National Repository of Grey Literature 79 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
Side channels in cryptography
Budík, Lukáš ; Sobotka, Jiří (referee) ; Martinásek, Zdeněk (advisor)
This work deals with a problem called sidelong cannals in cryptografy. First part describes basic segmentation of cryptografy branch. In addition to this the document mentions some requirements for cryptology system from security angle. In another section basic algorithms and protocols are described which are used in cryptology. Main part of this work is aimed at sidelong cannals problem. Conclusion of this task demonstrates an attack by time-side canal to algorithm RSA.
Virtual Access to Nodes in PlanetLab
Fic, Jiří ; Matoušek, Petr (referee) ; Ryšavý, Ondřej (advisor)
PlanetLab as a distributed systems testbed offers a unique opportunity for developing and testing new applications useful for future Internet. This work brings up a scheme and a solution of the problem with accessing PlanetLab by a larger group of students e.g. for the purpose of solving their courseworks. A designed system empowers its administrator to create and control virtual user accounts which provide possibility for all its users to connect to selected nodes in the PlanetLab.
Software support of education in cryptography based on integer factorization
Vychodil, Petr ; Martinásek, Zdeněk (referee) ; Burda, Karel (advisor)
This thesis deals with new teaching software, which supports asymmetric encryption algorithms based on the issue of large numbers´ factorization. A model program was created. It allows to carry out operations related to encryption and decryption with an interactive control. There is a simple way to understand the principle of the RSA encryption method with its help. The encryption of algorithms is generally analysed in chapters 1,2. Chapters 3 and 4 deals with RSA encryption algorithm in much more details, and it also describes the principles of the acquisition, management and usage of encryption keys. Chapters 5 suggest choosing of appropriate technologies for the creation of the final software product, which allow an appropriate way to present the characteristics of the extended RSA encryption algorithm. The final software product is the java applet. Aplet is described in the chaprers 6 and 7. It is divided into a theoretical and practical part. The theoretical part presents general information about the RSA encryption algorithm. The practical part allows the users of the program to have a try at tasks connected with the RSA algorthm in their own computers. The last part of Java applet deals with the users´ work results. The information obtained by the user in the various sections of the program are satisfactory enough to understand the principle of this algorithm´s operations.
Visualisation of asymetric cryptography
Kužela, Jan ; Rosenberg, Martin (referee) ; Ležák, Petr (advisor)
Bachelor thesis is considered in cryptographic protocols, especially asymetrical. The purpose of the thesis is to create an aplication for visualisation of mathematical operations in asymetrical cryptosystems. The emphasis is put on the asymetrical cryptosystems Diffie-Hellman, DSA and RSA. There is a summary of history of cryptography in the theoretical part as well as modern cryphographical systems used for protection of digital data. Practical part shows the design and creation of the application and implementation in the programming language Java and JavaFX. The output is the application, which visualizes protocols DH, DSA and RSA. Systems are visualized with the input data from the user or with randomly generated data. Application shows the calculations made by protocols step by step.
Post-quantum cryptography on constrained devices
Matula, Lukáš ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In recent years, there has been a lot of technological development, which among other things, brings the designs and implementation of quantum computing. Using Shor’s algorithm for quantum computing, it is highly likely that the mathematical problems, which underlie the cryptographic systems, will be computed in polynomial time. Therefore, it is necessary to pay attention to the development of post-quantum cryptography, which is able to secure systems against quantum attacks. This work includes the summary and the comparison of different types of post-quantum cryptography, followed by measuring and analysing its levels of difficulty in order to implement them into limited devices, such as smart cards. The measured values on the PC are used to determine the most suitable implementation on the circuit card and then the verification method itself is implemented on it.
Processing of XML Descriptions of OTP
Kubát, Petr ; Očenášek, Pavel (referee) ; Zelený, Jan (advisor)
Tato práce se zaměřuje na návrh a implementaci modulárního programu pro zpracování XML popisu OTP klíčů používaných především v zařízeních od výrobců Yubico a RSA. Zároveň také práce popisuje návrh a implementaci modulu pro vložení získaných informací do adresářového serveru 389DS. Součástí práce je seznámení s OTP, standartem PSKC a protokolem LDAP. Dále je v práci uveden návrh a implementace obou částí programu. V závěru práce rozebírá možnosti dalšího vývoje aplikace.
Module of electronic security central with Ethernet communicator
Strašil, Ivo ; Pust, Radim (referee) ; Burda, Karel (advisor)
This diploma thesis deals with a design of a burglar alarm control panel, equipped with an Ethernet interface. The thesis contains a discusson of present solutions of control panels and of present usage of Ethernet communication. An idea of sensors, directly connected to LAN, was discarded on basis of a component price survey. Finally, a new concept of the panel has been chosen. This concept allows a free definition of internal logic using a C-like scripting and provides a possibility to create a network of these panels in a LAN network, using a software-only supervising main control panel. A new control panel following this concept was designed and succesfully tested.
Accelaration of RSA on GPUs
Balogh, Tomáš ; Jaroš, Jiří (referee) ; Vašíček, Zdeněk (advisor)
This bachelor's thesis discusses implementation of RSA algorithm using Montgomery multiplication for graphic cards. There are four versions of implementation created for CUDA platform with aim to achieve as high computation acceleration as possible compared to processor computation. Acceleration of computation is among other things achieved by parallelization of arithmetic operations addition and multiplication of large numbers.
Emulation of infrastructure unit for inteligent transport system
Giertl, Juraj ; Krajsa, Ondřej (referee) ; Balík, Miroslav (advisor)
The thesis deals with the study of communication models for cooperative intelligent transport systems and the development of the application used for testing. The ETSI ITS-G5 and IEEE 1609.x DSRC/WAVE comunication stacks were compared to standartizes layered ISO/OSI reference model. The basic principes of comunication in inteligent transport systems are described for each model. Besides that the common messages structures for defining alert messages, the intersection geometry and trafic lights signals are described in further detail. Based on these structures and other requirements, an application is created that allows easy definition of alert messages, intersection geometry and its traffic light states.
Side channels - preparation of lab task
Holemář, Jan ; Malina, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
This thesis deals with side-channel cryptoanalysis. It is focused on power side-channel attack on cryptographic device. The smart card Gemalto .NET is used as the cryptographic device. This smart card performs encryption through algorithm RSA, DES, AES. The power consumption of the smart card was scanned by a Tektronix CT-6 current probe. Data obtained by measuring were processed on the computer with relevant software and provided important information about the encryption key that was used.

National Repository of Grey Literature : 79 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.