National Repository of Grey Literature 269 records found  beginprevious238 - 247nextend  jump to record: Search took 0.01 seconds. 
Broadband services over power lines
Svoboda, Jan ; Martinásek, Zdeněk (referee) ; Stančík, Peter (advisor)
The Bachelor´s thesis is intend on assembly of basic informations from area of PLC systems. It envisages the modern problems in area of communication on the energy supply networks. By the aim is provide compact informations about particular areas of usage PLC systems – both in a household, an automatic exercises and in a possibilities of broadband. The first part of thesis includes the theoretical informations about PLC network. The second part considers by testing of basic parameters PLC network. Of all the made measurements are draw conclusions and valorize the usability of metering devices.
Applications for parallel processing in cryptography
Šánek, Jaromír ; Martinásek, Zdeněk (referee) ; Hajný, Jan (advisor)
This thesis is about parallel programming. In the first part of the thesis is compared speed of functions modular exponentiation from various C/C++ libraries for CPU. In the second part is transformed the LibTomMath library from CPU to GPU CUDA technology. For devices CPU and GPU is compared speed of processing the operation of modular exponentiation from modified library. In conclusion are created two applications “Client –Server” for computing the revocation function of the protocol HM12.
Classifiers of power patterns
Zapletal, Ondřej ; Člupek, Vlastimil (referee) ; Martinásek, Zdeněk (advisor)
Over the last several years side-channel analysis has emerged as a major threat to securing sensitive information in cryptographic devices. Several side-channels have been discovered and used to break implementations of all major cryptographic algorithms (AES, DES, RSA). This thesis is focused on power analysis attacks. A variety of power analysis methods has been developed to perform these attacks. These methods include simple power analysis (SPA), differential power analysis (DPA), template attacks, etc. This work provides comprehensive survey of mentioned methods and also investigates the application of a machine learning techniques in power analysis. The considered learning techniques are neural networks and support vector machines. The final part of this thesis is dedicated to implemenation of the attack against protected software AES implementation which is used in the DPA Contest.
Formal analysis of cryptographic protocols
Petrovský, Peter ; Martinásek, Zdeněk (referee) ; Člupek, Vlastimil (advisor)
This diploma thesis deals with cryptography. It describes its basic allocation and problems of number theory that needs to be addressed. It also deals with methods used to review the formal security of cryptographic protocols from a mathematical point of view. It analyse the tools used to automatic and semi-automatic evaluation of the safety of cryptographic protocols. It describes the process of working with these tools and finally test the security of protocols Kerberos, EKE and Unilateral authentication using symmetric cryptography, HMAC function and hash function. These tests are in tools AVISPA, ProVerif and Scyther. At the end is comparison of results.
Protection of highspeed communication systems
Smékal, David ; Martinásek, Zdeněk (referee) ; Hajný, Jan (advisor)
The diploma thesis deals with 128–bit AES data encryption and its implementation in FPGA network card using VHDL programming language. The theoretical part explains AES encryption and decryption, its individual steps and operating modes. Further was described the VHDL programming language, development environment Vivado, FPGA network card Combo–80G and configurable framework NetCOPE. The practical part is the implementation of AES–128 in VHDL. A simulation was used to eliminate errors, then the synthesis was performed. These steps were made using Vivado software. Last step of practical part was testing of synthesized firmware on COMBO–80G card. Total of 4 projects were implemented in FPGA card. Two of them were AES encryption and decryption with ECB mode and another two describe the encryption and decryption with CBC mode.
Cryptanalysis of modern cryptographic devices
Fördős, András ; Člupek, Vlastimil (referee) ; Martinásek, Zdeněk (advisor)
The thesis focuses on power analysis of modern cryptographic modules. The first part contains a brief introduction to the topic of the power side channel and basic methods of analyzes. The text describes the process of comparison of modules and a short description of devices found. In the practical part two modules has been selected for the implementation of the encryption algorithm AES-128. The first module was the chip card Gemalto .NET v2 and the second one was the Raspberry Pi. A workplace has been created for these modules which allowed to measure the power consumption of the algorithm AES. Differential Power Analysis has been made using the captured results. In its conclusion the work presents the results in tables and samples of source codes. Graphs were made from the results captured on the Raspberry Pi and from the results of the Differential Power Analysis.
Power analysis attack on masked AES implementation
Jakubíková, Radka ; Dzurenda, Petr (referee) ; Martinásek, Zdeněk (advisor)
The cryptographic algorithms are commonly used as a security item today. In some situations, the special device is used to run the cryptographic algorithm, so the data are protected against the attack from the internet. Naturally, the attack can be loaded on the device as well using the side channel attack. The data are under the great danger, because nowadays plenty of power consumption analyses exist. The side channel attack uses knowledge about the cryptographic algoritm and simple or differential analysis. The diploma thesis focuses on the differential power analysis attack for the data published under the DPA contest. This thesis covers different types of analyss and attacks, and describes the new DPACv4.2 implementation. The correlation analysis is presented for the DPACv4.2 and the possible attack is discussed at the conclusion.
Drupal editing system
Procházka, Jaroslav ; Koutný, Martin (referee) ; Martinásek, Zdeněk (advisor)
My Diploma thesis deals with the content management system Drupal, further explores the open source content management systems and puts the attention on Drupal 7. Analyzed the possibility of migration of Drupal version 6 to version 7. When you migrate, you must be aware of already existing structure, Web presentations already created user accounts, Web sites, databases. In the practical part of the Thesis is carried out on the migration of the Web slide show version of Drupal 7. After the migration, checked the correctness and functionality of all modules and Web content. Deployed a new content management system Joomla 2.5. The final presentation is supplemented by the necessary modules to optimize SEO. Configured with all necessary parameters for SEO. Influence of optimization tested and evaluated in detail the results obtained. Analysis and testing focused on Google and Seznam. The results of the analysis carried out optimization of Web presentation. All of the implemented modules updated and tested for functionality. In the website is implemented a language switch, and revised the contents of the pages. Carried out a complete testing of a Web presentation.
Performance and security testing of network applications
Matej, Michal ; Martinásek, Zdeněk (referee) ; Zeman, Václav (advisor)
The aim of this Master's thesis is to design and to implement the security test in considering a resistance of the device under test to the effects of the distributed denial of service attack DDoS SYN Flood. After processing the test results is developed a protocol about security test of the device under test. In this thesis are tested two devices, namely CISCO ASA5510 firewall and a server with the specified name Server. The theoretical part of the thesis discusses the primary types of network attacks such as reconnaissance, gain access and denial of service attacks. Explained the concept of DoS and its principle, further types of DoS attacks and distributed denial of service attacks DDoS.
Differential electromagnetic analysis
Novotný, Bohumil ; Člupek, Vlastimil (referee) ; Martinásek, Zdeněk (advisor)
This diploma thesis studies the theory side channels, simple and differential analysis, and types of attacks on the side channel, which may be run against the cryptographic system. The thesis explains the principles of side channel attack on a possible defense against them. The second part of the thesis describes experimental work created, its individual components and their functions. The findings builds custom solutions attack the electromagnetic side channel using electromagnetic probes and the workplace equipment developed for this task. The final part of the thesis is devoted to the description of the implemented algorithm, a description of measurement, measurement results and possible modifications of algorithms implemented in the microcontroller for full automation of the attack on the device, against which the attack was conducted.

National Repository of Grey Literature : 269 records found   beginprevious238 - 247nextend  jump to record:
See also: similar author names
1 Martinasek, Z.
6 Martinasek, Zdenek
Interested in being notified about new results for this query?
Subscribe to the RSS feed.