Abstract:
Systems and methods for protecting digital assets (40) associated with a computing device are described herein. An example of a method according to the disclosure includes assigning at least one asset worth value to respective digital assets (40) associated with a device (10), computing at least one device worth value using the at least one asset worth value assigned to the digital assets (40) associated with the device (10), identifying at least one device worth value threshold, performing a comparison of the at least one device worth value to the at least one worth value threshold, and initiating at least one action with respect to the digital assets (40) associated with the device (10) based on the comparison.
Abstract:
A method and apparatus for decrypting stream ciphers. An SSC2-type stream cipher is decrypted by utilizing the period of LFG output and the correlation of the LSBs of LSFR output. A dynamic probability of error for each bit of a data stream is calculated to determine whether a particular bit should be inverted.