National Repository of Grey Literature 20 records found  1 - 10next  jump to record: Search took 0.00 seconds. 
Online DNSSEC Records Validation
Bachtík, Martin ; Čejka, Rudolf (referee) ; Lampa, Petr (advisor)
Master's Thesis is studying an extension that secures the domain name system by introducing the verifiability of authenticity of data, known as DNSSEC. Productive output is proposal of application and its subsequent implementation that at each stage of browse the namespace to the selected domain name checks the appropriatenesses of this extension and in detail reports the trusted chain.
Modern Asymmetric Cryptosystems
Walek, Vladislav ; Sobotka, Jiří (referee) ; Malina, Lukáš (advisor)
Asymmetric cryptography uses two keys for encryption public key and for decryption private key. The asymmetric cryptosystems include RSA, ElGamal, Elliptic Curves and others. Generally, asymmetric cryptography is mainly used for secure short messages and transmission encryption key for symmetric cryptography. The thesis deals with these systems and implements selected systems (RSA, ElGamal, McEliece, elliptic curves and NTRU) into the application. The application can test the features of chosen cryptosystems. These systems and their performance are compared and evaluated with the measured values. These results can predict the future usage of these systems in modern informatics systems.
Secure Communication in Embedded Systems
Rácek, Luboš ; Mlýnek, Petr (referee) ; Červenka, Vladimír (advisor)
Bachelor’s thesis focuses on a design and analysis of protocol to provide secure communication using a hardware accelerator. The protocol will be designed with low power consumption and small computing power of a microcontroller. Asymetric cryptography will be taken into account in the design.
Asymmetric Cryptography on FPGA
Dobiáš, Patrik ; Smékal, David (referee) ; Malina, Lukáš (advisor)
This bachelor thesis deals with the analysis of existing hardware implementations of asymmetric cryptographic schemes on the FPGA platform and the then implementation of the cryptographic scheme Ed25519 on this platform. The resulting implementation is described in detail and compared with existing implementations. At the end of this work, the deployment of this implementation on the Virtex UltraScale+ FPGA is described.
Modern Token-based and Knowledge-based Authentication
Ševčík, Michal ; Pust, Radim (referee) ; Malina, Lukáš (advisor)
This bacherol thesis deals with a modern authentization using an object and knowledge. It mostly focuses on authentization by means of USB token, Smart Java Cards, Smart .NET Cards and NFC technology and their subsequent use in the authentization in a local network.
Portal for the support of cryptography instruction
Forman, Tomáš ; Doležel, Radek (referee) ; Zeman, Václav (advisor)
The main goal of this master's thesis is building of web portal for presentation basic cryptography algorithms. Those algorithms would be explained in the theoretical page in the first place. After that, they would be demonstrated by scripts. One part of this project is designing simplified theoretical element for basic impletion portal of information. Next part is creating web portal by one of the free available CMS´s systems. Programming language JAVA would be used as an instrument for creating demonstration scripts. For creating animations will be used the Flash animation tool. Target of formed web portal is creating community of expert public. It would make new articles, scripts and knowledge. This way, the portal would be kept current. The section which would include failure the most widely used algorithms and instructions how to eliminate it will be part of portal.
Electronic ID Cards
Mravec, Roman ; Burda, Karel (referee) ; Hajný, Jan (advisor)
This master thesis deals with an implementation of Diffie-Hellman protocol on smart card which is based on MULTOS OS. Defines the smart cards based on MULTOS OS and their usage. Output of this thesis are applications for a smart card and for a client using Diffie-Hellman protocol for establishing of a secret key between two communication sides through unsecured communication channel.
Secure Communications in Wireless Embedded Systems
Marek, Pavel ; Šimek, Milan (referee) ; Červenka, Vladimír (advisor)
This bachelor thesis deals with secure communication in wireless sensor networks. There are given and described options of encryption protocols that using symmetric and asymmetric ciphers. This protocols are evaluated from aspect of computational performance and energy comsumption. Pursuant this evaluations there is designed and implemented key distribution protocol for symmetric cipher. Encryption of communication s implemented by IEEE 802.15.4 standard. This implementation is performed on ARM Cortex-M3.
Electronic Mail Room of the BUT
Beran, Martin ; Křena, Bohuslav (referee) ; Marušinec, Jaromír (advisor)
This dissertation thesis attends to problems of electronic registry for VUT. It deals with the principal of electronic registry functioning, electronic signature and it compares offer of the commercial registries. It goes in for the proposal and implementation of the electronic registry for VUT. Since the using of the e- registry on all public service Office was legalized the people can avoid long queues and the employees are avoided from the stress before dead lines. By the communication through the electronic registry is very important the electronical signature. It is almost a full-valued and lawful alternative to the physical signature. For its safety and utility this system employes asymmetric codes and hash algorithm. Presently in many states, where the electronical signature is legalized it is used together with standard X 509 which defines the format of certificates, organization and action of certification authorities. The certification autority ensures safe connection of the person and general key for using of the electronical signature.
Wireless Sensor Network
Nosko, Matúš ; Materna, Zdeněk (referee) ; Zemčík, Pavel (advisor)
The work was focused on creating a secure sensor network based on mesh topology, built on devices from Espressif. It also concentrates on code security and connecting this network to the cloud. The mesh network created is dynamic, regenerative, and self-organizing. The entire network is built on Wi-Fi, making it easy to connect to the internet, as the only condition for its operation is to have Wi-Fi at the installation site, eliminating the need for any special device to connect the network to the internet - it's gatewayless. Even if one node fails, the network self-organizes according to the newly created conditions and continues to function. The most modern security methods are used to secure the devices, such as secure boot and flash encryption. The MQTT protocol is used to connect the mesh network to the server. The MQTT broker, database, and API interface on the server side are dockerized. Thanks to these docker containers, it is easy to extend server parts. Also, values from devices are stored in a database and displayed on a website. The entire network solution was implemented in the ESP-IDF environment and tested on ESP32-S3 devices.

National Repository of Grey Literature : 20 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.