National Repository of Grey Literature 276 records found  beginprevious248 - 257nextend  jump to record: Search took 0.01 seconds. 
Formal analysis of cryptographic protocols
Petrovský, Peter ; Martinásek, Zdeněk (referee) ; Člupek, Vlastimil (advisor)
This diploma thesis deals with cryptography. It describes its basic allocation and problems of number theory that needs to be addressed. It also deals with methods used to review the formal security of cryptographic protocols from a mathematical point of view. It analyse the tools used to automatic and semi-automatic evaluation of the safety of cryptographic protocols. It describes the process of working with these tools and finally test the security of protocols Kerberos, EKE and Unilateral authentication using symmetric cryptography, HMAC function and hash function. These tests are in tools AVISPA, ProVerif and Scyther. At the end is comparison of results.
Protection of highspeed communication systems
Smékal, David ; Martinásek, Zdeněk (referee) ; Hajný, Jan (advisor)
The diploma thesis deals with 128–bit AES data encryption and its implementation in FPGA network card using VHDL programming language. The theoretical part explains AES encryption and decryption, its individual steps and operating modes. Further was described the VHDL programming language, development environment Vivado, FPGA network card Combo–80G and configurable framework NetCOPE. The practical part is the implementation of AES–128 in VHDL. A simulation was used to eliminate errors, then the synthesis was performed. These steps were made using Vivado software. Last step of practical part was testing of synthesized firmware on COMBO–80G card. Total of 4 projects were implemented in FPGA card. Two of them were AES encryption and decryption with ECB mode and another two describe the encryption and decryption with CBC mode.
Cryptanalysis of modern cryptographic devices
Fördős, András ; Člupek, Vlastimil (referee) ; Martinásek, Zdeněk (advisor)
The thesis focuses on power analysis of modern cryptographic modules. The first part contains a brief introduction to the topic of the power side channel and basic methods of analyzes. The text describes the process of comparison of modules and a short description of devices found. In the practical part two modules has been selected for the implementation of the encryption algorithm AES-128. The first module was the chip card Gemalto .NET v2 and the second one was the Raspberry Pi. A workplace has been created for these modules which allowed to measure the power consumption of the algorithm AES. Differential Power Analysis has been made using the captured results. In its conclusion the work presents the results in tables and samples of source codes. Graphs were made from the results captured on the Raspberry Pi and from the results of the Differential Power Analysis.
Power analysis attack on masked AES implementation
Jakubíková, Radka ; Dzurenda, Petr (referee) ; Martinásek, Zdeněk (advisor)
The cryptographic algorithms are commonly used as a security item today. In some situations, the special device is used to run the cryptographic algorithm, so the data are protected against the attack from the internet. Naturally, the attack can be loaded on the device as well using the side channel attack. The data are under the great danger, because nowadays plenty of power consumption analyses exist. The side channel attack uses knowledge about the cryptographic algoritm and simple or differential analysis. The diploma thesis focuses on the differential power analysis attack for the data published under the DPA contest. This thesis covers different types of analyss and attacks, and describes the new DPACv4.2 implementation. The correlation analysis is presented for the DPACv4.2 and the possible attack is discussed at the conclusion.
Drupal editing system
Procházka, Jaroslav ; Koutný, Martin (referee) ; Martinásek, Zdeněk (advisor)
My Diploma thesis deals with the content management system Drupal, further explores the open source content management systems and puts the attention on Drupal 7. Analyzed the possibility of migration of Drupal version 6 to version 7. When you migrate, you must be aware of already existing structure, Web presentations already created user accounts, Web sites, databases. In the practical part of the Thesis is carried out on the migration of the Web slide show version of Drupal 7. After the migration, checked the correctness and functionality of all modules and Web content. Deployed a new content management system Joomla 2.5. The final presentation is supplemented by the necessary modules to optimize SEO. Configured with all necessary parameters for SEO. Influence of optimization tested and evaluated in detail the results obtained. Analysis and testing focused on Google and Seznam. The results of the analysis carried out optimization of Web presentation. All of the implemented modules updated and tested for functionality. In the website is implemented a language switch, and revised the contents of the pages. Carried out a complete testing of a Web presentation.
