National Repository of Grey Literature 345 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Mobile Application for Decentralized Elections
Pastushenko, Vladislav ; Perešíni, Martin (referee) ; Tamaškovič, Marek (advisor)
Tato práce popisuje vývoj decentralizované mobilní aplikace pro operační systém Android, která využívá protokol hlasování v zasedací místnosti založený na blockchainu. Článek popisuje motivaci k napsání práce, obecné pojmy spojené s vývojem decentralizovaných aplikací, popisuje plán vývoje, popisuje zvolené technologie, implementace a testování aplikace, zvláštnosti při práci s Flutterem při interakci s chytrými kontrakty Solidity.
Cryptographic schemes implementation on small FPGA platforms
Pukšová, Ráchel ; Cíbik, Peter (referee) ; Dobiáš, Patrik (advisor)
The objective of the bachelor thesis is to implement the AES-GCM encryption algorithm on a Nexys A7-100T FPGA board. It introduces the issues of cryptography and authentication in data transmission as well as describes the FPGA technology. The implementation has been done in VHDL, as a hardware description language. It analyses the project provided by the Institute of Telecommunications of Brno University of Technology, which is intended to be modified to achieve the stated goal. In the practical part, it discusses the modifications made and the tests that verified the functionality of the implementation. It compares resource utilization with the original project as a tool to better understand the impact of the modifications made. This work is also compared with existing AES-GCM solutions. Finally, suggestions are given for further modifications that could be made to achieve lower goals.
Privacy Preserving Smart-Contract Platforms and E-Voting
Žiška, Marek ; Homoliak, Ivan (referee) ; Perešíni, Martin (advisor)
Táto práca analyzuje platformy na ochranu súkromia ako Secret, Phala a Oasis Network, ktoré poskytujú nástroje pre vývoj smart kontraktov s možnosťou privátneho úložiska a dôverných výpočtových schopností. Platformy porovnávame na základe ich vlastností, ako je výkon, použiteľnosť a ďalšie faktory v kontexte prípadu použitia v elektronickom hlasovaní. Najprv predstavíme teoretické základy v oblasti volebných systémov, blockchainové technológie, smart kontrakty, technológie dôverného výpočtu a v neposlednom rade jednotlivé platformy na ochranu súkromia. Na základe zistení navrhneme volebný proces nášho smart kontraktu elektronického hlasovania, ktorý budeme implementovať na všetkých platformách. Následne analyzujeme možnosti a schopnosti vývoja každej z platforiem, najmä pokiaľ ide o definíciu štruktúry úložiska. Okrem toho navrhneme aj scenár hodnotenia, ktorý budeme vykonávať na každom z vyvinutých smart kontraktov. Po návrhu kľúčových častí smart kontraktov prechádzame k implementácií, kde diskutujeme o našich skúsenostiach, o použitých nástrojoch, o spôsobe zbere a vyhodnotenia štatistík a o metódach testovania. V rámci tejto fázy sme taktiež vyvinuli aj skripty, ktoré zbierajú štatistiky z navrhnutého scenára hodnotenia elektronického volebného systému, ktoré použijeme na vyhodnotenie a porovnanie týchto platforiem. Na záver zhrnieme dosiahnuté výsledky, kľúčové poznatky, úvahy a potenciálne oblasti pre budúce zlepšenia.
Cryptographic algorithms for low-power IoT devices
Oszelda, Matěj ; Dobiáš, Patrik (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis analyses the possibilities of application of operating systems, cryptographic libraries and their primitives in memory, performance and computationally constrained IoT environment. It then implements selected tools for securing communication in a system with constrained IoT devices. The theoretical part discusses the IoT, the different operating systems and cryptographic libraries in this environment. It then presents the measurement and comparison of cryptographic libraries and their primitives. Based on the measurements, it selects tools for implementation in securing the communication of IoT devices. It then creates a design and implements the system.
