National Repository of Grey Literature 152 records found  beginprevious133 - 142next  jump to record: Search took 0.01 seconds. 
HiFi DA Converter with Integrated Headphone Amplifier
Doležal, Pavel ; Jaroš, Jiří (referee) ; Šimek, Václav (advisor)
This thesis is dealing with a design and fabrication of D/A coverter and headphone amplifier for stereo reproduction in Hi-Fi class. In opening chapter, overall problematics of digital audio signal distribution is discussed. Following chapters are dedicated to converter design, communication protocols, component selection, converter production, circuitry design and firmware programming. The final chapter is dealing with expansion options such as HDMI inputs and surround sound.
Encrypting Landlines Phone Communication
Vávra, Jakub ; Kumpošt, Marek (referee) ; Cvrček, Daniel (advisor)
This master's thesis is about making draft and implementing land-line phone call encryption using FITkit. The ultimate goal is to find suitable compression and encryption methods, implement or adapt them for FITkit board and create functional solution.
Implementation of Encryption Algorithms in VHDL Language
Kožený, Petr ; Martínek, Tomáš (referee) ; Kořenek, Jan (advisor)
This thesis deals with design and implementation of AES and DES encryption architectures for embedded systems. Architectures are implemented in VHDL language and design for FPGA technology. The proposed implementations are mapped on the Xilinx Spartan 3 technology. Both architectures are applied in simple ECB (Electronic Codebook) scheme with cache memories. A maximum throughput of design DES architecture 370 Mbps is achived with clock frequency of 104 MHz. The throughput of AES architecture at the maximum clock frequency of 118 MHz is 228 Mbps. Compared to software implementations for embedded systems, we achieve significantly higher throughput for both architectures.
Microelectronics Time-Space Authentication Techniques
Jaroš, David ; Burda, Karel (referee) ; Sýkora, Jiří (referee) ; Kuchta, Radek (advisor)
This dissertation work focusses on using information about the location of the user during the authentication process on computer networks. With the growth of mobile computer devices over the last two decades the physical location of users is becoming one of the main issues for access management. This work researches existing solutions which are divided in to two groups related to the source of location information (SATNAV systems for example GPS and based on communication with active infrastructure such as GSM, Wi-Fi). This work shows the methodology for evaluating authentication data which use the principle of fuzzy logic. In comparison with binary logic it is possible to evaluate authentication data accurately. As a result of the authentication process the information is of a higher value, which can be taken into account when setting the levels of user privileges. An important aspect of working with location information is that the user is located in the same place and from where they are asking for access to the system. Solving this question could be linking user biometrics for example finger prints. This principle is used in two types of microelectronic authentication terminals which were developed in conjunction with this work. The first type of terminal uses a SATNAV receiver and an ISM wireless communication module as a source of location information. On the first type of authentication terminal newly developed authentication techniques were tested. The users biometrics are checked by finger print sensor with embedded processing. In the second type authentication terminal a Wi-Fi and GSM module were added for location purposes. In the conclusion of this dissertation the testing methodology of the data authorization and evaluation process of the second type of microelectronic authentication terminal is shown. This confirms the practicality of the suggested methodology and the time-space information in the authentication process.
Application for secure data storage for mobile devices
Kocáb, Marek ; Martinásek, Zdeněk (referee) ; Mácha, Tomáš (advisor)
This bachelor’s thesis is focused on the creation of application for secure data storage for mobile devices. The paper theoretically describes operating system according to users popularity and programming languages. The following section explains AES encryption standard and its principle of data encryption and decryption. In the practical part is created a PINapplication programm. The application allows user to store sensitive data using chosen password. It is possible to save new data or erase current data. These data are encrypted by mentioned AES standard. The application is programmed in Java language with the version for mobile devices (J2ME).
Application of metallic materials for selective growth
Němeček, Tomáš ; Rezek, Bohuslav (referee) ; Čechal, Jan (advisor)
The Si(100) surface and Ga surface phases up to 1 ML on their oxidation have been studied by XPS and LEED. The selective growth of Ga on the SiO2/Si structures fabricated by EBL has been analyzed using SEM and AFM methods. It was proved that Ga clusters grow in structures beside the oxide. The structure of alumina on Ni3Al(111) and NiAl(110) substrates was fully determined by combining the results of STM measurements and DFT simulations. It was determined the alumina/NiAl(110) does not form a suitable template for ordered Fe and Co clusters growth. However, the next research confirmed the alumina/Ni3Al(111) forms template appropriate to clusters growth purpose.
Analysis of Cryptographic Algorithms 802.11
Vojtíšek, Jindřich ; Sobek, Jiří (referee) ; Novotný, Bohumil (advisor)
This work deals with wireless standard 802.11, primaly about security algorithms used in them. Further there is made analysis of algorithms WEP, WPA and WPA2. This algorithms are described how coding by them works and for easier understandig are added block schemes of their principles. In practical part is realized algorithms WEP, WPA and WPA2 in program Matlab simulink. Model is complemented by graphs which shows how data changes when comming throught this systems.
Protection of highspeed communication systems
Smékal, David ; Martinásek, Zdeněk (referee) ; Hajný, Jan (advisor)
The diploma thesis deals with 128–bit AES data encryption and its implementation in FPGA network card using VHDL programming language. The theoretical part explains AES encryption and decryption, its individual steps and operating modes. Further was described the VHDL programming language, development environment Vivado, FPGA network card Combo–80G and configurable framework NetCOPE. The practical part is the implementation of AES–128 in VHDL. A simulation was used to eliminate errors, then the synthesis was performed. These steps were made using Vivado software. Last step of practical part was testing of synthesized firmware on COMBO–80G card. Total of 4 projects were implemented in FPGA card. Two of them were AES encryption and decryption with ECB mode and another two describe the encryption and decryption with CBC mode.
Cryptanalysis of modern cryptographic devices
Fördős, András ; Člupek, Vlastimil (referee) ; Martinásek, Zdeněk (advisor)
The thesis focuses on power analysis of modern cryptographic modules. The first part contains a brief introduction to the topic of the power side channel and basic methods of analyzes. The text describes the process of comparison of modules and a short description of devices found. In the practical part two modules has been selected for the implementation of the encryption algorithm AES-128. The first module was the chip card Gemalto .NET v2 and the second one was the Raspberry Pi. A workplace has been created for these modules which allowed to measure the power consumption of the algorithm AES. Differential Power Analysis has been made using the captured results. In its conclusion the work presents the results in tables and samples of source codes. Graphs were made from the results captured on the Raspberry Pi and from the results of the Differential Power Analysis.
.NET/C# program for teaching and explaining the function of AES cipher
Ondrejech, Martin ; Lattenberg, Ivo (referee) ; Burda, Karel (advisor)
This work is focused on cipher algorithm AES, his selection method and description of cipher blocks, possibilities of .NET framework and current implementation of AES algorithm in C#. The book also contain complete application for teaching and explanation of AES cipher.

National Repository of Grey Literature : 152 records found   beginprevious133 - 142next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.