National Repository of Grey Literature 11 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Asymmetric Cryptography on FPGA
Dobiáš, Patrik ; Smékal, David (referee) ; Malina, Lukáš (advisor)
This bachelor thesis deals with the analysis of existing hardware implementations of asymmetric cryptographic schemes on the FPGA platform and the then implementation of the cryptographic scheme Ed25519 on this platform. The resulting implementation is described in detail and compared with existing implementations. At the end of this work, the deployment of this implementation on the Virtex UltraScale+ FPGA is described.
Postquantum Cryptography on the FPGA Platform
Dobiáš, Patrik ; Jedlička, Petr (referee) ; Malina, Lukáš (advisor)
This master thesis deals with the hardware implementations of post-quantum cryptogra- phy schemes on FPGA platforms. After the initial comparison of the candidate schemes for NIST standardization and the analysis of the previous work focusing on these schemes, Crystals-KYBER scheme was chosen and implemented. All scheme algorithms have been implemented inside a single component, minimizing resource utilization. The results of this implementation were analyzed and compared with the existing implementations. At the end of this work, the implemented scheme was deployed on Virtext UltraScale+ and tested for the use during mutually authenticated key exchange (AKE).
Authentication using mobile application and BLE technology
Žigrai, Martin ; Ilgner, Petr (referee) ; Dobiáš, Patrik (advisor)
The main idea of this bachelor's thesis is the design and development of a cross-platform mobile application. This mobile application is intended for vehicle reservation and authentication for accessing the vehicle. The goal of the application is to provide a simple and reliable environment for users to quickly and easily search for and reserve a specific vehicle. The mobile application communicates with the vehicle using BLE technology. To ensure the security and confidentiality of communication, cryptographic primitives such as AES and SHA have been utilized. The bachelor's thesis includes an overview of mobile application development, development tools, an overview of cryptographic primitives, and Bluetooth technology. Another part is the design of the mobile application, an overview of cryptographic libraries in Flutter, and the implementation of the mobile application.
Application for collecting security event logs from computer infrastructure
Žernovič, Michal ; Dobiáš, Patrik (referee) ; Safonov, Yehor (advisor)
Computer infrastructure runs the world today, so it is necessary to ensure its security, and to prevent or detect cyber attacks. One of the key security activities is the collection and analysis of logs generated across the network. The goal of this bachelor thesis was to create an interface that can connect a neural network to itself to apply deep learning techniques. Embedding artificial intelligence into the logging process brings many benefits, such as log correlation, anonymization of logs to protect sensitive data, or log filtering for optimization a SIEM solution license. The main contribution is the creation of a platform that allows the neural network to enrich the logging process and thus increase the overall security of the network. The interface acts as an intermediary step to allow the neural network to receive logs. In the theoretical part, the thesis describes log files, their most common formats, standards and protocols, and the processing of log files. It also focuses on the working principles of SIEM platforms and an overview of current solutions. It further describes neural networks, especially those designed for natural language processing. In the practical part, the thesis explores possible solution paths and describes their advantages and disadvantages. It also analyzes popular log collectors (Fluentd, Logstash, NXLog) from aspects such as system load, configuration method, supported operating systems, or supported input log formats. Based on the analysis of the solutions and log collectors, an approach to application development was chosen. The interface was created based on the concept of a REST API that works in multiple modes. After receiving the records from the log collector, the application allows saving and sorting the records by origin and offers the user the possibility to specify the number of records that will be saved to the file. The collected logs can be used to train the neural network. In another mode, the interface forwards the logs directly to the AI model. The ingestion and prediction of the neural network are done using threads. The interface has been connected to five sources in an experimental network.
Laboratory exercise of the biometric access control system
Volf, Jakub ; Dobiáš, Patrik (referee) ; Burda, Karel (advisor)
This thesis deals with the topic of biometric access control. The theoretical part of the thesis first describes electronic access control in general, followed by access control based on human biometric traits. Legislation and the development of biometric control representation in the market are briefly mentioned in this work. Based on the provided components, a panel is designed and manufactured in the practical part. The individual components are implemented in the panel and connected according to the manual. This assembly thus forms a functional system for biometric access control, which will be used as one of the laboratory tasks in educational classes. There is a written method, based on the laboratory task, specifically designed for student and a documentation for the teacher on how to operate this system.
Random Number Generation on Smart Cards
Suchomelová, Radka ; Dobiáš, Patrik (referee) ; Malina, Lukáš (advisor)
This Bachelor's thesis focuses on the testing of the outputs of smart cards random number generators. The theoretical section of the thesis covers the problematics of random numbers generating and its testing, as well as descriptions of several types of programmable smart cards. The thesis compares various tools for testing the quality of randomnes and describes the changes in the Python implementation of the testing suite NIST STS. The thesis includes description of the created application for the automatic testing of the number generated by JavaCard and BasicCard cards. This application was used for the testing of 7 cards for this thesis. The testing revealed that the tested generators do not generate perfectly random sequences, but their quality is somewhat acceptable in most cases.
Hardware generator for cryptographically secure primes
Wagner, Filip ; Dobiáš, Patrik (referee) ; Cíbik, Peter (advisor)
This work tackles the topics of prime numbers, their use in cryptography, options for generating prime numbers, cryptography done on hardware, usage of FPGA, description of VHDL, comparison of approaches in generating prime numbers and description of algorithms for effective implementation of prime number generator.
Measuring Post-Quantum Cryptography on Mobile Platforms
Ramiš, Karel ; Malina, Lukáš (referee) ; Dobiáš, Patrik (advisor)
This work concerns itself with the issue of post-quantum cryptography, particularly its implementation and performance on mobile devices. As part of the work, a mobile application capable of performing basic steps of post-quantum cryptographic schemes and subsequently measuring selected parameters is created. Furthermore, an own version of the CRYSTALS-Kyber scheme for key encapsulation is developed and evaluated.
Random number generation on FPGA platform
Písek, Miroslav ; Jedlička, Petr (referee) ; Dobiáš, Patrik (advisor)
The bachelor's thesis deals with the implementation of a hardware random number generator on FPGA platform. It tries to explain the basic architecture and possible FPGA configuration. In the theoretical part, the principles of random number generators are further described and then the statistical tests through which we evaluate these generators. In the following section, the existing generators designed for FPGA platforms are summarized and analyzed. A closer measurement of freely available TRNG is also underway. In the final part, there is a description of the implementation of the own random number generator. Randomness verification takes place through the NIST statistical test suite.
Postquantum Cryptography on the FPGA Platform
Dobiáš, Patrik ; Jedlička, Petr (referee) ; Malina, Lukáš (advisor)
This master thesis deals with the hardware implementations of post-quantum cryptogra- phy schemes on FPGA platforms. After the initial comparison of the candidate schemes for NIST standardization and the analysis of the previous work focusing on these schemes, Crystals-KYBER scheme was chosen and implemented. All scheme algorithms have been implemented inside a single component, minimizing resource utilization. The results of this implementation were analyzed and compared with the existing implementations. At the end of this work, the implemented scheme was deployed on Virtext UltraScale+ and tested for the use during mutually authenticated key exchange (AKE).

National Repository of Grey Literature : 11 records found   1 - 10next  jump to record:
See also: similar author names
9 Dobias, Pavel
9 Dobiáš, Pavel
2 Dobiáš, Petr
Interested in being notified about new results for this query?
Subscribe to the RSS feed.