National Repository of Grey Literature 153 records found  beginprevious41 - 50nextend  jump to record: Search took 0.00 seconds. 
Client-server password manager
Myška, Vojtěch ; Burda, Karel (referee) ; Ležák, Petr (advisor)
This bachelor thesis deals with implementation password manager with client-server architecture. Basis of thesis is proposal of graphical user interface, used keys, remote methods, server and its database, choise of used technology and programming language. The next part delas with implementation proposal of password manager.
Realization of differential power analysis
Marek, Pavel ; Dzurenda, Petr (referee) ; Martinásek, Zdeněk (advisor)
Nowadays, it is not enough to pay attention to encryption algorithm security from the mathematical aspect only. It is also necessary to pay attention to the implementation of encryption algorithm, because encryption devices can show plenty of information about implemented encryption via undesirable communication. This bachelor thesis deals with side channels issues (especially power side channel) and their use to obtain the secret key of AES encryption algorithm. For this purpose there are three operations realized in this thesis. At first, there is experimental workplace designed, which provides automatic saving of waveforms of encryption. Then there is a simple and differential power analysis of these waveforms performed. All parts are theoretically described in individual chapters. After theoretical description there is the practical part, which describes a proper realization of all tasks.
NSA Suite-B Cryptography algorithms
Rybka, Štěpán ; Malina, Lukáš (referee) ; Sobotka, Jiří (advisor)
This thesis entitled Algorithms Group SuiteB NSA Cryptography deals with algorithms, which are included in the set SuiteB. They serve to increase data protection and security during their transmission over an unsecured Internet environment. It also contains analysis of these algorithms, the encryption, decryption, creating hashes, key exchange, creating a signature and its verification. The algorithms are compared with others, already obsolete, or still used. The following are protocols using these algorithms. Output from the practical part is a web presentation that can serve as a teaching material.
Simulations of impact of security requirements on industrial system performance
Loskot, Michal ; Blažek, Petr (referee) ; Mlýnek, Petr (advisor)
Safety and security is always a hot topic in the world of information security, but only a few solve how much cryptographic algorithms affect the performance of systems. Newer longer-key algorithms may provide more security, but it takes longer to encrypt data, that is, they may contain extra bits, which increases transfer time and uses more memory to store additional information. This bachelor thesis is focused on the analysis of the impact of the security requirements of the ANSI/ISA-62443 standard on the performance of industrial systems. Communication is simulated in which cryptographic algorithms AES and SHA were used. These simulations are carried out in the open source simulation tool TTool, which enables embedded systems, hardware and software modeling, and simple simulations directly from UML and SysML diagrams.
Optimization options for low-power microcontrollers
Dufek, Michal ; Mlýnek, Petr (referee) ; Fujdiak, Radek (advisor)
This bachelor thesis is concerned with optimization options for microcontroller MSP430 using the program CCS. The introductory section contains description of symmetric and asymetric algorithms and their comparison. In another section there is description of AES algorithm and his operation modes. The practical part deals with optimization options of program CCS, there are also mentioned reached results of VUT and TI implementations and their comparison. In the end of practical part there is performed optimization code for implementation of VUT, which is focused to reduce cycles.
Post-quantum cryptography on constrained devices
Matula, Lukáš ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In recent years, there has been a lot of technological development, which among other things, brings the designs and implementation of quantum computing. Using Shor’s algorithm for quantum computing, it is highly likely that the mathematical problems, which underlie the cryptographic systems, will be computed in polynomial time. Therefore, it is necessary to pay attention to the development of post-quantum cryptography, which is able to secure systems against quantum attacks. This work includes the summary and the comparison of different types of post-quantum cryptography, followed by measuring and analysing its levels of difficulty in order to implement them into limited devices, such as smart cards. The measured values on the PC are used to determine the most suitable implementation on the circuit card and then the verification method itself is implemented on it.
Modern access control system
Vomáčka, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
The thesis describes the design of scheme for access system with user authentication via smart cards. The first chapter explains various types of identification items used for authentication of users and different types of readers and terminals, followed by chapter 2 with a deeper insight on smart cards with focus on their types, what internal structure and principle of communication with card readers are used, etc. with primary focus on Java cards. The third chapter describes Java Card cryptography - especially elliptic curve cryptography used on this platform. The fourth part focuses on PACE protocol with subsections dedicated to the individual parts of the protocol and its applicability to smart cards environment. Chapter 5 explains the proposed design of the authentication scheme elaborated in the thesis, including a detailed description of specific parts, their funcionality and exemplary usage in the created applications.
Comparison of cryptography performance of microcontrollers ARM Cortex-A
Škurla, Tomáš ; Zeman, Václav (referee) ; Slavíček, Karel (advisor)
The bachelor thesis deals with the measurement of cryptographic performance of ARM Cortex-A series microcontrollers. The theoretical part focuses on the description of concepts of cryptography, while at the same time explaining the principles of operation of individual cryptographic systems. Afterwards, thesis also describes the inner workings of ARM processors, their historical development, support for cryptography and detection of said support within processors. This is followed by defining the metrics for testing, part of which includes enumerating the hardware used in the testing process, with the focus being on the cryptography acceleration and encryption support. This also includes a description of the planned environment and software used in the testing. The practical part includes a description of the actual preparation of the defined environment and its possible modifications within the individual testing needs. The thesis concludes with an evaluation of the processed data and subsequent drawing of conclusions
Secure converter for an RS-232 standard to the Internet
Pokorný, Michal ; Mlýnek, Petr (referee) ; Koutný, Martin (advisor)
Master´s thesis tries to find a solution to make a secure transmission channel between virtual serial ports on the personal computer and the serial ports on the Rabbit RCM3700 development KIT. Today’s communications channels don't offer appropriate security of a whole communication. Therefore it depends on get-togethers, in order to realize this security themselves. This security means ensuring reliable transmission of data to be encrypted between parties so that any attacker is not able to read real-time, or eventually change them. As a result of this Master thesis is the design and implementation, which in addition to encryption algorithm provides sufficient security and authenticity of communication between the parties. As an encryption algorithm has been chosen widely used AES algorithm and as authentication algorithm has been chosen algorithm, which for authenticity requires knowledge of the secret key.
Analysis of Encipherement Methods for Disk Cloning
Chromečka, Jiří ; Černý, Martin (referee) ; Drahanský, Martin (advisor)
The presented text deals with designing of a multilingual application and its following implementation in the C++ language. The application encrypts disk volumes with Microsoft Windows system using symmetric cryptography and password authentication, where the password security strength is verified. Securing the sensitive data is one of the important security goals in area of information technology. The symmetric cryptography uses the same key for both the encryption and the decryption and due to its speed it is suitable for the data storage encryption. For the higher security it is possible to encrypt a whole disk volume with sensitive data.

National Repository of Grey Literature : 153 records found   beginprevious41 - 50nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.