National Repository of Grey Literature 339 records found  beginprevious168 - 177nextend  jump to record: Search took 0.01 seconds. 
Analysis of voice over IP protocols
Boháček, Milan ; El Bashir, Robert (advisor) ; Hojsík, Michal (referee)
In the presented work we focus on both implementation and protocol of the voice over IP application Skype. We analyse several versions of Skype clients and deduce inner workings of the Skype protocol. We present details about the cryptographic primitives used by the Skype clients and their impact on the security of the communication. We emphasize several places of suspicious leaks of the internal states of random generators and deduce rules for the detection of the Skype traffic on the firewall. In the end, we mention a simple enhancement of the current Skype clients that, in practice, can detect an ongoing eavesdropping.
Secure Communicator
Gažo, Matúš ; Galamboš, Leo (advisor) ; Peterka, Jiří (referee)
Secured long-distance communication has always been an important topic for people handling sensitive information. Now with the arrival of ``intelligent`` mobile phones eavesdropping and information gathering is as easy as never. Luckily smartphones present not only problems in terms of security but also an opportunity to protect ones privacy. This thesis attempts to construct a generic software architecture of a communicator which could be capable of transferring voice, video and other various forms of binary data in a secure way. It will analyse and use different communication channels to reach a maximum level of data authenticity, integrity and confidentiality in an environment where a central security element needs to be avoided. The resulting architecture will be tested on a Voice-over-IP (VoIP) application prototype for the mobile Google Android platform to show whether the approach is practically usable on currently available phones.
Universal Security Solution For Iot Data Collection Systems
Šťovíček, Petr
The article presents our data collection solution based on RIOT operating system andMessage Queuing Telemetry Transport (MQTT) technology. Our solution is secure, universal, andeasy to integrate to already existing and often insecure IoT networks. Furthermore, we integrated oursolution into the temperature and humidity monitoring system. This system detects the potentiallydangerous level of these physical quantities and warns users by smartphone notification about relevantthreats such as the impact on the infectivity of COVID-19.
Hardware-Accelerated Cryptography For Software-Defined Networks
Cíbik, Peter
This paper presents a Software-Defined Network (SDN) cryptographic solution targetedon high-speed smart Network Interface Cards (NICs) with an FPGA chip. This solution providesa fast alternative method to develop network-oriented data processing cryptography applications foran accelerator. A high-level programming language – Programming Protocol-independent PacketProcessor (P4) – is used to avoid a complex and time-consuming hardware development. The solutionconsists of two main parts: a library of mainly used cryptographic primitives written in VHSICHardware Description Language (VHDL) i.e. a symmetric cipher (AES-GCM-256), a hash function(SHA-3), a SHA-3-based Hash-based Message Authentication Code (HMAC), a digital signaturescheme (EdDSA) and a post-quantum digital signature scheme (Dilithium), and a compiler P4/VHDLwith the support for these cryptographic components as external objects of P416.
Elliptic Curve Cryptography For Constrained Devices In Internet Of Things And Industry 40
Cvrček, Tadeáš
The article summarizes the usability of devices (which are usually equipped with AVR and ARM Cortex-M microcontrollers) with low-power consumption in security solutions for IoT and Industrial 4.0 ecosystems. These devices have limited processing and storage capabilities and they often run on batteries. On the other hand, cryptographic algorithms are usually computationally demanding and, therefore, it is hard to implement them on constrained devices. This work studies the capabilities of current IoT devices to perform elliptic curve cryptographic protocols and the possibilities to design and implement own cryptographic protocols on constrained devices.
Cryptographic Externs Support In P416/Vhdl Compiler For Fpga Board Target Platform
Cíbik, Peter
This paper deals with the problem of data security and secure communication at high speed, which leads to the usage of hardware accelerators, in this case high-speed FPGA NICs. It proposes an effective way how to develop applications for an FPGA-based acceleration platform. The compiler is produced by Netcope Technologies a. s. and is called Netcope P4. It allows development in high-level language P4. The key value of this product is compiler P4_16/VHDL, which compiles a P4 application source code and maps it on a target FPGA platform. The main goal of this paper is the extension of the compiler to support cryptographic external objects, which can be used in the design of applications using cryptographic features like a hash function over payload, encryption, etc. It describes design of pipeline with control block for external objects, interface of these control blocks and implementation steps.
