National Repository of Grey Literature 8 records found  Search took 0.01 seconds. 
Specialized Instruction Design
Koscielniak, Jan ; Zachariášová, Marcela (referee) ; Hruška, Tomáš (advisor)
The purpose of this thesis is to design and implement specialized instructions for RISC-V instruction set architecture. These instruction are used to accelerate a set of selected cryptographic algorithms. New instructions are implemented in Codasip Studio for 32bit processor model with RV32IM instruction set. Open source implementations were selected and edited to use new instructions. Instructions were used on respective algorithms, tested and profiled. The outcome of this thesis is instruction set extension, that enables up to seven times speed up, depending on used algorithm.
Implementation of cryptographic primitives
Jégrová, Eliška ; Fujdiak, Radek (referee) ; Ležák, Petr (advisor)
This semestral thesis is focused on cryptographic methods. Part of it deals with block ciphers, where are described algorithms of Blowfish and 3DES. It also deals with hash functions of which are analysed algorithms of SHA-3 and Tiger in detail.
Security of real time multimedia data transmission
Otoupalík, Petr ; Koutný, Martin (referee) ; Hošek, Jiří (advisor)
This thesis deals with technology and security of real-time multimedia data transmission. The possibilities of the security of a multimedia data transfer and the mechanisms defined for the security of the signaling protocols SIP and H.323 are described with the view of security. The possible attacks on the real-time transfers are also mentioned. The basic requirements on the safe and reliable data transfer are specified. The main part of this thesis is focused on the security analysis of the data transmission of the selected communication clients, which use different security methods. The last part of the thesis deals with realization of simple attacks on multimedia data transmission and also on the SIP protocol.
Analysis of Encipherement Methods for Disk Cloning
Chromečka, Jiří ; Černý, Martin (referee) ; Drahanský, Martin (advisor)
The presented text deals with designing of a multilingual application and its following implementation in the C++ language. The application encrypts disk volumes with Microsoft Windows system using symmetric cryptography and password authentication, where the password security strength is verified. Securing the sensitive data is one of the important security goals in area of information technology. The symmetric cryptography uses the same key for both the encryption and the decryption and due to its speed it is suitable for the data storage encryption. For the higher security it is possible to encrypt a whole disk volume with sensitive data.
Specialized Instruction Design
Koscielniak, Jan ; Zachariášová, Marcela (referee) ; Hruška, Tomáš (advisor)
The purpose of this thesis is to design and implement specialized instructions for RISC-V instruction set architecture. These instruction are used to accelerate a set of selected cryptographic algorithms. New instructions are implemented in Codasip Studio for 32bit processor model with RV32IM instruction set. Open source implementations were selected and edited to use new instructions. Instructions were used on respective algorithms, tested and profiled. The outcome of this thesis is instruction set extension, that enables up to seven times speed up, depending on used algorithm.
Analysis of Encipherement Methods for Disk Cloning
Chromečka, Jiří ; Černý, Martin (referee) ; Drahanský, Martin (advisor)
The presented text deals with designing of a multilingual application and its following implementation in the C++ language. The application encrypts disk volumes with Microsoft Windows system using symmetric cryptography and password authentication, where the password security strength is verified. Securing the sensitive data is one of the important security goals in area of information technology. The symmetric cryptography uses the same key for both the encryption and the decryption and due to its speed it is suitable for the data storage encryption. For the higher security it is possible to encrypt a whole disk volume with sensitive data.
Implementation of cryptographic primitives
Jégrová, Eliška ; Fujdiak, Radek (referee) ; Ležák, Petr (advisor)
This semestral thesis is focused on cryptographic methods. Part of it deals with block ciphers, where are described algorithms of Blowfish and 3DES. It also deals with hash functions of which are analysed algorithms of SHA-3 and Tiger in detail.
Security of real time multimedia data transmission
Otoupalík, Petr ; Koutný, Martin (referee) ; Hošek, Jiří (advisor)
This thesis deals with technology and security of real-time multimedia data transmission. The possibilities of the security of a multimedia data transfer and the mechanisms defined for the security of the signaling protocols SIP and H.323 are described with the view of security. The possible attacks on the real-time transfers are also mentioned. The basic requirements on the safe and reliable data transfer are specified. The main part of this thesis is focused on the security analysis of the data transmission of the selected communication clients, which use different security methods. The last part of the thesis deals with realization of simple attacks on multimedia data transmission and also on the SIP protocol.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.