National Repository of Grey Literature 13 records found  previous11 - 13  jump to record: Search took 0.01 seconds. 
Security of data stored on the hard disk
Polášková, Markéta ; Hajný, Jan (referee) ; Martinásek, Zdeněk (advisor)
This work is dedicated to the security of data stored on the hard drive of your computer and using encryption. The first part explains the basic concepts of cryptography and describes her in history. In other chapters, this work is dedicated to a description of the side channels and attacks on these channels. How can the attacker obtain information from a cryptographic module. The following section describes the types of encryption they use nowadays and what are their weaknesses. Bachelor thesis continues with examples of individual encryption programs and device ICZ Protect Boot. The last part deals with resistance testing on equipment ICZ Protect Boot. Testing of resistance to flow analysis using a side channel. Finally, bachelor thesis deals with the analysis of communication between the computer and ICZ Protect Boot.
Countermeasures of power analysis
Gerlich, Tomáš ; Malina, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
Side channels affect a security of the cryptographic systems, due to it is necessary to focus on implementation of the algorithm. There are mention basic classification of side channels in the beginning of the work. The following chapter describes types of countermeasures against side channel attack, which the most emphasis on masking, because of possible implementations on existing cryptosystems. Masking techniques are introduces in the following chapter, where is a description of their method of masking, treatment of cipher and their resistance against attack. The practical part describes the measurements that are trying to record the power consumption of the microcontroller. Measurement was designed to examine primarily on information leakage through power side channel.
Side Channel Cryptanalysis
Martinásek, Zdeněk ; Vaněk, Tomáš (referee) ; Dočkal,, Jaromír (referee) ; Zeman, Václav (advisor)
Side channels fundamentally changes the view of the cryptographic system security in cryptography. It is not enough to analyze the security algorithm only from a mathematical point of view using abstract models but it is necessary to focus on the implementation of the algorithms. The introduction of the thesis deals with the basic terms, principles of side channel attacks and basic clasification of side channels. The following chapter describes the objectives of the thesis. The main goal of the thesis is to propose and experimentally verify a new power analysis method whish will use the neural network. This main goal was based on the realized analyzes presented in the following chapters. These chapters contain a detailed analysis of currently used power analysis and analysis of AES encryption algorithm. AES was selected becouse the algorithm is resistant to the conventional cryptoanalysis. The following section describes the experimental results of the optimization of existing methods, the influence of the parameters affecting power consumption and the results of the proposed analysis using neural networks. This section includes the discussion of the results. This type of side channel attack has not been published yet thus it is a completely new idea. The final goal of the thesis was to summarize the possible countermeasures protecting against the side channel attacks.

National Repository of Grey Literature : 13 records found   previous11 - 13  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.