National Repository of Grey Literature 4 records found  Search took 0.00 seconds. 
Power analysis attack on masked AES implementation
Jakubíková, Radka ; Dzurenda, Petr (referee) ; Martinásek, Zdeněk (advisor)
The cryptographic algorithms are commonly used as a security item today. In some situations, the special device is used to run the cryptographic algorithm, so the data are protected against the attack from the internet. Naturally, the attack can be loaded on the device as well using the side channel attack. The data are under the great danger, because nowadays plenty of power consumption analyses exist. The side channel attack uses knowledge about the cryptographic algoritm and simple or differential analysis. The diploma thesis focuses on the differential power analysis attack for the data published under the DPA contest. This thesis covers different types of analyss and attacks, and describes the new DPACv4.2 implementation. The correlation analysis is presented for the DPACv4.2 and the possible attack is discussed at the conclusion.
Perlin noise functions for generation of textures
Jakubíková, Radka ; Sysel, Petr (referee) ; Rajmic, Pavel (advisor)
This work deals with Perlin noise function in theoretical and practical way. Procedural textures can be generated by Perlin noise function. Perlin´s algorithm has many advantages, for example natural appearance, smaller demands on memory capacity and possibility of simple application on cubic objects. It is for these reasons that this technique is widely used nowadays in many varieties and improvements. We can meet these kind of textures mainly in computer games or animated movies. It is possible to create procedural textures by Perlin noise function so that they look like marble, wood or grass. Examples of these textures are generated by a program which is in the practical part of this work. The program was designed for simple presentation of procedural textures made by Perlin noise. Program can be operated via user interface, where the user can change some parameters which affect the look of the texture. The program can be used for presentation of Perlin noise to students.
Perlin noise functions for generation of textures
Jakubíková, Radka ; Sysel, Petr (referee) ; Rajmic, Pavel (advisor)
This work deals with Perlin noise function in theoretical and practical way. Procedural textures can be generated by Perlin noise function. Perlin´s algorithm has many advantages, for example natural appearance, smaller demands on memory capacity and possibility of simple application on cubic objects. It is for these reasons that this technique is widely used nowadays in many varieties and improvements. We can meet these kind of textures mainly in computer games or animated movies. It is possible to create procedural textures by Perlin noise function so that they look like marble, wood or grass. Examples of these textures are generated by a program which is in the practical part of this work. The program was designed for simple presentation of procedural textures made by Perlin noise. Program can be operated via user interface, where the user can change some parameters which affect the look of the texture. The program can be used for presentation of Perlin noise to students.
Power analysis attack on masked AES implementation
Jakubíková, Radka ; Dzurenda, Petr (referee) ; Martinásek, Zdeněk (advisor)
The cryptographic algorithms are commonly used as a security item today. In some situations, the special device is used to run the cryptographic algorithm, so the data are protected against the attack from the internet. Naturally, the attack can be loaded on the device as well using the side channel attack. The data are under the great danger, because nowadays plenty of power consumption analyses exist. The side channel attack uses knowledge about the cryptographic algoritm and simple or differential analysis. The diploma thesis focuses on the differential power analysis attack for the data published under the DPA contest. This thesis covers different types of analyss and attacks, and describes the new DPACv4.2 implementation. The correlation analysis is presented for the DPACv4.2 and the possible attack is discussed at the conclusion.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.