National Repository of Grey Literature 152 records found  beginprevious31 - 40nextend  jump to record: Search took 0.01 seconds. 
Side channels
Kolařík, Jan ; Sobotka, Jiří (referee) ; Martinásek, Zdeněk (advisor)
This Master Thesis deals with the side channels, AES encryption algorithm and the use of neural networks to obtain the encryption key. The first part of this work is focused on the basics of cryptography and attacks on cryptographic module. The second part is focused on electromagnetic side channel attack on PIC16F84A microcontroller with embedded AES algorithm. In this section, the Master Thesis tries to analyze electromagnetic emissions of operation S-Box in AES algorithm and try to find sensitive information to use neural network identify encryption key of the AES algorithm. In conclusion is described the software source code to determine the encryption key, summarized results and discussed ways to defend against electromagnetic side channel attack.
Application for secure data storage for mobile devices
Kocáb, Marek ; Martinásek, Zdeněk (referee) ; Mácha, Tomáš (advisor)
This bachelor’s thesis is focused on the creation of application for secure data storage for mobile devices. The paper theoretically describes operating system according to users popularity and programming languages. The following section explains AES encryption standard and its principle of data encryption and decryption. In the practical part is created a PINapplication programm. The application allows user to store sensitive data using chosen password. It is possible to save new data or erase current data. These data are encrypted by mentioned AES standard. The application is programmed in Java language with the version for mobile devices (J2ME).
Encrypting Landlines Phone Communication
Vávra, Jakub ; Kumpošt, Marek (referee) ; Cvrček, Daniel (advisor)
This master's thesis is about making draft and implementing land-line phone call encryption using FITkit. The ultimate goal is to find suitable compression and encryption methods, implement or adapt them for FITkit board and create functional solution.
Microelectronics Time-Space Authentication Techniques
Jaroš, David ; Burda, Karel (referee) ; Sýkora, Jiří (referee) ; Kuchta, Radek (advisor)
This dissertation work focusses on using information about the location of the user during the authentication process on computer networks. With the growth of mobile computer devices over the last two decades the physical location of users is becoming one of the main issues for access management. This work researches existing solutions which are divided in to two groups related to the source of location information (SATNAV systems for example GPS and based on communication with active infrastructure such as GSM, Wi-Fi). This work shows the methodology for evaluating authentication data which use the principle of fuzzy logic. In comparison with binary logic it is possible to evaluate authentication data accurately. As a result of the authentication process the information is of a higher value, which can be taken into account when setting the levels of user privileges. An important aspect of working with location information is that the user is located in the same place and from where they are asking for access to the system. Solving this question could be linking user biometrics for example finger prints. This principle is used in two types of microelectronic authentication terminals which were developed in conjunction with this work. The first type of terminal uses a SATNAV receiver and an ISM wireless communication module as a source of location information. On the first type of authentication terminal newly developed authentication techniques were tested. The users biometrics are checked by finger print sensor with embedded processing. In the second type authentication terminal a Wi-Fi and GSM module were added for location purposes. In the conclusion of this dissertation the testing methodology of the data authorization and evaluation process of the second type of microelectronic authentication terminal is shown. This confirms the practicality of the suggested methodology and the time-space information in the authentication process.
Study of CO oxidation on platinum by Auger spectroscopy
Hrůza, Dominik ; Voborný, Stanislav (referee) ; Bábor, Petr (advisor)
In the presented bachelor thesis, I deal with the study of the oxidation of carbon monoxide on platinum using Auger spectroscopy. In the introduction, I will describe the used methods. Furthermore, I theoretically describe the investigated reaction and indicate the measurements for a better understanding of the reaction. Then I will establish an experimental part, where I deal with the growth of graphene structures. This will be followed up by performing in-situ observations of the reaction with and without the presence of graphene. These measurements I compare and then analyse the surface composition during the reaction. Finally, I will create a methodology that can distinguish the individual molecules on the surface of the catalyst.
Virtual serial port and its safety conversion to Ethernet
Pokorný, Michal ; Krajsa, Ondřej (referee) ; Koutný, Martin (advisor)
Bachelor´s thesis try to find a solution to make virtual serial port and its safe transfer on Ethernet. Nowdays communications channels don't offer appropriate security of a whole communication. Therefore it depends on get-togethers, in order to realize this security themselves.This means ensure reliable data transfer, these data from among get-togethers encrypt in order to appropriate attacher be unable to read them in real - time, eventually to change them. As a result this Bachelor thesis is the application, which, except transfer between virtual serial port and Ethernet, insure authentication among get - togehthers communication and cipher transfer among them. As an encryption algorithm is used algorithm AES. It is concerned symmetrical cipher, which ciphers data after pages about size 128 byte.
.NET/C# program for teaching and explaining the function of AES cipher
Ondrejech, Martin ; Lattenberg, Ivo (referee) ; Burda, Karel (advisor)
This work is focused on cipher algorithm AES, his selection method and description of cipher blocks, possibilities of .NET framework and current implementation of AES algorithm in C#. The book also contain complete application for teaching and explanation of AES cipher.
Cryptography Acceleration Using GPU
Potěšil, Josef ; Čejka, Rudolf (referee) ; Lampa, Petr (advisor)
The reader will be familiar with selected concepts of cryptography consited in this work. AES algorithm was selected in conjunction with the description of architecture and software for programming graphic cards (CUDA, OpenCL), in order to create its GPU-accelerated version. This thesis tries to map APIs for communication with crypto-coprocessors, which exist in kernels of Linux/BSD operating systems (CryptoAPI, OCF). It examines this support in the cross-platform OpenSSL library. Subsequently, the work discusses the implementation details, achieved results and integration with OpenSSL library. The conclusion suggests how the developed application could be used and briefly suggests its usage directly by the operating system kernel.
Analysis of Cryptographic Algorithms 802.11
Vojtíšek, Jindřich ; Sobek, Jiří (referee) ; Novotný, Bohumil (advisor)
This work deals with wireless standard 802.11, primaly about security algorithms used in them. Further there is made analysis of algorithms WEP, WPA and WPA2. This algorithms are described how coding by them works and for easier understandig are added block schemes of their principles. In practical part is realized algorithms WEP, WPA and WPA2 in program Matlab simulink. Model is complemented by graphs which shows how data changes when comming throught this systems.
Client-server password manager
Myška, Vojtěch ; Burda, Karel (referee) ; Ležák, Petr (advisor)
This bachelor thesis deals with implementation password manager with client-server architecture. Basis of thesis is proposal of graphical user interface, used keys, remote methods, server and its database, choise of used technology and programming language. The next part delas with implementation proposal of password manager.

National Repository of Grey Literature : 152 records found   beginprevious31 - 40nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.