National Repository of Grey Literature 48 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
Optimization of security algorithms for smart cards
Bartoňová, Veronika ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
In this diploma thesis I dealt with proposal of optimization security algorithms calculations, that will be implemented on smartcards. This project is based on knowledge of modular arithmetic, that is used in many encryption like public keys, digital signatures and has function. The result of this project is a design of changes for accelerate the security algorithms calculations.
Post-quantum cryptography on constrained devices
Matula, Lukáš ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In recent years, there has been a lot of technological development, which among other things, brings the designs and implementation of quantum computing. Using Shor’s algorithm for quantum computing, it is highly likely that the mathematical problems, which underlie the cryptographic systems, will be computed in polynomial time. Therefore, it is necessary to pay attention to the development of post-quantum cryptography, which is able to secure systems against quantum attacks. This work includes the summary and the comparison of different types of post-quantum cryptography, followed by measuring and analysing its levels of difficulty in order to implement them into limited devices, such as smart cards. The measured values on the PC are used to determine the most suitable implementation on the circuit card and then the verification method itself is implemented on it.
Microscopic Analysis of Smart Cards
Michálek, Martin ; Drahanský, Martin (referee) ; Malčík, Dominik (advisor)
The Bakchelor's thesis is aimed at description of protection features of smart cards. It introduces technology of card and anatomy of the chip itself. Further can be found transparent list of concrete security features. This works includes a library for anotation of logic elements. The thesis contains the design, implementation and interface of this library. 
Cryptography and security on the MultOS platform
Lidmila, Aleš ; Ilgner, Petr (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis deals with the development of a security IoT system for user authentication using the MultOS platform. It also deals with the development and descriptionof a publishing system that manages MultOS endpoints.
Cryptanalysis of modern cryptographic devices
Fördős, András ; Člupek, Vlastimil (referee) ; Martinásek, Zdeněk (advisor)
The thesis focuses on power analysis of modern cryptographic modules. The first part contains a brief introduction to the topic of the power side channel and basic methods of analyzes. The text describes the process of comparison of modules and a short description of devices found. In the practical part two modules has been selected for the implementation of the encryption algorithm AES-128. The first module was the chip card Gemalto .NET v2 and the second one was the Raspberry Pi. A workplace has been created for these modules which allowed to measure the power consumption of the algorithm AES. Differential Power Analysis has been made using the captured results. In its conclusion the work presents the results in tables and samples of source codes. Graphs were made from the results captured on the Raspberry Pi and from the results of the Differential Power Analysis.
Payment card systems
Flégl, Jan ; Pelka, Tomáš (referee) ; Morský, Ondřej (advisor)
The work is about payment card systems. We’d like to describe infrastructure of credit cards, ATMs, POS terminals , focusing on the EMV standard. In theoretical part we will be introduced with the history and development of credit cards, ATMs and POS terminals. Then we focus on a detailed description of payments terminals and possibilities of payment via the Internet. The most extensive theoretical part deals width EMV standard. In practical part we will make our own program, which authenticates the user based on his credit card and it will allow the user to login in the system. Source codes of this application can be found on enclosed CD.
Smartcard Protocol Analyzer
Dzurňák, Tomáš ; Zbořil, František (referee) ; Hanáček, Petr (advisor)
The goal of this project is to develop a analyzer of communication between a smart card and reader terminal. The analyzer should be able to diagnose and control correlations of standards.  The thesis include description of standards to be familiar with and a detail description of standard ISO/IEC 7816-3, that introduce monitored protocol. The thesis also involves development kit features and a design of application.
Entrance and security systems
Kohut, Michal ; Bradáč, Zdeněk (referee) ; Fiedler, Petr (advisor)
During writing this bachelor labour I strived to describe some entrace and security systems and their parts. Also some functions and usage of these systems were consecrated and there was introduced their division. I concerned also with observing of preventive exchanges, their properties and operating. At the end there was proposed a status automat machine of a smaller preventive exchange, which was adjusted in the program IAR visualSTATE.
Electronic geocaching
Pavel, Lukáš ; Babnič, Patrik (referee) ; Burda, Karel (advisor)
The goal is to design and implement a concept of electronic geocaching with contactless smart card and cell phone with NFC interface. In the first chapter I describe geocaching and try to familiarize the reader with this game. The second chapter deals with the issue of smart cards, I describe here the contact and contactless cards and their security. In the third chapter, I describe use and security of radio communication interface NFC. In the fourth chapter, I describe the principles of symmetric and asymmetric cryptography and selected cryptographic techniques. In the fifth chapter is description of proposed solution for electronic geocaching with digital signature. The last chapter describes all created applications.
Web application utilizing multi-factor authentication
Humpolík, Jan ; Hajný, Jan (referee) ; Doležel, Radek (advisor)
In the thesis are described and implemented 5 methods (some with their own proposal) of multifactor authentication in web application environment. The results of the work is the web application and individual authentication methods (which are attached separately) for use in your own web application.

National Repository of Grey Literature : 48 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.