National Repository of Grey Literature 136 records found  beginprevious116 - 125nextend  jump to record: Search took 0.01 seconds. 
Methods of post-quantum cryptography
Popelová, Lucie ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In the last decades there has been such a fundamental development in the technologies including postquantum technologies. In case that the Shor algorithm would be used on quantum computers it is likely to solve mathematical problems in real time which are major for our security. It is necessary to focus on postquantum cryptography, which is able to resist quantum attacks and secure our systems. This work analyses and compares different types of postquantum cryptography. Afterwards this work chooses postquantum protocols which are measured and analysed on the PC and IoT device. Furthemore data are used to find the most effective postquantum protocol for key exchange and signature scheme.
Cryptographic protocols for privacy protection
Hanzlíček, Martin ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
This work focuses on cryptographic protocol with privacy protection. The work solves the question of the elliptic curves and use in cryptography in conjunction with authentication protocols. The outputs of the work are two applications. The first application serves as a user and will replace the ID card. The second application is authentication and serves as a user authentication terminal. Both applications are designed for the Android operating system. Applications are used to select user attributes, confirm registration, user verification and show the result of verification.
Privacy protection in cloud
Chernikau, Ivan ; Smékal, David (referee) ; Dzurenda, Petr (advisor)
In the Master’s thesis were described privacy protection problems while using cloud technologies. Some of the problems can be solved with help of homomorphic encryption, data splitting or searchable encryption. These techniques were described and compared by provided security, privacy protection and efficiency. The data splitting technique was chosen and implemented in the C language. Afterwards a performance of the implemented solution was compared to AES encryption/decryption performance. An application for secured data storing in cloud was designed and implemented. This application is using the implemented data splitting technique and third-party application CloudCross. The designed application provides command line interface (CLI) and graphical user interface (GUI). GUI extends the capabilities of CLI with an ability to register cloud and with an autodetection of registered clouds. The process of uploading/downloading the data to/from cloud storage is transparent and it does not overload the user with technical details of used data splitting technique.
Zero knowledge authentication
Bošeľa, Jaroslav ; Hajný, Jan (referee) ; Dzurenda, Petr (advisor)
This thesis looks to authentication, principle and basic divison. Another part of thesis looks to Zero–Knowledge protocols, which protocols with zero information, their analysis and base elements, also thesis presents technology Bluetooth Low Energy, specification of this technology in transmission simple data between computer Raspberry Pi 2 and mobile phone. The practical part of thesis works on experiment of sending simple data between Raspberry 2 and Android phone.
Secure User Authentication Using Smart Cards
Koutný, Tomáš ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
This thesis deals with Basic Card problém and their analysis in terms of the offered features cryptographic security measures. Elliptic curve method was used in this thesis. The thesis contains design of authentication protocol and its implementation.
Authentication in the IoT
Drápela, Roman ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
Bachelor thesis focuses on authentication in the IoT. Some of the authentication protocols from the area of IoT are introduced at the beginning of the thesis. Next part of the thesis describes the NFC and BLE technologies, which can be applied in the IoT. Multi-device protocol is implemented using different devices (PC, mobile phone, SmartWatch). This protocol enables autentication based on the processes above the elliptic curves. Two sets of measurements (simulated and practical) are provided. In the final part of the thesis all the results are assessed.
Bluetooth device security testing
Hlaváček, Jan ; Martinásek, Zdeněk (referee) ; Dzurenda, Petr (advisor)
The aim of the thesis is analysis and inventory security risks of Bluetooth technology, assembly Bluetooth adapter and proposal and poposal of testing procedures, which will helps evaluate security of tested device.
Privacy protection in cloud
Chernikau, Ivan ; Smékal, David (referee) ; Dzurenda, Petr (advisor)
In the Master’s thesis were described privacy protection problems while using cloud technologies. Some of the problems can be solved with help of homomorphic encryption, data splitting or searchable encryption. These techniques were described and compared by provided security, privacy protection and efficiency. The data splitting technique was chosen and implemented in the C language. Afterwards a performance of the implemented solution was compared to AES encryption/decryption performance. An application for secured data storing in cloud was designed and implemented. This application is using the implemented data splitting technique and third-party application CloudCross. The designed application provides command line interface (CLI) and graphical user interface (GUI). GUI extends the capabilities of CLI with an ability to register cloud and with an autodetection of registered clouds. The process of uploading/downloading the data to/from cloud storage is transparent and it does not overload the user with technical details of used data splitting technique.
The prevention of cyberbullying
Škunda, Patrik ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
The main objective of the bachelor thesis is to create a mobile application for Android devices, which has a playful way to instruct the user about the potential dangers of the Internet and thus the prevention of cyberbullying. The first chapter is about the issue of cyberbullying, describes the characteristics, methods, tools and impacts. The next chapter describes how to protect internet user to avoid becoming a victim of cyber-bullying and advices on how to behave when the user is already a victim of cyberbullying. The third chapter is devoted to application design and implementation details. The fourth chapter describes and graphically shows the results of testing applications.
Realization of differential power analysis
Marek, Pavel ; Dzurenda, Petr (referee) ; Martinásek, Zdeněk (advisor)
Nowadays, it is not enough to pay attention to encryption algorithm security from the mathematical aspect only. It is also necessary to pay attention to the implementation of encryption algorithm, because encryption devices can show plenty of information about implemented encryption via undesirable communication. This bachelor thesis deals with side channels issues (especially power side channel) and their use to obtain the secret key of AES encryption algorithm. For this purpose there are three operations realized in this thesis. At first, there is experimental workplace designed, which provides automatic saving of waveforms of encryption. Then there is a simple and differential power analysis of these waveforms performed. All parts are theoretically described in individual chapters. After theoretical description there is the practical part, which describes a proper realization of all tasks.

National Repository of Grey Literature : 136 records found   beginprevious116 - 125nextend  jump to record:
See also: similar author names
10 Dzurenda, Petr
Interested in being notified about new results for this query?
Subscribe to the RSS feed.