Národní úložiště šedé literatury Nalezeno 41 záznamů.  začátekpředchozí32 - 41  přejít na záznam: Hledání trvalo 0.01 vteřin. 
Web application on elliptic curve cryptography
Štark, Daniel ; Dzurenda, Petr (oponent) ; Ricci, Sara (vedoucí práce)
Elliptic Curve Cryptography is currently the most used form of public-key cryptography. Theoretical part of this thesis is divided to two chapters. The first chapter describes important topics from algebra and number theory, on which the Elliptic Curve Cryptography is built. This includes groups, finite fields, elliptic curves themselves and the mathematical principles of two well-known and used protocols -- ECDH and ECDSA. The second chapter describes the tools, which were used for implementation of user-friendly web application, capable of simulating fundamental operations on elliptic curves and the aforementioned protocols. Key tools, which are introduced in this chapter, are mathematics software system SageMath and framework Spring, used for implementation of web applications in Java. The third chapter of this thesis describes the way the introduced tools were used, ergo the implementation of the web application itself.
Web application on pairing-based cryptography
Mogrovics, Alexander ; Dzurenda, Petr (oponent) ; Ricci, Sara (vedoucí práce)
The aim of this thesis is to shed some light on elliptic curve cryptography via web application. It follows mathematical and algebraic principles of establishing elliptic curves over finite fields, performing computations over them and establishing bilinear pairings. It also describes the architecture and implementation of the web application, which uses website template with embedded SageMathCell in order to minimize required space. This application allows the user to preform computation of points on elliptic curve over finite field and their plot, plot of an elliptic curve over real numbers, operations over points of elliptic curves, to establish bilinear pairing, to establish 3-way Diffie--Hellman key exchange and to conduct a MOV attack.
Cryptographic Escape Room Game
Nosek, Ondřej ; Jedlička, Petr (oponent) ; Ricci, Sara (vedoucí práce)
The thesis deals with the implementation of the escape room game in the form of a~web application. The topic of each room is cryptography in many forms. Concretely it is modular arithmetic, a system for data encryption, including its particular algorithms, as~Advanced Encryption Standard is, or network security basics. The main goals of the thesis are to get acquainted with the topic of escape games, web applications, and the realization of web applications. The escape game contains a total of~four rooms. The thesis describes the choice of technologies on which the application will be built and the implementation of individual rooms, including the possibility of~solving tasks. In the end, it summarizes the achieved results and goals.
Post-Quantum Ciphers
Novosadová, Tatiana ; Ricci, Sara (oponent) ; Hajný, Jan (vedoucí práce)
The National Institute for Standards and Technology (NIST) has initiated a process to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptography algorithms through a public competition. An objective of this thesis is to study the available post-quantum algorithms for key establishment, that were published in the third round of this competition. After a proper analysis and comparison, one of the studied algorithms was implemented using available libraries for the chosen algorithm, the created program was optimized and documented.
Atributová autentizace na platformě Android
Strakoš, Jan ; Ricci, Sara (oponent) ; Malina, Lukáš (vedoucí práce)
Diplomová práce se zabývá implementací pilotního systému atributové autentizace na platformě Android. Podpora atributové autentizace na platformě Android je co do počtu implementací velmi slabá a je potřeba jí věnovat zvýšenou pozornost. V teoretické části práce je rozebrána kryptografická podpora na platformě Android, využití nástroje Android NDK (Native Development Kit) a služby HCE (Host-Card Emulation). Součástí teoretické části práce je i popis schémat systému atributové autentizace včetně pilotního systému RKVAC. Praktická část popisuje průběh implementace systému RKVAC na platformě Android společně s implementací vlastního kryptografického jádra založeného na nativní kryptografické knihovně MCL. V závěru práce jsou uvedeny výsledky měření časové, paměťové a výpočetní náročnosti vytvořených mobilních aplikací.
Web-based application for cryptographic protocols visualization
Ryšavá, Pavla ; Dzurenda, Petr (oponent) ; Ricci, Sara (vedoucí práce)
The thesis deals with the creation of an interactive web application for substitution ciphers and their interactive cryptanalysis. Six ciphers are implemented in the work. Representatives of monoalphabetic ciphers are Caesar’s cipher, Atbash, and Keyword cipher and representatives of polyalphabetic ciphers are Vigenre cipher, Kryptos and Vernam cipher. Frequency analysis, index of coincidence and n-gram statistics as a fitness function are used for interactive cryptanalysis. The result is achieved by using HTML5, CSS and ReactJS scripting language which is a JavaScript library with the ability of variable type-check.
Application for monitoring of Linux servers
Kačmarčík, Martin ; Ricci, Sara (oponent) ; Komosný, Dan (vedoucí práce)
PlanetLab Server Manager is an application helping users to develop distributed network projects using the PlanetLab network. It gives an ability to search for a server by its geographical position and access these servers. It offers functionality to render servers on world map. This thesis covers details of the PlanetLab network and its infrastructure. It describes PlanetLab Server Manager (also known as plbmng) and identifies its problems in the current version. The thesis aims to address these problems and describes all the improvements made to the application. Finally, it analyzes the overall status of PlanetLab network using the newly developed tools for status monitoring. To help enable the network projects even further, this Master thesis aims to improve the current application by re-writing it fully into Python 3 language. As the current application is implemented in Bash reimplementation requires complete re-design and re-implementation of functions and will allow to fully utilize perks of Python 3 language. Thesis also aims to extend existing functionality by adding support for filtering servers by their operational status and other small improvements. Application source code is available on GitHUB under the MIT license and the application is available in the PyPI repository as well.
Cloud computing
Bräuer, Jonáš ; Dzurenda, Petr (oponent) ; Ricci, Sara (vedoucí práce)
Security and privacy preservation of data stored on public cloud platforms is a widely addressed topic nowadays. In this thesis we explore the possible use of data splitting technique as opposed to more traditional encryption of sensitive data. Goal of this thesis is to implement and compare two already proposed protocols for matrix product computation, that use two different data splitting approaches. In addition, from these two protocols, working in non-colluding scenario, an original variant was proposed, adding colluding scenario compliance. All three protocols have been implemented using Java platform and real public cloud providers, and both performance and storage requirements have been measured.
Cryptography on Programmable Smart Cards
Wikarská, Dagmar ; Ricci, Sara (oponent) ; Hajný, Jan (vedoucí práce)
This thesis explores the topic of cryptography schemes using anonymous credentials and revocation. It uses smart cards as anonymous authentication devices with blacklist revocation. Final output of this work is an implementation of a revocation scheme CDH16 on MultOS platform. Secure authentication devices used in banking, transportation, or building access, en- hances anonymity of the user. Implemented protocols could be used as such tools, pre- venting verifier from knowing irrelevant private information. Added revocation scheme protects from misuse of revoked cards by using blacklisting. Blacklisted cards are blocked and verification fails. This requires update of all verifiers blacklist each epoch.

Národní úložiště šedé literatury : Nalezeno 41 záznamů.   začátekpředchozí32 - 41  přejít na záznam:
Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.