Performance and security testing of network applications
Matej, Michal ; Martinásek, Zdeněk (referee) ; Zeman, Václav (advisor)
The aim of this Master's thesis is to design and to implement the security test in considering a resistance of the device under test to the effects of the distributed denial of service attack DDoS SYN Flood. After processing the test results is developed a protocol about security test of the device under test. In this thesis are tested two devices, namely CISCO ASA5510 firewall and a server with the specified name Server. The theoretical part of the thesis discusses the primary types of network attacks such as reconnaissance, gain access and denial of service attacks. Explained the concept of DoS and its principle, further types of DoS attacks and distributed denial of service attacks DDoS.
Differential electromagnetic analysis
Novotný, Bohumil ; Člupek, Vlastimil (referee) ; Martinásek, Zdeněk (advisor)
This diploma thesis studies the theory side channels, simple and differential analysis, and types of attacks on the side channel, which may be run against the cryptographic system. The thesis explains the principles of side channel attack on a possible defense against them. The second part of the thesis describes experimental work created, its individual components and their functions. The findings builds custom solutions attack the electromagnetic side channel using electromagnetic probes and the workplace equipment developed for this task. The final part of the thesis is devoted to the description of the implemented algorithm, a description of measurement, measurement results and possible modifications of algorithms implemented in the microcontroller for full automation of the attack on the device, against which the attack was conducted.
Electromagnetic analysis
Kolofík, Josef ; Reichert, Pavel (referee) ; Martinásek, Zdeněk (advisor)
This thesis deals with electromagnetic analysis and applications of electromagnetic side channel. The first and second part describes the basics of cryptography, function of cryptographic module and side-channel attacks. The third part discusses the electromagnetic analysis, construction of probe, a description of the laboratory workplace, the electromagnetic emission of PIC16F84A, AES and preparation for laboratory measurements. The fourth part describes specific laboratory measurements and extracting the useful signal. In the fifth part of the thesis presents the results of processing the measured values, the outputs generated by scripts and found the link between measured curves and AES encryption key. In the sixth part of the thesis are analyzed the basics of defense against side channel attack.
Side channels
Kolařík, Jan ; Sobotka, Jiří (referee) ; Martinásek, Zdeněk (advisor)
This Master Thesis deals with the side channels, AES encryption algorithm and the use of neural networks to obtain the encryption key. The first part of this work is focused on the basics of cryptography and attacks on cryptographic module. The second part is focused on electromagnetic side channel attack on PIC16F84A microcontroller with embedded AES algorithm. In this section, the Master Thesis tries to analyze electromagnetic emissions of operation S-Box in AES algorithm and try to find sensitive information to use neural network identify encryption key of the AES algorithm. In conclusion is described the software source code to determine the encryption key, summarized results and discussed ways to defend against electromagnetic side channel attack.
IP traffic performance
Bednář, František ; Martinásek, Zdeněk (referee) ; Mácha, Tomáš (advisor)
The master thesis „IP traffic performance“ is focused on traffic testing in IP networks. Theoretical section explains routing issue in an autonomous system. This work contains a detailed description of OSPF protocol. This work also deals with behavior of a link failure. There are described mechanisms that are used to link failure detection and subsequent traffic rerouting. The next section describes mechanisms to ensure quality of service. In master thesis are explained InterServ and DiffServ mechanisms. A large part is devoted to DiffServ mechanism that ensures distinction of data flows and classification packets into different classes. The routers than can process the individual data streams with different priorities. The practical section includes the design of experimental network and creation of simulation in Opnet Modeler. By using several scenarios are compared the characteristics of routing protocols and impact of QoS on the transmission characteristics of the network. Part of practical section is the improvement of OSPF protocol by adding a new metric and implementing a new metric in software suite Quagga.

National Repository of Grey Literature : 276 records found   beginprevious248 - 257nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.