National Repository of Grey Literature 12 records found  1 - 10next  jump to record: Search took 0.00 seconds. 
The computational possibilities of Android devices for localization
Brychta, Josef ; Mlýnek, Petr (referee) ; Fujdiak, Radek (advisor)
This bachelor thesis deals with implementation of selected localization methods to Android devices. These methods were then measured and the results processed to optimization schemes.
Securing narrowband wireless communication in licensed band
Kolaja, David ; Brychta, Josef (referee) ; Fujdiak, Radek (advisor)
Contemporary demand for mobile devices and development of devices in the Internet of Things is constantly increasing. This reality also raises concerns about security and privacy of ongoing communication. This is no exception for expanding scale of Low Powered Wide Area Network (LPWAN) devices which communicate over Narrowband IoT and the customer of such devices who has to rely on security of provider’s network to secure customer’s data. This security is effective only in operator’s network while there is no end-to-end encryption enabled. Therefore, this thesis deals with the analysis of NB-IoT communication and its possible end-to-end security proposal, which also provides elements of post-quantum algorithms. Last but not least, this thesis deals with application of this proposal on constrained device and evaluation of its effectivness of time, energy and memory demands.
Quantified approach to risk analysis in case of cyber security
Řezáč, Petr ; Brychta, Josef (referee) ; Fujdiak, Radek (advisor)
This bachelor thesis deals with the quantitative approach to risk analysis in the frame-work of cyber security. The first part is devoted to the theoretical level. There are defined basic terms connected with cyber security and cyberspace. The risk management process according to ISO / IEC 27005 and NIST methodology is described. Furthermore, a comparison of individual risk analysis methods is performed. Finally, examples of quantitative methods are presented and the CIA triad is presented. The second part of this thesis is dedicated to the QRA method. This method is applied to two devices and probability, impact and risk are calculated. Finally, the evaluation and comparison of both devices is performed. The benefit of this bachelor thesis is a compiled methodology, which is applicable not only for the determination of the risk itself, but it is also possible to compare individual systems, equipment or solutions among them.
Comparison of cryptographic primitives used in elliptic curve cryptograpny on different hardware platforms
Brychta, Josef ; Martinásek, Zdeněk (referee) ; Fujdiak, Radek (advisor)
This master thesis deals with the implementation of variants of cryptographic libraries containing primitives for elliptic curves. By creating custom metering charts to compare each implementation. The main task was not only the implementation of libraries but also the design and implementation of test scenarios together with the creation of measurement methods for different libraries and hardware platforms. As a result, a number of experimental tests were conducted on different curves and their parameters so that the results of the work included complex problems of elliptic curves in cryptography. The main parameters were power, time and memory consumption.
Benchmarks With Points On Elliptic Curves
Brychta, Josef
This paper deals with benchmarks of generating random points and arithmetic operations with points on elliptic curves. These benchmarks were implemented on the hardware platforms Raspberry Pi Zero/1/2/3. The primary goal was to measure usage of the system resources and energetic consumption of that hardware platform. Specifically, it was memory and time consumption of Raspberry. In total, 48 elliptic curves of standards NIST, BRAINPOOL, GOST and FRP were measured.
Quantified approach to risk analysis in case of cyber security
Řezáč, Petr ; Brychta, Josef (referee) ; Fujdiak, Radek (advisor)
This bachelor thesis deals with the quantitative approach to risk analysis in the frame-work of cyber security. The first part is devoted to the theoretical level. There are defined basic terms connected with cyber security and cyberspace. The risk management process according to ISO / IEC 27005 and NIST methodology is described. Furthermore, a comparison of individual risk analysis methods is performed. Finally, examples of quantitative methods are presented and the CIA triad is presented. The second part of this thesis is dedicated to the QRA method. This method is applied to two devices and probability, impact and risk are calculated. Finally, the evaluation and comparison of both devices is performed. The benefit of this bachelor thesis is a compiled methodology, which is applicable not only for the determination of the risk itself, but it is also possible to compare individual systems, equipment or solutions among them.
Securing narrowband wireless communication in licensed band
Kolaja, David ; Brychta, Josef (referee) ; Fujdiak, Radek (advisor)
Contemporary demand for mobile devices and development of devices in the Internet of Things is constantly increasing. This reality also raises concerns about security and privacy of ongoing communication. This is no exception for expanding scale of Low Powered Wide Area Network (LPWAN) devices which communicate over Narrowband IoT and the customer of such devices who has to rely on security of provider’s network to secure customer’s data. This security is effective only in operator’s network while there is no end-to-end encryption enabled. Therefore, this thesis deals with the analysis of NB-IoT communication and its possible end-to-end security proposal, which also provides elements of post-quantum algorithms. Last but not least, this thesis deals with application of this proposal on constrained device and evaluation of its effectivness of time, energy and memory demands.
Multiplatform Test Environment For Efficiency Analysis Of Cryptographic Primitives Used In Elliptic Curves
Brychta, Josef
This paper deals with design of multiplatform test environment for efficiency analysis of cryptographic primitives used in elliptic curves. The test algorithm to generate 1000 random points on the SEC secp256k1 elliptic curve was used on Raspberry Pi 2/3 devices and compared the measured real-time values of the system usage of these devices.
Comparison of cryptographic primitives used in elliptic curve cryptograpny on different hardware platforms
Brychta, Josef ; Martinásek, Zdeněk (referee) ; Fujdiak, Radek (advisor)
This master thesis deals with the implementation of variants of cryptographic libraries containing primitives for elliptic curves. By creating custom metering charts to compare each implementation. The main task was not only the implementation of libraries but also the design and implementation of test scenarios together with the creation of measurement methods for different libraries and hardware platforms. As a result, a number of experimental tests were conducted on different curves and their parameters so that the results of the work included complex problems of elliptic curves in cryptography. The main parameters were power, time and memory consumption.

National Repository of Grey Literature : 12 records found   1 - 10next  jump to record:
See also: similar author names
15 Brychta, Jan
1 Brychta, Jaroslav
1 Brychta, Jiří
Interested in being notified about new results for this query?
Subscribe to the RSS feed.