National Repository of Grey Literature 62 records found  beginprevious21 - 30nextend  jump to record: Search took 0.00 seconds. 
Side channel attacks
Popovský, Michal ; Sobotka, Jiří (referee) ; Martinásek, Zdeněk (advisor)
It is very difficult in real-time breaking the cryptographic algorithms used at present. The Classical cryptoanalysis is based on finding weaknesses in the mathematical structure of the algorithm. Discovery of side channels caused a substantial change in this science. Side-channel attacks are based on incorrect physical implementation of cryptographic algorithms. This new way attack changes notions about cryptography and security of systems. This master´s thesis contains a detailed description of the whole problem of side channels and deals with side-channel attacks on the RSA asymmetric algorithm. This thesis includes the design and realization of laboratory exercise, which is focused on the time attack on the RSA algorithm implementation.
Design of hardware cipher module
Bayer, Tomáš ; Stančík, Peter (referee) ; Sobotka, Jiří (advisor)
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and practical implementation are analysed. In the first chapter basic cryptographic terms, symmetric and asymetric cryptographic algorithms and are mentioned. Also usage and reliability are analysed. Following chapters mention substitution, transposition, block and stream ciphers, which are elementary for most cryptographic algorithms. There are also mentioned the modes, which the ciphers work in. In the fourth chapter are described the principles of some chosen cryptographic algorithms. The objective is to make clear the essence of the algorithms’ behavior. When describing some more difficult algorithms the block scheme is added. At the end of each algorithm’s description the example of practical usage is written. The chapter no. five discusses the hardware implementation. Hardware and software implementation is compared from the practical point of view. Several design instruments are described and different hardware design programming languages with their progress, advantages and disadvantages are mentioned. Chapter six discourses the hardware implementation design of chosen ciphers. Concretely the design of stream cipher with pseudo-random sequence generator is designed in VHDL and also in Matlab. As the second design was chosen the block cipher GOST, which was designed in VHDL too. Both designs were tested and verified and then the results were summarized.
Demonstration of Cryptographic Problems through an Interactive Educational Game
Fišarová, Anežka ; Mezina, Anzhelika (referee) ; Mikulec, Marek (advisor)
The bachelor thesis is focused on the design and implementation of a cryptographic interactive educational game. It focuses on various cryptographic ciphers specifically selected so that people outside the field can be introduced to the subject in a demonstrative and entertaining way. Java and JavaFX were used as the programming language. The thesis consists of four parts, the first two are oriented towards the theoretical part of cryptography and the second two are more focused on the practical application and code development. As motivation for the players, a score for correctly cracked ciphers was used. Furthermore, the work includes a choice of difficulty, which influences which ciphers will be presented to the players. At the end of the thesis, the author reflects on the results and explores ways to further improve the methods presented.
Side-channel cryptanalysis using deep learning methods
Matuška, Jakub ; Martinásek, Zdeněk (referee) ; Sikora, Pavel (advisor)
Cryptographic systems are getting unbreakable on paper. Therefore attacks on the implementations using side-channels are getting in front of others. Especially when neural networks (NN) got involved in this field. With deep learning, these attacks can recover secret keys even on implementations with countermeasures. Deep learning assisted sidechannel analysis (DL-SCA) dominated this field over the statistical methods. That is why it is important to understand its concepts. This thesis will showcase these methods and introduce some new tools regarding correlation power analysis (CPA) and the training of NNs. An attack on ASCAD dataset will take place and the proposed NN to conduct this attack will be evaluated against other models using proper metrics. Lastly, improvements to SITM (See-In-The-Middle) attack using deep learning are proposed and implemented in the console application.
The use of cryptographic algorithms and their real use.
Chrstoš, Tomáš ; Holý, Radek (advisor) ; Kaliková, Jana (referee)
The aim of this work is to compare some methods of file encryption. The main goal is to select the most suitable algorithm selected on the basis of their testing and comparing the algorithms. Another goal is to refer about cryptography itself, its history and its development. The theoretical part is first outlined the historical development of cryptography. In addition, this section analyzed and described theoretically selected ciphers, including modern and principles of their functioning. In the practical part, these encryption methods are compared for selected files in their suitability for a particular file type (video data, audio files, documents). These ciphers are tested to encrypt files and decrypt files.