Mathematical Methods in Economics
Hrkeĺ, Jan ; Šustrová, Tereza (referee) ; Novotná, Veronika (advisor)
In my bachelor thesis, I deal with the topic of mathematical methods in economics. I focus on investing the company's free capital in cryptocurrencies, which is illustrated with the help of selected strategies. In the first part of the work, I explain the technical and fundamental requirements of cryptocurrencies, its most important representatives and technical analysis based on mathematical and statistical methods. In the practical part, I analyze four selected cryptocurrencies on two different investment strategies, which are then evaluated.
Shor's algorithm in Quantum Cryptography
Nwaokocha, Martyns ; Vašík, Petr (referee) ; Hrdina, Jaroslav (advisor)
Kryptografie je velmi důležitým aspektem našeho každodenního života, protože poskytuje teoretický základ informační bezpečnosti. Kvantové výpočty a informace se také stávají velmi důležitou oblastí vědy kvůli mnoha aplikačním oblastem včetně kryptologie a konkrétněji v kryptografii veřejných klíčů. Obtížnost čísel do hlavních faktorů je základem některých důležitých veřejných kryptosystémů, jejichž klíčem je kryptosystém RSA . Shorův kvantový faktoringový al-goritmus využívá zejména kvantový interferenční účinek kvantového výpočtu k faktorovým semi-prime číslům v polynomiálním čase na kvantovém počítači. Ačkoli kapacita současných kvantových počítačů vykonávat Shorův algoritmus je velmi omezená, existuje mnoho rozsáhlých základních vědeckých výzkumů o různých technikách optimalizace algoritmu, pokud jde o faktory, jako je počet qubitů, hloubka obvodu a počet bran. v této práci jsou diskutovány, analyzovány a porovnávány různé varianty Shorova factoringového algoritmu a kvantových obvodů. Některé varianty Shorova algoritmu jsou také simulované a skutečně prováděné na simulátorech a kvantových počítačích na platformě IBM QuantumExperience. Výsledky simulace jsou porovnávány z hlediska jejich složitosti a míry úspěšnosti. Organizace práce je následující: Kapitola 1 pojednává o některých klíčových historických výsledcích kvantové kryptografie, uvádí problém diskutovaný v této práci a představuje cíle, kterých má být dosaženo. Kapitola 2 shrnuje matematické základy kvantového výpočtu a kryptografie veřejných klíčů a popisuje notaci použitou v celé práci. To také vysvětluje, jak lze k rozbití kryptosystému RSA použít realizovatelný algoritmus pro vyhledávání objednávek nebo factoring. Kapitola 3 představuje stavební kameny Shorova algoritmu, včetně kvantové Fourierovy transformace, kvantového odhadu fází, modulární exponentiace a Shorova algoritmu. Zde jsou také uvedeny a porovnány různé varianty optimalizace kvantových obvodů. Kapitola 4 představuje výsledky simulací různých verzí Shorova algoritmu. V kapitole 5 pojednejte o dosažení cílů disertační práce, shrňte výsledky výzkumu a nastíňte budoucí směry výzkumu.
Cryptography on constrained devices
Šťovíček, Petr ; Jedlička, Petr (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis analyzes the possibilities of applying cryptographic primitives and protocols to various computationally and memory constrained devices. It then implements a secure data collection system from sensors. In its theoretical part, the work examines individual cryptographic algorithms, the RIOT operating system and available methods of wireless data transmission. It then presents the results of performance tests of various cryptographic operations. On this basis, it designs and implements a system that ensures the confidentiality, authenticity and integrity of transmitted data.
Wireless robot control using mobile platform
Matuška, Jakub ; Kiac, Martin (referee) ; Přinosil, Jiří (advisor)
This bachelor’s thesis deals with design and implementation of an application for robot’s omnidirectional movement control using mobile platform. Implementation includes an Android application, used as user interface, as well as robot–side Python program for controlling movement and sending RTP stream to Android application. User can control robot’s movement using two virtual joysticks. Raspberry Pi was used as the control unit. The application has security module. Pipeline-based multimedia framework named GStreamer was used to implement RTP steaming. This paper describes necessary theory first and then introduces basic building blocks used in creation process of the application.

National Repository of Grey Literature : 339 records found   beginprevious168 - 177nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.