National Repository of Grey Literature 17 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Cloud storage secured with post-quantum cryptography algorithms
Kačírek, Tomáš ; Sikora, Marek (referee) ; Člupek, Vlastimil (advisor)
This bachelor thesis deals with cloud storage secured by post-quantum cryptography and its practical implementation. The theoretical and mathematical principles of post-quantum algorithms are presented. Furthermore, their possible implementations according to security requirements and libraries that work with these algorithms are discussed. Tests have been performed to determine the most efficient algorithms for ensuring two-party authentication, confidentiality and data integrity. Then the cloud and what advantages or vulnerabilities it has was discussed. The selected algorithms were then used in a practical implementation of cloud storage in a LAN.
Standardization of post-quantum cryptography
Rada, Dalibor ; Člupek, Vlastimil (referee) ; Zeman, Václav (advisor)
The topic of the bachelor thesis is the standardization of post-quantum cryptography with respect to quantum-resistant signature schemes, including a possible solution of the related public key infrastructure and a subsequent performance comparison of selected algorithms. The work discusses the main aspects of standardization by NIST and then describes selected quantum-resistant algorithms, including a mapping of the current state of standardization of post-quantum cryptography in the EU. On the basis of the theoretical part, one of the suitable public key infrastructure solutions is selected with the possibility of using post-quantum algorithms. In the next part of the work, a~performance comparison of the selected algorithms is made and a conclusion is drawn. Finally, thanks to the information from the bachelor's thesis, the design of the laboratory task is implemented.
Usability of Post-quantum Cryptography in IoT
Kratochvíl, Jakub ; Perešíni, Martin (referee) ; Malinka, Kamil (advisor)
Cílem této práce je zjistit použitelnost postkvantových kryptografických algoritmů a jejich nároků na zdroje na zařízeních s omezeným výkonem. Pro vyhodnocení použitelnosti jednotlivých algoritmů jsou měřeny obecné parametry na zařízení ESP32 s čipem Xtensa LX6. Druhá část této práce se zaměřuje na velikost síťové komunikace protokolu TLS 1.3, který využívá postkvantové alternativy. Obě tyto části obsahují srovnání se současnými kryptografickými algoritmy. Výsledky v obou částech měření ukazují především zvýšení nároků na zdroje pro postkvantové algoritmy. Postkvantová kryptografie je v současné době použitelná na zařízeních podobných ESP32, ale na zařízeních s nižšími zdroji je problematická nebo dokonce nepoužitelná.
Lattice-Based Cryptography on Constrained Devises
Shapoval, Vladyslav ; Dzurenda, Petr (referee) ; Ricci, Sara (advisor)
Tato diplomová práce prezentuje modifikovanou softwarovou implementaci podpisového schématu založeného na modulové mřížce Dilithium a jeho distribuované varianty DS2 pro mikrokontrolér ARM Cortex-M4. Dilithium je součástí sady CRYSTALS a byl vybrán NIST jako nový postkvantový podpisový standard. Tato práce se zaměřuje na snížení paměťové náročnosti obou algoritmů, aby byly více aplikovatelné na širší spektrum mikrokontrolérů a omezených zařízení. Oba podpisy byly optimalizovány pro běh na mikrokontroléru STM32 Cortex-M4. Na jedné straně Dilithium podpis prezentoval již optimalizovanou implementaci, která může běžet na mikrokontroléru. Proto jsme se zaměřili na přidání hardwarové akcelerace pro AES pro generování pseudonáhodných čísel během generování podpisu. Na druhé straně je podpis DS2 více paměťově náročný a navrhli jsme dva optimalizační přístupy přizpůsobené mikrokontroléru. Tyto optimalizace mají za cíl snížit spotřebu paměti při zachování bezpečnostní síly. Experimentální výsledky a bezpečnostní analýza demonstrují účinnost a praktičnost našich řešení. V důsledku naší práce jsme úspěšně vyvinuli nové verze jak Dilithium, tak DS2 s paměťovou spotřebou sníženou o více než 50\% a 90\%, respektive, ve srovnání s originálem.
Postquantum Cryptography on the FPGA Platform
Dobiáš, Patrik ; Jedlička, Petr (referee) ; Malina, Lukáš (advisor)
This master thesis deals with the hardware implementations of post-quantum cryptogra- phy schemes on FPGA platforms. After the initial comparison of the candidate schemes for NIST standardization and the analysis of the previous work focusing on these schemes, Crystals-KYBER scheme was chosen and implemented. All scheme algorithms have been implemented inside a single component, minimizing resource utilization. The results of this implementation were analyzed and compared with the existing implementations. At the end of this work, the implemented scheme was deployed on Virtext UltraScale+ and tested for the use during mutually authenticated key exchange (AKE).
Methods of post-quantum cryptography
Popelová, Lucie ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In the last decades there has been such a fundamental development in the technologies including postquantum technologies. In case that the Shor algorithm would be used on quantum computers it is likely to solve mathematical problems in real time which are major for our security. It is necessary to focus on postquantum cryptography, which is able to resist quantum attacks and secure our systems. This work analyses and compares different types of postquantum cryptography. Afterwards this work chooses postquantum protocols which are measured and analysed on the PC and IoT device. Furthemore data are used to find the most effective postquantum protocol for key exchange and signature scheme.
Modern Privacy-Preserving Cryptography Protocols
Hlučková, Pavla ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
This thesis examines the intersection of two modern and growing branches of cryptography, namely privacy enhancing technologies and post-quantum cryptography. It describes selected privacy enhancing schemes (PETs) and families of post-quantum cryptography. In more detail, it focuses on group signatures based on mathematical problems that are difficult or intractable for both conventional and quantum computers. Furthermore, the thesis surveys the state of the art and compares the efficiency of mentioned schemes based on available data. The main part of this thesis is an implementation of a hash-based group signature and its comparison with lattice-based and code-based group signature implementations which were obtained directly from cryptographers active in this field. The post-quantum group signatures are subsequently compared to classic group signature schemes implemented by using the libgroupsig library.
Postquantum cryptography on FPGA
Kek, Sanjin ; Gerlich, Tomáš (referee) ; Smékal, David (advisor)
Subject of this bachelor thesis is postquantum cryptography on FPGA. Focus of theoretical part is to acquaint the reader with FPGA technology, basic principles of VHDL language, current situation in the field of postquantum cryptography and postquantum digital signing scheme CRYSTALS-Dilithium. Increased attention is paid to this scheme. Algorithms needed for function of the scheme, such as SHAKE, NTT and smaller operations used for public key compression, are described. Practical part contains hardware implementation of expandable output function SHAKE and smaller operations, such as Decompose, UseHint, Power2Round and others.
Possibilities of post-quantum cryptography
Burda, Patrik ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
With rapidly evolving technologies and a potential threat of quantum computers that could break all of today’s secure communication, there is a need for ways to deal with this threat. This work deals with the analysis of cryptographic schemes resistant to today’s known quantum attacks such as Shore’s algorithm. The work also includes measurement and evaluation of speed and memory usage. Based on the measurement a suitable postquantum scheme is then implemented on smart card.
Measuring Post-Quantum Cryptography on Mobile Platforms
Ramiš, Karel ; Malina, Lukáš (referee) ; Dobiáš, Patrik (advisor)
This work concerns itself with the issue of post-quantum cryptography, particularly its implementation and performance on mobile devices. As part of the work, a mobile application capable of performing basic steps of post-quantum cryptographic schemes and subsequently measuring selected parameters is created. Furthermore, an own version of the CRYSTALS-Kyber scheme for key encapsulation is developed and evaluated.

National Repository of Grey Literature : 17 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.