this field. These problems will then be addressed, which will allow for the definition of a possible solution. In order to provide a more complete understanding of the implementation discussed in the latter part of this dissertation, a number of background concepts are discussed. This includes a discussion of file systems, cryptography, and steganography, each of which contributes to the body of knowledge required for later chapters. The latter part of this dissertation outlines the Secure Steganographic File System (SSFS). This implementation will attempt to effectively manage the storage of hidden data which is embedded within a host file system. The dissertation will outline how SSFS will allow fragments of hidden data to exist in any physical location on a storage device, while still maintaining a consistent file system structure. The dissertation will then critically analyse the impact of such a system, by examining the impact on the host file system's performance. This will allow the feasibility of such a system to be demonstrated.
- Full Text:
Improved steganography through the strategic placement of information and the optimization thereof through the use of evolutionary algorithms
- Authors: Cilliers, Michael
- Date: 2015
- Subjects: Cryptography , Computer algorithms , Genetic algorithms , Image processing - Digital techniques , Evolutionary computation
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/84521 , uj:19232
- Description: Abstract: The development of steganography techniques does not occur in isolation. There is an arms race between steganography and steganalysis techniques. The development of a steganography technique that could adapt when needed could be beneficial. This research begins with a literature study exploring existing methods. Both steganog- raphy and steganalysis approaches are covered in order to get an overview of the environ- ment. Optimization methods are also examined to find a suitable method of optimizing the developed algorithm. The information that is gathered in the literature study was then used to develop a steganography algorithm that aims to decrease detectability through the strategic placement of information. The algorithm is developed in such a way as to allow for optimization. A genetic algorithm is implemented to help optimize the embedding of the information in a specific environment. This should allow the algorithm to be re- optimized when new steganalysis techniques are developed. The algorithm should thus remain relevant as steganalysis advances. The developed algorithms show that the placement of information in the image has an effect on its detectability. The developed algorithm even outperforms the random distribution LSB technique. The optimization that was implemented also produced positive results. The dissertation also includes the development of a novel evolutionary algorithm that drew its inspiration from the aphid life cycle. By switching between reproduction strate- gies the algorithm is able to adjust the balance between exploration and exploitation. , M.Sc. (Computer Science)
- Full Text:
- Authors: Cilliers, Michael
- Date: 2015
- Subjects: Cryptography , Computer algorithms , Genetic algorithms , Image processing - Digital techniques , Evolutionary computation
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/84521 , uj:19232
- Description: Abstract: The development of steganography techniques does not occur in isolation. There is an arms race between steganography and steganalysis techniques. The development of a steganography technique that could adapt when needed could be beneficial. This research begins with a literature study exploring existing methods. Both steganog- raphy and steganalysis approaches are covered in order to get an overview of the environ- ment. Optimization methods are also examined to find a suitable method of optimizing the developed algorithm. The information that is gathered in the literature study was then used to develop a steganography algorithm that aims to decrease detectability through the strategic placement of information. The algorithm is developed in such a way as to allow for optimization. A genetic algorithm is implemented to help optimize the embedding of the information in a specific environment. This should allow the algorithm to be re- optimized when new steganalysis techniques are developed. The algorithm should thus remain relevant as steganalysis advances. The developed algorithms show that the placement of information in the image has an effect on its detectability. The developed algorithm even outperforms the random distribution LSB technique. The optimization that was implemented also produced positive results. The dissertation also includes the development of a novel evolutionary algorithm that drew its inspiration from the aphid life cycle. By switching between reproduction strate- gies the algorithm is able to adjust the balance between exploration and exploitation. , M.Sc. (Computer Science)
- Full Text:
Maxima a model for constructing an online identity model of a user using identity fragments
- Authors: Blauw, Frans Frederik
- Date: 2020
- Subjects: Computers - Access control , Computer security , Cryptography
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://hdl.handle.net/10210/458379 , uj:40712
- Description: Abstract: Please refer to full text to view abstract. , Ph.D. (Computer Science)
- Full Text:
- Authors: Blauw, Frans Frederik
- Date: 2020
- Subjects: Computers - Access control , Computer security , Cryptography
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://hdl.handle.net/10210/458379 , uj:40712
- Description: Abstract: Please refer to full text to view abstract. , Ph.D. (Computer Science)
- Full Text:
- «
- ‹
- 1
- ›
- »