Applications of Gröbner bases in cryptography
Fuchs, Aleš ; Šťovíček, Jan (advisor) ; Žemlička, Jan (referee)
Title: Applications of Gröbner bases in cryptography Author: Aleš Fuchs Department: Department of Algebra Supervisor: Mgr. Jan Št'ovíček Ph.D., Department of Algebra Abstract: In the present paper we study admissible orders and techniques of multivariate polynomial division in the setting of polynomial rings over finite fields. The Gröbner bases of some ideal play a key role here, as they allow to solve the ideal membership problem thanks to their properties. We also explore features of so called reduced Gröbner bases, which are unique for a particular ideal and in some way also minimal. Further we will discuss the main facts about Gröbner bases also in the setting of free algebras over finite fields, where the variables are non-commuting. Contrary to the first case, Gröbner bases can be infinite here, even for some finitely generated two- sided ideals. In the last chapter we introduce an asymmetric cryptosystem Polly Cracker, based on the ideal membership problem in both commutative and noncommutative theory. We analyze some known cryptanalytic methods applied to these systems and in several cases also precautions dealing with them. Finally we summarize these precautions and introduce a blueprint of Polly Cracker reliable construction. Keywords: noncommutative Gröbner bases, Polly Cracker, security,...
Time-memory tradeoff útoky
Seidlová, Monika ; Hojsík, Michal (advisor) ; Holub, Štěpán (referee)
Martin Hellman proposed the first time-memory tradeoff attack on block ciphers. It is a chosen plaintext attack, in which the attacker precomputes a large amount of data for some block cipher and can then use it repeatedly in attacks on that block cipher. An improvement suggested by Ron Rivest speeds up the attack by reducing the number of memory accesses. Another modification of the original attack called rainbow tables speeds up the attack even more and brings other advantages. Time-memory tradeoff attacks can also be applied to stream ciphers as known plaintext attacks. This bachelor thesis describes in detail the original attack, its improvements and a modification to stream ciphers. As an example, we summarize an attack on A5/1, a stream cipher used in mobile phones. We also propose a new time-memory tradeoff attack on block ciphers called r-coloured rainbows. The new attack is a modification of Hellman's attack and shares similarities with the rainbow table attack. We give a comparison of the properties of the three attacks and conclude that, for certain block ciphers, our attack may be the most effective of the three.
Analysis of voice over IP protocols
Boháček, Milan ; El Bashir, Robert (advisor) ; Hojsík, Michal (referee)
In the presented work we focus on both implementation and protocol of the voice over IP application Skype. We analyse several versions of Skype clients and deduce inner workings of the Skype protocol. We present details about the cryptographic primitives used by the Skype clients and their impact on the security of the communication. We emphasize several places of suspicious leaks of the internal states of random generators and deduce rules for the detection of the Skype traffic on the firewall. In the end, we mention a simple enhancement of the current Skype clients that, in practice, can detect an ongoing eavesdropping.
Key reconstruction from the inner state of RC4
Sladký, Lukáš ; Boháček, Milan (advisor) ; Drápal, Aleš (referee)
In the present work we analyse the key scheduling algorithm of the RC4 stream cipher. The internal permutation generated by the algorithm is biased towards the secret key which can be utilized in the key recovery attempts. Multiple sources were combined to provide proven formulae for these biases. We have completed missing proofs, experimentally verified resulting probabilities and created examples to illustrate usage of the biases in key recovery attempts. This together with methods for extracting information about the secret key gives analysis of the key scheduling algorithm. We have also selected an efficient key retrieval algorithm and implemented an improved version which results in better success probabilities of the key recovery. We have also provided a tool for extracting the key from a permutation obtained by the key scheduling algorithm. Powered by TCPDF (www.tcpdf.org)
Crytographic attacks on TLS protocol
Oupický, Jan ; Tůma, Jiří (advisor) ; Boháček, Milan (referee)
The aim of this work is to introduce the reader to the protocol TLS and a few selected attacks against the protocol. In the first part we will define the necessary cryptographic definitions used in the following chapters. In the second part we will briefly talk about the history of procotols TLS and SSL and then we will closely look into how they work. The last part is about the analysis of the chosen cryptographically interesting attacks (Padding oracle on CBC mode, POODLE, BEAST and CRIME) against protocols TLS and SSL. 1

National Repository of Grey Literature : 62 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.