National Repository of Grey Literature 351 records found  beginprevious134 - 143nextend  jump to record: Search took 0.00 seconds. 
Application of ACO to simple subsitution ciphers
Turek, Luboš ; Tůma, Jiří (advisor) ; Surynek, Pavel (referee)
Název práce: Použití ACO algoritmu na řešení jednoduché substituční šifry Autor: Luboš Turek Katedra (ústav): Katedra algebry Vedoucí bakalářské práce: doc. RNDr. Jiří Tůma, DrSc. e-mail vedoucího: jiri.tuma@mff.cuni.cz Abstrakt: V předložené práci studujeme kombinatorickou metaheuristiku Ant Colony Optimization a zkoumáme možné způsoby jejího použití k pro- lomení jednoduché substituční šifry. Součástí práce je návrh a implementace programu. Tento program je srovnán s genetickým algoritmem. Klíčová slova: jednoduchá substituční šifra, ant colony optimization, ACO, kryptologie, kryptografie Title: Application of ACO to simple subsitution ciphers Author: Luboš Turek Department: Department of Algebra Supervisor: doc. RNDr. Jiří Tůma, DrSc. Supervisor's e-mail address: jiri.tuma@mff.cuni.cz Abstract: In the present work we study combinatorial metaheuristic Ant Colony Optimization and we search for its application to the problem of cracking simple subtitution cipher. Functional implementation is a part of the thesis. The program is compared to genetic algorithm. Keywords: simple substitution cipher, ant colony optimization, ACO, cryp- tology, cryptography 6
Side channel attack in cryptanalysis of symmetri and asymmetric schemes
Hlaváč, Martin ; Rosa, Tomáš (advisor) ; Klíma, Vlastimil (referee) ; Tůma, Jiří (referee)
The work summarizes author's three main results during the doctoral studies published at SAC '06 and CHES '09 conferences and the journal IET Information Security. The first two results are the side channel attacks on asymmetric schemes RSA and DSA. They are both based on the theory of lattices and are motivated by modern technologies such as Intel Pentium 4 HTT processor and the electronic passport. The last result is more technology related. It describes the method that provides optical side information and that was empoyed for the first time for the cryptanalytic purposes by the author. As an application, an attack on symmetric cipher AES running on a simple and widespread microcontroller PIC16F84A is presented.
Deniable encryption
Šebek, Marcel ; Tůma, Jiří (advisor) ; Krajíček, Jan (referee)
In the thesis we study deniable encryption, as proposed by Canetti et al. (CRYPTO 1997). Standard encryption schemes guarantee good security level unless the adversary is able to force the sender and/or receiver to reveal her secret knowledge. Assuming that the adversary knows true ciphertext, the se- cret inputs usually commits the sender/receiver to the true plaintext. On the contrary, deniable scheme is equipped with algorithms that provide alternative secrets which makes the adversary believe that different plaintext was encrypted. We recall the most important results in the area, in particular, the schemes of Canetti et al. (CRYPTO 1997), the scheme of Klonowski et al. (SOFSEM 2008) based on ElGamal encryption, schemes of O'Neill et al. (CRYPTO 2011), and schemes and impossibility result of Bendlin et al. (ASIACRYPT 2011). In ad- dition to presenting known results in an unified environment, we deeply investi- gate simulatable-encryption based schemes. In particular, we construct a scheme that is bideniable, and both of its induced schemes are receiver-deniable (in the flexible/multi-distributional setting). We also disprove part of the results of Bendlin et al. (ASIACRYPT 2011) by showing that their construction of fully bideniable scheme is wrong. This result is verified using computer simulation....
The design and cryptanalysis of the AES (Advanced Encyption Standard)
Říha, Jan ; Tůma, Jiří (advisor) ; Vábek, Jiří (referee)
Nazev prace: Konstrukce a kryptoanalyza AES (Advanced Encyption Standard) Autor: Jan Říha Katedra: Katedra Algebry Vedouci bakalafske prace: Doc. RNDr. Jin Tuma, DrSc. E-mail vedouciho bakalafske prace: Jiri.Tuma@mff.cuni.cz Abstrakt: V pfedlozene praci studujeme nejnovejsi symetrickou blokovou sifru AES. Nejprve se zabyvame vyvojem a vznikem sifry od vypsani souteze a2 po vyhlaseni vitezneho kandidata. Pote se venujeme jejf konstrukci, ve ktere se vyuziva nekterych netrivialnich poznatku algebry pfi praci s polynomy nad konecnym telesem. V teto kapitole je tez popsana prima inverzni sifra a ekvivalentni inverzni sifra slou^ici k desifrovani zasifrovanych dat. Ve tfeti kapitole zkoumame navrhovane implementace sifry AES na jednotlive platformy a nakonec rozebirame mozne utoky a odolnost Sifry AES vuci nim. Klicova slova: AES, sifra, implementace, kryptoanalyza Title: The design and cryptanalysis of the AES (Advanced Encyption Standard) Autor: Jan ftiha Department: Department of Algebra Supervisor: Doc. RNDr. Jin Tuma, DrSc. Supervisor's e-mail address: Jiri.Tuma@mff.cuni.cz Abstract: In the present work we study the newest symetric block cipher AES. At first we consider development and creation of the cipher from the start of selection proces till announcement of winning candidate. Then we turn to its...
Attacks based on side channels
Hlaváč, Martin ; Rosa, Tomáš (advisor) ; Tůma, Jiří (referee)
The work extends the Hidden Number Problem (HNP) introduced by Boneh and Venkatesan in 1996. HNP is to find an unknown integer if several approximations of its multiples modulo N are known. New method for solving an extension of HNP (EHNP) is elaborated, taking into account the ragmentation of the information on the multiples and on the hidden number itself, as well. A real scenario application of the approach is presented - the private DSA key is extracted with the knowledge of side information on 5 signing operations. Such an information can be obtained if the signatures are generated in the unsecured environment of a Pentium 4 processor with Hyper-Threading technology.

National Repository of Grey Literature : 351 records found   beginprevious134 - 143nextend  jump to record:
See also: similar author names
2 Tuma, Josef
23 TŮMA, Jan
2 TŮMA, Jaroslav
18 TŮMA, Jiří
1 Tůma, J.
3 Tůma, Jakub
23 Tůma, Jan
2 Tůma, Jaroslav
Interested in being notified about new results for this query?
Subscribe to the RSS feed.