A software tool for checking the secure settings of the parameters of the selected database
Hlavica, Adam ; Štůsek, Martin (referee) ; Šeda, Pavel (advisor)
This thesis deals with the design and implementation of a software tool for best practice database configuration checking. The theoretical part describes database technologies, their applications and existing solutions in the field of automated database configuration checking. Furthermore, possible configurations of the PostgreSQL database system are presented with a focus on security. The practical part shows the design of a program with the necessary requirements and its implementation in Python. The final chapter focuses on a practical demonstration of the program deployment.
The analysis of cryptographic techniques for offloading computations and storage in blockchains
Olekšák, Samuel ; Homoliak, Ivan (referee) ; Perešíni, Martin (advisor)
Vznik blockchainových technológií umožnil nový pohľad na distribuované výpočty a decentralizovanú správu dát. Avšak so vzrastajúcou popularitou platforiem vznikajú problémy so škálovateľnosťou, keďže ich prevádzka vyžaduje kryptografické princípy náročné na zdroje. Táto práca skúma techniky, ktoré tento problém riešia odľahčovaním výpočtov a ukladania v blockchainoch pomocou zero-knowledge dôkazov, kryptografických akumulátorov a iných kryptografických techník. Druhá časť práce navrhuje nový spôsob implementácie trhoviska zero-knowledge dôkazov založeného na blockchaine s využitím proof of useful work (PoUW) konsenzuálneho protokolu.
Linux encryptor for network traffic
Suchý, Daniel ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This bachelor's thesis deals with the possibilities of encrypting network traffic on the Linux platform. The goal is to create a virtual machine that can encrypt incoming traffic and send it to it‘s destination. Encryption of network traffic was implemented using the ip-xfrm framework in the form of encryption of the packet’s payload. The encryption algorithm chosen was AES-256 with a key generated and established using QKD. For the possibility of expanding the functionality of the encryptor for multiple clients, a VPN server was implemented on the encryptor.
Cryptographic coprocessors for IoT microcontrollers communication protection
Český, Michal ; Zeman, Václav (referee) ; Slavíček, Karel (advisor)
This bachelor thesis outlines the issue of how communication can be secured within the IoT. The microcontroller itself can also be used for this purpose, however, security will never be assured as it will be when using a hardware cryptographic co-processor. To generate the keys and certificate, the ATECC608B coprocessor is chosen which holds the necessary "secrets" used to secure the communication. As a demonstration of the cryptographic coprocessor functionality, the ESP32 microcontroller is connected to the AWS server where all the connections to the server are established using the cryptographic coprocessor.
Demonstration of Cryptographic Problems through an Interactive Educational Game
Fišarová, Anežka ; Mezina, Anzhelika (referee) ; Mikulec, Marek (advisor)
The bachelor thesis is focused on the design and implementation of a cryptographic interactive educational game. It focuses on various cryptographic ciphers specifically selected so that people outside the field can be introduced to the subject in a demonstrative and entertaining way. Java and JavaFX were used as the programming language. The thesis consists of four parts, the first two are oriented towards the theoretical part of cryptography and the second two are more focused on the practical application and code development. As motivation for the players, a score for correctly cracked ciphers was used. Furthermore, the work includes a choice of difficulty, which influences which ciphers will be presented to the players. At the end of the thesis, the author reflects on the results and explores ways to further improve the methods presented.
Software support of education in cryptography area based on elliptic curves
Szturc, Jakub ; Sobotka, Jiří (referee) ; Burda, Karel (advisor)
The master‘s thesis is focusing on cryptography based on elliptical curves consists of four main parts. The first part provides an overview of the basic cryptographic and mathematical concepts. A key element of this work is the second part which are described in detail the mechanisms of counting two points on elliptic curve and counting point to themselves over the various fields. On this mechanism is based almost the entire issue. In the third section provides the best-known algorithms and protocols for key exchange, encryption and digital signature. The goal of this paper is to devise software to support teaching. This material is created as a web presentation, which described the theoretical foundations and the main characteristics of cryptosystems based on elliptical curves. The whole issue is supported by practical examples of calculations examples, there are also examples for independent work. Additionally, java applets are prepared that allow an interactive opportunity to try the basic parameters of curves, or verify the calculations.

National Repository of Grey Literature : 345 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.