National Repository of Grey Literature 26 records found  previous11 - 20next  jump to record: Search took 0.00 seconds. 
Protection of highspeed communication systems
Smékal, David ; Martinásek, Zdeněk (referee) ; Hajný, Jan (advisor)
The diploma thesis deals with 128–bit AES data encryption and its implementation in FPGA network card using VHDL programming language. The theoretical part explains AES encryption and decryption, its individual steps and operating modes. Further was described the VHDL programming language, development environment Vivado, FPGA network card Combo–80G and configurable framework NetCOPE. The practical part is the implementation of AES–128 in VHDL. A simulation was used to eliminate errors, then the synthesis was performed. These steps were made using Vivado software. Last step of practical part was testing of synthesized firmware on COMBO–80G card. Total of 4 projects were implemented in FPGA card. Two of them were AES encryption and decryption with ECB mode and another two describe the encryption and decryption with CBC mode.
Analysis of the Possibility of Password Break through for RAR, ZIP and 7z Formats
Prustoměrský, Milan ; Přikryl, Zdeněk (referee) ; Hruška, Tomáš (advisor)
This Thesis deals with analysis of the possiblity of password breakthrough for common compression formats and password extraction from self-extraction archives used for malicious software. Structure of compression programs, ciphers and connection between cipher and archives is described. Common and specialized attacks on archives and ciphers are described. Structure of self-extracting archives and password location is used to create extractor of passwords in self-extracting archives.
Secure Bootloader For Arm Microcontrollers
Prítel, Pavol
Embedded systems are single purpose devices, where software updates are often omitted or very limited in comparison with personal computer systems. Such systems are typically using microcontrollers with limited memory and computing power. Enabling software updates on an embedded system brings some security issues that need to be taken into account. As soon as there is a possibility of software update, the device is exposed to risk of malicious or not original applications being executed on the device. In this paper a reference implementation of bootloader with security features is described. As a result of using asymmetric cryptography, the memory footprint and startup time is increased significantly. The contribution of this work is in finding the right algorithm that will offer trade-off between level of security and used resources of targeted microcontroller.
Model of Enigma Encryption Machine from Lego Technic
Kupka, Ondřej ; Číž, Radim (referee) ; Hajný, Jan (advisor)
The aim of the thesis is to design and implement the possibility of interconnecting the Enigma encryption machine model, built from LEGO Technic and LEGO Mindstorm kit, with the display device and extend the model by the possibikty to enter any text using the Bluetooth keyboard. The input text is then encrypted along with the demonstration of the encryption by the model and the output encryption text is then displayed on the display device screen. The first part of the work is devoted to the beginnings of encryption and development of Enigma encryption machine. Subsequently, it is focused in more detail on the Wehrmacht Enigma model, on the basis of which a web application for model operation was created. The application is designed based on the Ev3dev special firmware for the control unit and written using Python and Flask. The work describes partial parts of the application, individual functions and principles. Part of the work is a manual for model operation.
Lego Technic encryption demonstrator
Jančík, Jakub ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
The bachelor thesis is mostly about mechanical encryption. Primary task was to build demonstrator encryptor using only LEGO Technic building kit, which would allow polyalphabetical substitution encryption. The theoretical part includes information about origins of steganography, cryptography and cryptanalysis, it explains the process of the polyalphabetical substitution encryption and it will introduce Enigma – how it went on during development, on what principle it works and thanks to what it stopped being safe. Device was extended with LEGO MINDSTORMS which allowed to build the Enigma demonstrator.
Simulation of cryptographic algorithms using FPGA
Németh, František ; Mašek, Jan (referee) ; Smékal, David (advisor)
Bachelor thesis is dealing with a cipher standard AES and with a design of encryption and decryption components for AES in special modes of operation. Programming language is VHDL. In theoretical part of thesis is a further descriptions of AES and behaviour of block cipher operation modes. Furthermore the brief description of VHDL, FPGA and NetCOPE framework is a piece of theoretical part as well. The practical part contains designs which are made in developing environment Vivado from Xilinx. Programmed modes of operation are ECB, CBC, CTR and CFB. Simulation outputs and synthesis results are summerized in tables.
Historical development of cryptography during the World Wars era
Vaverka, Ondřej ; Ivánek, Jiří (advisor) ; Souček, Martin (referee)
This bachelor thesis deals with the description of cryptographic and cryptanalytic methods during the First and Second World Wars and related historical circumstances. The introduction briefly describes the development of cryptology prior to WWI. The first major chapter examines the application of cryptology during WWI. The next chapter concisely bridges the interwar period, and then focuses on WWII cryptology. The Ultra programme and the problem of Enigma machine is analyzed here in detail. The final chapter is a dedicated to the aftermath of WWII cryptographic efforts in the form of papers by Claude E. Shannon.
Web Services Security for a Service Provider
Liška, Stanislav ; Jaša, Petr (referee) ; Rychlý, Marek (advisor)
This work makes the task of providing readers with insight into the possibilities of Web services security and authentication. The second chapter explains the general Web services and the third charter deals with security protocols along with authentication. The charter possibility of securing Web services in Java Enterprise Edition are described in the fourth chapter. The fifth chapter is devoted to Web services from the perspective of the service provider. The sixth chapter describes the implementation of secure services and seventh charter deals with testing services with the possibility of further extension.
Library of Algorithms for Text Ciphering
Mikulka, Jiří ; Havel, Jiří (referee) ; Kubíček, Radek (advisor)
This thesis brings an overview of historical and modern methods and approaches used in cryptography. It also describes and assesses ciphers, which have been used since the very beginning of encryption till modern ciphers. Based on information resulting from this overview the reader should be able to distinguish between ciphers, know their advantages and disadvantages, and be able to choose the best cipher for any purpose. Ciphers mentioned in this thesis are implemented in a library called CipherLib , which shows usage of every described cipher.
Hardware Acceleration of Cipher Attack
Okuliar, Adam ; Slaný, Karel (referee) ; Vašíček, Zdeněk (advisor)
Hardware acceleration is often good tool to achieve significantly better performance of processing great ammount of data or of realization of parallel algoritms. Aim of this work is to demonstrate resoluts of using FPGA circuits for implementation exponentially complex algorithm. As example haschosen brute-force attack on WEP cryptographic algorithm with 40-bit long key. Goal of this work is to compare properties and performance of software and hardware implementation of choosen algorithm.

National Repository of Grey Literature : 26 records found   previous11 - 20next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.