National Repository of Grey Literature 259 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Cryptographic algorithms for low-power IoT devices
Oszelda, Matěj ; Dobiáš, Patrik (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis analyses the possibilities of application of operating systems, cryptographic libraries and their primitives in memory, performance and computationally constrained IoT environment. It then implements selected tools for securing communication in a system with constrained IoT devices. The theoretical part discusses the IoT, the different operating systems and cryptographic libraries in this environment. It then presents the measurement and comparison of cryptographic libraries and their primitives. Based on the measurements, it selects tools for implementation in securing the communication of IoT devices. It then creates a design and implements the system.
A software tool for checking the secure settings of the parameters of the selected database
Hlavica, Adam ; Štůsek, Martin (referee) ; Šeda, Pavel (advisor)
This thesis deals with the design and implementation of a software tool for best practice database configuration checking. The theoretical part describes database technologies, their applications and existing solutions in the field of automated database configuration checking. Furthermore, possible configurations of the PostgreSQL database system are presented with a focus on security. The practical part shows the design of a program with the necessary requirements and its implementation in Python. The final chapter focuses on a practical demonstration of the program deployment.
Linux encryptor for network traffic
Suchý, Daniel ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This bachelor's thesis deals with the possibilities of encrypting network traffic on the Linux platform. The goal is to create a virtual machine that can encrypt incoming traffic and send it to it‘s destination. Encryption of network traffic was implemented using the ip-xfrm framework in the form of encryption of the packet’s payload. The encryption algorithm chosen was AES-256 with a key generated and established using QKD. For the possibility of expanding the functionality of the encryptor for multiple clients, a VPN server was implemented on the encryptor.
Cryptographic coprocessors for IoT microcontrollers communication protection
Český, Michal ; Zeman, Václav (referee) ; Slavíček, Karel (advisor)
This bachelor thesis outlines the issue of how communication can be secured within the IoT. The microcontroller itself can also be used for this purpose, however, security will never be assured as it will be when using a hardware cryptographic co-processor. To generate the keys and certificate, the ATECC608B coprocessor is chosen which holds the necessary "secrets" used to secure the communication. As a demonstration of the cryptographic coprocessor functionality, the ESP32 microcontroller is connected to the AWS server where all the connections to the server are established using the cryptographic coprocessor.
Demonstration of Cryptographic Problems through an Interactive Educational Game
Fišarová, Anežka ; Mezina, Anzhelika (referee) ; Mikulec, Marek (advisor)
The bachelor thesis is focused on the design and implementation of a cryptographic interactive educational game. It focuses on various cryptographic ciphers specifically selected so that people outside the field can be introduced to the subject in a demonstrative and entertaining way. Java and JavaFX were used as the programming language. The thesis consists of four parts, the first two are oriented towards the theoretical part of cryptography and the second two are more focused on the practical application and code development. As motivation for the players, a score for correctly cracked ciphers was used. Furthermore, the work includes a choice of difficulty, which influences which ciphers will be presented to the players. At the end of the thesis, the author reflects on the results and explores ways to further improve the methods presented.
Software support of education in cryptography area based on elliptic curves
Szturc, Jakub ; Sobotka, Jiří (referee) ; Burda, Karel (advisor)
The master‘s thesis is focusing on cryptography based on elliptical curves consists of four main parts. The first part provides an overview of the basic cryptographic and mathematical concepts. A key element of this work is the second part which are described in detail the mechanisms of counting two points on elliptic curve and counting point to themselves over the various fields. On this mechanism is based almost the entire issue. In the third section provides the best-known algorithms and protocols for key exchange, encryption and digital signature. The goal of this paper is to devise software to support teaching. This material is created as a web presentation, which described the theoretical foundations and the main characteristics of cryptosystems based on elliptical curves. The whole issue is supported by practical examples of calculations examples, there are also examples for independent work. Additionally, java applets are prepared that allow an interactive opportunity to try the basic parameters of curves, or verify the calculations.
Modeling and Simulation of Incentive Mechanisms in Ethereum
Burianová, Tereza ; Fiedor, Jan (referee) ; Perešíni, Martin (advisor)
Tématem této bakalářské práce je poplatkový mechanismus v síti Ethereum, zejména změny představeny v EIP-1559. Cílem práce je zkoumat chování mechanismu a navrhnout případná možná vylepšení v případě nalezených nedostatků. Dříve používaný aukční systém vyžadoval libovolné nastavení výše poplatku uživatelem, což vedlo k přeplatkům a vysoké volatilitě výše poplatků. Tyto problémy nastaly převážně kvůli vyššímu vytížení sítě po popularizaci projektů jako například decentralizované finance, NFT kolekce a metaverse. Nový poplatkový mechanismus zavedl proměnlivou velikost bloku, která se dokáže přizpůsobit aktuálnímu vytížení sítě. Base fee, hodnota značící minimální výši poplatku potřebnou pro zahrnutí do bloku, je pak vypočítána na základě zaplněnosti předchozího bloku, což dělá poplatky více předvídatelnými. Bylo navrženo několik simulačních experimentů, které zkoumají typické chování a možné slabiny mechanismu. Nakonec bylo nalezeno možné vylepšení a byl navržen další výzkum. Cíle práce byly splněny a výsledky byly prezentovány.
Secure data transmition using bar codes
Kratochvíl, Martin ; Herout, Adam (referee) ; Beran, Vítězslav (advisor)
The goal of this thesis was to create a system for visual data transmition using bar codes. It focuses mainly on the protection of the system against abuse. A mechanism was designed for the data transmition itself and the various security concepts. The most appropriate bar code for data transmition was selected on the basis of the analysis.
Use of Heuristics for Password Recovery with GPU Acceleration
Gazdík, Peter ; Holkovič, Martin (referee) ; Hranický, Radek (advisor)
This thesis discusses various techniques to enhance the password recovery process with GPU acceleration. The first part introduces a Markov model and simple regular expressions. These techniques dramatically reduce the password space to be searched. This is based on observations of users and their use of letters in passwords. We propose the design of a parallel algorithm that combines both techniques. Last part of the thesis contains the results of experiments to prove benefits of Markov model.
Cryptography protocol with public key
Fujdiak, Radek ; Rášo, Ondřej (referee) ; Mlýnek, Petr (advisor)
The Master thesis is an introduction to cryptology. The Thesis describe cryptosystems and selects one ideal cypher for low-power microcontroler. In thesis provides manual for instal development program COde Composer Studio, basic implementation of selected cryptosystem with small numbers and suggestion for implementation selected cyptosystem with big numbers.

National Repository of Grey Literature : 259 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.