National Repository of Grey Literature 23 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Network Traffic Encryptor on Linux Platform
Havlín, Jan ; Sysel, Petr (referee) ; Hajný, Jan (advisor)
This bachelor thesis focuses on providing encrypted communication between two Linux operating system stations. It involves encryption using the AES-GCM-256 cipher, which uses a hybrid key derived from three separately generated keys. The methods for generating these keys are Quantum Key Distribution, CRYSTALS-Kyber and Elliptic Curve Diffie-Hellmann. Thus, we use functions of three types of cryptography - classical, quantum and post-quantum. The paper also deals with the extension of the functionality of the original cryptography to authenticate the communicating parties using certificates and deployment of the encryptor in practice.
AES Tolerance to Timing Analysis
Ondruš, Juraj ; Matyáš, Václav (referee) ; Cvrček, Daniel (advisor)
This thesis deals with timing analysis of the AES (Advanced Encryption Standard). The design of {\em Rijndael\/}, which is the AES algorithm, is described here. For the side channel attacks is necessary to know the principles of the cache memory in CPU and its architecture. In this thesis are involved major security problems of AES which can be used for successful attacks. Several different implementations of AES are discussed too. Several types of timing attaks are also described. According to the experimentations these attacks should be efficient to the most presently used AES implementations. Finally, the results of this work are described, possible countermeasures against this attack and motions for the next research.
Software support for cryptography education
Stančík, Peter ; Vyoral, Josef (referee) ; Burda, Karel (advisor)
The main aim of this thesis was to study, choose and decribe techniques eligible for cryptography education. A pedagogically appropriate presentation for the selected techniques' principles was to be chosen. Another goal was to create an integrated modular web interface containing a calculator focused on cryptographic operations. The eligibility of techniques was assessed accordingly to the computing processes implied by these techniques and also accordingly to the ability of being presented in an illustrative way. A program simplifying calculations used in symetric and asymetric cryptography was designed and implemented. It disposes of a web interface and one of its parts is focused on steganographic techniques. On the other hand, any pedagogically appropriate presentation interconnecting this program with theoretical findings from this field was not found.
Cryptovirology
Kubík, Pavel ; Schäfer, Jiří (referee) ; Pecho, Peter (advisor)
This thesis is focused on a relatively new branch of computer security called Cryptovirology. It uses cryptography and its principles in conjunction with designing and writing malicious codes (e.g. computer viruses, trojan horses, worms). Techniques such as viral propagation through computer networks, capabilities of current viruses and similar threats are described. Beside cryptography and computer viruses, design of the cryptovirus and methods of a cryptoviral extortion attack along with their related potential are also analyzed below in this paper. As a proof of the concept in the given area of cryptovirology, a demonstrational computer program was written. The program was implemented with the respect to the satisfaction of the essentials set to the cryptovirus.
Library of Algorithms for Text Ciphering
Mikulka, Jiří ; Havel, Jiří (referee) ; Kubíček, Radek (advisor)
This thesis brings an overview of historical and modern methods and approaches used in cryptography. It also describes and assesses ciphers, which have been used since the very beginning of encryption till modern ciphers. Based on information resulting from this overview the reader should be able to distinguish between ciphers, know their advantages and disadvantages, and be able to choose the best cipher for any purpose. Ciphers mentioned in this thesis are implemented in a library called CipherLib , which shows usage of every described cipher.
Lego Technic encryption demonstrator
Jančík, Jakub ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
The bachelor thesis is mostly about mechanical encryption. Primary task was to build demonstrator encryptor using only LEGO Technic building kit, which would allow polyalphabetical substitution encryption. The theoretical part includes information about origins of steganography, cryptography and cryptanalysis, it explains the process of the polyalphabetical substitution encryption and it will introduce Enigma – how it went on during development, on what principle it works and thanks to what it stopped being safe. Device was extended with LEGO MINDSTORMS which allowed to build the Enigma demonstrator.
Model of Enigma Encryption Machine from Lego Technic
Kupka, Ondřej ; Číž, Radim (referee) ; Hajný, Jan (advisor)
The aim of the thesis is to design and implement the possibility of interconnecting the Enigma encryption machine model, built from LEGO Technic and LEGO Mindstorm kit, with the display device and extend the model by the possibikty to enter any text using the Bluetooth keyboard. The input text is then encrypted along with the demonstration of the encryption by the model and the output encryption text is then displayed on the display device screen. The first part of the work is devoted to the beginnings of encryption and development of Enigma encryption machine. Subsequently, it is focused in more detail on the Wehrmacht Enigma model, on the basis of which a web application for model operation was created. The application is designed based on the Ev3dev special firmware for the control unit and written using Python and Flask. The work describes partial parts of the application, individual functions and principles. Part of the work is a manual for model operation.
Portal for the support of cryptography instruction
Forman, Tomáš ; Doležel, Radek (referee) ; Zeman, Václav (advisor)
The main goal of this master's thesis is building of web portal for presentation basic cryptography algorithms. Those algorithms would be explained in the theoretical page in the first place. After that, they would be demonstrated by scripts. One part of this project is designing simplified theoretical element for basic impletion portal of information. Next part is creating web portal by one of the free available CMS´s systems. Programming language JAVA would be used as an instrument for creating demonstration scripts. For creating animations will be used the Flash animation tool. Target of formed web portal is creating community of expert public. It would make new articles, scripts and knowledge. This way, the portal would be kept current. The section which would include failure the most widely used algorithms and instructions how to eliminate it will be part of portal.
Hardware Acceleration of Cipher Attack
Okuliar, Adam ; Slaný, Karel (referee) ; Vašíček, Zdeněk (advisor)
Hardware acceleration is often good tool to achieve significantly better performance of processing great ammount of data or of realization of parallel algoritms. Aim of this work is to demonstrate resoluts of using FPGA circuits for implementation exponentially complex algorithm. As example haschosen brute-force attack on WEP cryptographic algorithm with 40-bit long key. Goal of this work is to compare properties and performance of software and hardware implementation of choosen algorithm.
Protection of highspeed communication systems
Smékal, David ; Martinásek, Zdeněk (referee) ; Hajný, Jan (advisor)
The diploma thesis deals with 128–bit AES data encryption and its implementation in FPGA network card using VHDL programming language. The theoretical part explains AES encryption and decryption, its individual steps and operating modes. Further was described the VHDL programming language, development environment Vivado, FPGA network card Combo–80G and configurable framework NetCOPE. The practical part is the implementation of AES–128 in VHDL. A simulation was used to eliminate errors, then the synthesis was performed. These steps were made using Vivado software. Last step of practical part was testing of synthesized firmware on COMBO–80G card. Total of 4 projects were implemented in FPGA card. Two of them were AES encryption and decryption with ECB mode and another two describe the encryption and decryption with CBC mode.

National Repository of Grey Literature : 23 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.