Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Publication
Articles 1 - 2 of 2
Full-Text Articles in Computer Engineering
Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White
Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White
Master's Theses
Modern-day computer security relies heavily on cryptography as a means to protect the data that we have become increasingly reliant on. As the Internet becomes more ubiquitous, methods of security must be better than ever. Validation tools can be leveraged to help increase our confidence and accountability for methods we employ to secure our systems.
Security validation, however, can be difficult and time-consuming. As our computational ability increases, calculations that were once considered “hard” due to length of computation, can now be done in minutes. We are constantly increasing the size of our keys and attempting to make computations harder …
Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton
Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton
Masters Theses
Since its inception, Tor has offered anonymity for internet users around the world. Tor now offers bridges to help users evade internet censorship, but the primary distribution schemes that provide bridges to users in need have come under attack. This thesis explores how threshold RSA can help strengthen Tor's infrastructure while also enabling more powerful bridge distribution schemes. We implement a basic threshold RSA signature system for the bridge authority and a reputation-based social network design for bridge distribution. Experimental results are obtained showing the possibility of quick responses to requests from honest users while maintaining both the secrecy and …