National Repository of Grey Literature 42 records found  beginprevious33 - 42  jump to record: Search took 0.01 seconds. 
Authentication in the IoT
Drápela, Roman ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
Bachelor thesis focuses on authentication in the IoT. Some of the authentication protocols from the area of IoT are introduced at the beginning of the thesis. Next part of the thesis describes the NFC and BLE technologies, which can be applied in the IoT. Multi-device protocol is implemented using different devices (PC, mobile phone, SmartWatch). This protocol enables autentication based on the processes above the elliptic curves. Two sets of measurements (simulated and practical) are provided. In the final part of the thesis all the results are assessed.
Electronic ID Cards
Mravec, Roman ; Burda, Karel (referee) ; Hajný, Jan (advisor)
This master thesis deals with an implementation of Diffie-Hellman protocol on smart card which is based on MULTOS OS. Defines the smart cards based on MULTOS OS and their usage. Output of this thesis are applications for a smart card and for a client using Diffie-Hellman protocol for establishing of a secret key between two communication sides through unsecured communication channel.
Primality testing using elliptic curves
Pashchenko, Olha ; Barto, Libor (advisor) ; Šťovíček, Jan (referee)
In the present work we study primality tests. A primality test is an algorithm for determining whether an input number is prime. In the first part of this work we recapitulate the basic definitions and facts about number theory and study Pocklington's algorithm, that based on the group (Z/nZ)∗ . Then we study Generalized Pocklington's primality test and Pépin's primality test for Fermat numbers. In the second part of this work we represent the basic definitions and facts about elliptic curves. Then we study Goldwasser-Killian primality test, that based on elliptic curves. One part of this work is experementation with Goldwasser-Killian primality test. 1
Post-quantum alternative to secure sockets
Behún, Marek ; Kratochvíl, Miroslav (advisor) ; Kofroň, Jan (referee)
The goal of this thesis is to implement a software library that provides a wrapping of real-time socket- like communication into an cryptographic protocol with purpose similar to SSL or TLS, that is secure against an adversary in possession of a quantum computer. Resulting software utilizes the Supersingular Isogeny Diffie Hellman (SIDH) key-exchange algorithm for achieving this level of security, and is simple, portable and independent on system-specific primitives. The thesis gives a concise introduction to the theory on which SIDH is built, targeting the audience of undergraduate students of Computer Science. Powered by TCPDF (www.tcpdf.org)
Token based authentication
Loviška, Martin ; Šťastný, Ladislav (referee) ; Franek, Lešek (advisor)
Thesis is dealing with possibilities of user authentication using a security token to Linux console and web applications. Theoretical part of this work is devoted to cryptography basics, particularly asymmetric cryptography algorithms . Thesis generally describes aut- hentication methods and includes a brief categorization of smart card devices. The practi- cal part deals with SmartCard - HSM device setup for a client and creating own certificate authority using this device. Finally, it presents a demonstration deploying smart card login to Linux and web applications using tokens.
BitCoin Wallet for Windows Phone Platform
Prokop, Tomáš ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
Master's thesis deals with description of a new trading system known as BitCoin. Bitcoin is a unique type of virtual cash in the current world without the influence of large corporations. The system is protected through the use of cryptographic methods that are discussed in detail.  The work explains the principles of integrity of transactions exchange transactions and the acquisition of new money through so-called miners. Individual miners services are mediated through software clients including a description of mining. The paper focuses on protocols for communication. It analyzes the different types of software purses for platforms Windows, Linux and Android. Examining reengineering of purses for Android. This document in no small part discusses the implementation own wallets for the Windows Phone platform 8th.
Parallelization of Integer Factorization from the View of RSA Breaking
Breitenbacher, Dominik ; Henzl, Martin (referee) ; Homoliak, Ivan (advisor)
This paper follows up the factorization of integers. Factorization is the most popular and used method for RSA cryptoanalysis. The SIQS was chosen as a factorization method that will be used in this paper. Although SIQS is the fastest method (up to 100 digits), it can't be effectively computed at polynomial time, so it's needed to look up for options, how to speed up the method as much as possible. One of the possible ways is paralelization. In this case OpenMP was used. Other possible way is optimalization. The goal of this paper is also to show, how easily is possible to use paralelizion and thanks to detailed analyzation the source codes one can reach relatively large speed up. Used method of iterative optimalization showed itself as a very effective tool. Using this method the implementation of SIQS achieved almost 100 multiplied speed up and at some parts of the code even more.
Modern Asymmetric Cryptosystems
Walek, Vladislav ; Sobotka, Jiří (referee) ; Malina, Lukáš (advisor)
Asymmetric cryptography uses two keys for encryption public key and for decryption private key. The asymmetric cryptosystems include RSA, ElGamal, Elliptic Curves and others. Generally, asymmetric cryptography is mainly used for secure short messages and transmission encryption key for symmetric cryptography. The thesis deals with these systems and implements selected systems (RSA, ElGamal, McEliece, elliptic curves and NTRU) into the application. The application can test the features of chosen cryptosystems. These systems and their performance are compared and evaluated with the measured values. These results can predict the future usage of these systems in modern informatics systems.
Elliptic curve cryptography in comparison with other representatives of asymmetric cryptography
Stašek, Filip ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
The aim of this thesis is to explain theoretical and mathematical point of view the principle of elliptic curve cryptography, which at present appears as the most petential representative of asymmetric cryptography. The introduction describes basic mathematical assumptions and knowledge which are used in cryptography and in other parts of the thesis we build on them. I visualize elliptic curve cryptosystem, describe the mathematical principle of operation and then show algorithm, which is based cryptosystem. Thesis will continue comparing this cryptosystem with key members of the asymmetric cryptography. These are algorithms RSA and ElGamal. Comparison of these cryptosystems effect mainly from the theoretical point of view and with the help of complexity theory compare time-consuming and subsequently safety aforementioned cryptosystems . Finally, I point to the indisputable benefits of elliptic curve cryptography consisting in the greater security and speed.
Latest trends in public-key cryptography
Tvaroh, Tomáš ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
The goal of this thesis is to describe principles of public-key cryptography, introduce and compare latest algorithms for asymmetric encryption and point out their advantages over the most popular cryptosystem - RSA. At the beginning, this thesis describes the evolution of public-key cryptography, its differences compared to symmetric-key cryptography and possibilities of using it for data encryption and digital signature. Mathematical background as well as principles of RSA are described afterwards. At the end, this thesis focuses on the latest algorithms on the basis of eliptic curves and their advantages over the most common algorithms are pointed out. The comparison is then summarized and a recommendation for the best cryptosystem is offered.

National Repository of Grey Literature : 42 records found   beginprevious33 - 42  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.