National Repository of Grey Literature 336 records found  beginprevious178 - 187nextend  jump to record: Search took 0.02 seconds. 
Implementation of SHA-3 algorithm in FPGA
Ohnút, Petr ; Macho, Tomáš (referee) ; Valach, Soběslav (advisor)
This Bachelors's thesis is focused on the description of SHA3 algorithm, an FPGA technology, and the possibility to implement the SHA3 algorithm into FPGA. It also deals with our design and implementation in Python and VHDL.
Tool for secure start and update of embedded device firmware
Böhmová, Monika ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This bachelor thesis covers creation of a tool designed for secure boot and update of firmware of embedded microcontrollers. Cryptography algorithms and methods, which were used for security are thoroughly described. In the following sections, independent subparts of which the whole tool comprises are explained. The tool was succesfully created, tested and will be deployed in the following year.
Cryptography on Arduino platform
Cvrček, Tadeáš ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis deals with the analysis of possibilities of using Arduino platform for cryptographic systems, while implementing anonymous credential schemes on this platform. The content includes the results of searches of available libraries for modular arithmetic and operations on elliptic curves and their performance tests. Following the results, suitable libraries were selected and a practical implementation of modern anonymous credential schemes was performed.
Web-based application for cryptographic protocols visualization
Ryšavá, Pavla ; Dzurenda, Petr (referee) ; Ricci, Sara (advisor)
Práce se zabývá vytvořením interaktivní webové aplikace pro substituční šifry a jejich interaktivní kryptoanalýzu. V práci je implementováno šest šifer a zástupci monoalfabetických šifer jsou Caesarova šifra, Atbaš a substituce s klíčovým slovem. Dále zástupci polyalfabetických šifer jsou Vigenrova šifra, Kryptos a Vernamova šifra. Pro interaktivní analýzu je použita frekvenční analýza, index koincidence a n-gramová statistika jako fitness funkce. Výsledek byl dosažen za pomoci HTML5, CSS a skriptovacího jazyka ReactJS což je JavaScriptová knihovna s možností typové kontroly proměnných.
Application for programmable smart cards
Broda, Jan ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
The theoretical part of the bachelor thesis deals with the issue of secure attribute authentication, which places great emphasis on the protection of privacy and digital identity. The next part of the work deals with chip cards with MultOS operation system. The practical goal of this work is to create authentication application in C language using the attribute scheme CDDH19 and revocation scheme CDH16. The attribute scheme is based on signature scheme weak Boneh Boyen and on algebraic MAC funcion. For development it was used an interface Eclipse IDE with development environment SmartDeck. The final application will allow the users secure attribute authentication without any risks of leak of sensitive information. This application is implemented on MultOS chip card and tested in cooperation with the student, who programmed the verifier side on the microcomputer Raspberry PI.
Platform Independent Storge of Sensitive Data
Klemens, Jakub ; Herout, Adam (referee) ; Španěl, Michal (advisor)
This thesis addresses the issues when securing sensitive data for Windows, iOS and MacOS, with the target being to create the ideal key-value data storage library. A C++ library has been designed and implemented based on a given facts. The library offers a simple application programming interface for storing data and structuring them into modules. A base functionality is verified by set of unit tests.
Security mechanisms of OS Android utilizing the Kotlin language
Balaževič, Lukáš ; Mašek, Pavel (referee) ; Zeman, Kryštof (advisor)
Mobilné zariadenia sú v rámci technologickej histórie novinka a pri technológii, ktorá sa vyvíja tak rapídnym tempom a rastom používania je nutné dbať na zabezpečenie. Táto diplomová práca sa zaoberá rozborom bezpečnostných mechanizmov používaných v Android OS a komunikáciou medzi OS Android a vzdialeným serverom. Cieľom je preskúmať tieto mechanizmy a otestovať aké kryptografické metódy a postupy je najvýhodnejšie používať z hľadiska bezpečnosti s ohľadom na efektivitu. Tieto znalosti boli použité pre vytvorenie demonštračného systému, ktorý využíva vybrané zabezpečovacie mechanizmy a kryptografické postupy.
P4 cryptographic primitive support
Cíbik, Peter ; Malina, Lukáš (referee) ; Smékal, David (advisor)
This diploma thesis deals with the problem of high-speed communication security which leads to the usage of hardware accelerators, in this case high-speed FPGA NICs. Work with simplification of development of FPGA hardware accelerator applications using the P4 to VHDL compiler. Describes extension of compiler of cryptographic external objects support. Teoretical introduction of the thesis explains basics of P4 language and used technologies. Describes mapping of external objects to P4 pipeline and therefore to FPGA chip. Subsequently deals with cryptographic external object, compatible wrapper implementation and verification of design. Last part describes implementation and compiler extension, cryptographic external object support and summarizes reached goals.
Secure data transmition using bar codes
Kratochvíl, Martin ; Herout, Adam (referee) ; Beran, Vítězslav (advisor)
The goal of this thesis was to create a system for visual data transmition using bar codes. It focuses mainly on the protection of the system against abuse. A mechanism was designed for the data transmition itself and the various security concepts. The most appropriate bar code for data transmition was selected on the basis of the analysis.
Electronic Mail Room of the BUT
Beran, Martin ; Křena, Bohuslav (referee) ; Marušinec, Jaromír (advisor)
This dissertation thesis attends to problems of electronic registry for VUT. It deals with the principal of electronic registry functioning, electronic signature and it compares offer of the commercial registries. It goes in for the proposal and implementation of the electronic registry for VUT. Since the using of the e- registry on all public service Office was legalized the people can avoid long queues and the employees are avoided from the stress before dead lines. By the communication through the electronic registry is very important the electronical signature. It is almost a full-valued and lawful alternative to the physical signature. For its safety and utility this system employes asymmetric codes and hash algorithm. Presently in many states, where the electronical signature is legalized it is used together with standard X 509 which defines the format of certificates, organization and action of certification authorities. The certification autority ensures safe connection of the person and general key for using of the electronical signature.

National Repository of Grey Literature : 336 records found   beginprevious178 - 187nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.