National Repository of Grey Literature 25 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Software support of education in cryptography area based on elliptic curves
Szturc, Jakub ; Sobotka, Jiří (referee) ; Burda, Karel (advisor)
The master‘s thesis is focusing on cryptography based on elliptical curves consists of four main parts. The first part provides an overview of the basic cryptographic and mathematical concepts. A key element of this work is the second part which are described in detail the mechanisms of counting two points on elliptic curve and counting point to themselves over the various fields. On this mechanism is based almost the entire issue. In the third section provides the best-known algorithms and protocols for key exchange, encryption and digital signature. The goal of this paper is to devise software to support teaching. This material is created as a web presentation, which described the theoretical foundations and the main characteristics of cryptosystems based on elliptical curves. The whole issue is supported by practical examples of calculations examples, there are also examples for independent work. Additionally, java applets are prepared that allow an interactive opportunity to try the basic parameters of curves, or verify the calculations.
Web application on elliptic curve cryptography
Štark, Daniel ; Dzurenda, Petr (referee) ; Ricci, Sara (advisor)
Kryptografie na eliptických křivkách je v současné době nejpoužívanější formou asymetrické kryptografie. Teoretická část této práce je rozdělena na dvě kapitoly. První kapitola vysvětluje vybraná témata z algebry a teorie čísel, na kterých je kryptografie na eliptických křivkách postavená. Konkrétně se jedná o grupy, konečná tělesa, eliptické křivky a matematické principy dvou známých a hojně používaných protokolů -- ECDH a ECDSA. Druhá kapitola se zabývá popisem nástrojů, které byly použity k implementaci uživatelsky přívětivé webové aplikace, umožňující simulaci jak základních operací na eliptické křivce, tak i dvou výše zmíněných protokolů. Stěžejními nástroji, představenými v této kapitole, jsou matematický systém SageMath a framework Spring, určený k tvorbě webových aplikací v jazyce Java. Třetí kapitola této práce popisuje jak byly představené nástroje použity, tedy samotnou implementaci webové aplikace.
Secure Communication in the Internet of Vehicles
Kolaja, David ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
Public roads can get dangerous if a police force is trying to stop a vehicle in which the driver is running away from hit-and-run situation. This fact increases the probability of causing more harm to the public. It is also why it should be made possible for police to safely and remotely stop the vehicle using modern technologies. This master thesis deals with possibilities of utilizing Internet of Vehicles (IoV) technologies, in which Cooperative Intelligent Transport Systems (C-ITS) play a big role. We can find description of C-ITS security architecture in the theoretical introduction. The task is to design a secure infrastructure and communication for applications which can remotely stop a vehicle. The security of such communication should be made using modern cryptography algorithms which ensure unauthorized access and usage of the application. Lastly, the security implementation is tested on an On-Board Unit on which the memory consumption and time delay is evaluated.
Asymmetric Cryptography on FPGA
Dobiáš, Patrik ; Smékal, David (referee) ; Malina, Lukáš (advisor)
This bachelor thesis deals with the analysis of existing hardware implementations of asymmetric cryptographic schemes on the FPGA platform and the then implementation of the cryptographic scheme Ed25519 on this platform. The resulting implementation is described in detail and compared with existing implementations. At the end of this work, the deployment of this implementation on the Virtex UltraScale+ FPGA is described.
Collection of Sensor Data into Cloud
Záhorský, Matej ; Musil, Petr (referee) ; Nosko, Svetozár (advisor)
Primárnym účelom tejto práce je zber dát z vybraných senzorov do vzdialeného Cloudu prostredníctvom platformy STM32MP1. V prvej časti práce je popísaná teória ohľadom možností zberu dát, ich kryptografického zabezpečenia a funkcie daného mikrokontroléra. V druhej časti je navrhnuté a implementované vhodné softvérové riešenie pre efektívne a bezpečné zbieranie dát z vybraných senzorov. Na koniec sú vyhodnotené vlastnosti riešenia, čo zahrňuje i rýchlosť kryptografického podpisovania v reálnej aplikácií.
Elliptic curves in cryptography
Geyer, Lukáš ; Burda, Karel (referee) ; Lambertová, Petra (advisor)
The objective of this bachelor thesis is to decribe the role of the elliptic curves in modern cryptosystems, explain the mathematical fundamentals upon which the elliptic curves are based along with their advantages and disadvantages, followed by application in the digital signature. The project is concluded by a software solution demonstrating the use of elliptic curves in digital signature scheme ECDSA
NSA Suite-B Cryptography algorithms
Rybka, Štěpán ; Malina, Lukáš (referee) ; Sobotka, Jiří (advisor)
This thesis entitled Algorithms Group SuiteB NSA Cryptography deals with algorithms, which are included in the set SuiteB. They serve to increase data protection and security during their transmission over an unsecured Internet environment. It also contains analysis of these algorithms, the encryption, decryption, creating hashes, key exchange, creating a signature and its verification. The algorithms are compared with others, already obsolete, or still used. The following are protocols using these algorithms. Output from the practical part is a web presentation that can serve as a teaching material.
Contactless microcomputer card as a hiding place for geocaching
Vertaľ, Damián ; Dzurenda, Petr (referee) ; Burda, Karel (advisor)
This master’s thesis focuses on the possibility of using contactless smart cards as an electronic hiding place in an activity known as Geocaching. The first part explains the theoretical knowledge about cards, smart card programming, the development of android applications for communication with the smart card using the NFC interface and usage of eliptic curves to sign digital messages. The second part is dedicated to the design of a Java card application and an Android application, which are able to communicate
Cryptocurrency
Šelinga, Martin ; Komosný, Dan (referee) ; Zeman, Václav (advisor)
In this bachelor thesis are analyzed elementary cryptographical techniques which are used among others also in cryptocurrencies. In second part is analysis and detail description of most used cryptocurrencies. In last part is description of simple web application which will demonstrate function of cryptocurrencies.
Post-quantum cryptography on constrained devices
Matula, Lukáš ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In recent years, there has been a lot of technological development, which among other things, brings the designs and implementation of quantum computing. Using Shor’s algorithm for quantum computing, it is highly likely that the mathematical problems, which underlie the cryptographic systems, will be computed in polynomial time. Therefore, it is necessary to pay attention to the development of post-quantum cryptography, which is able to secure systems against quantum attacks. This work includes the summary and the comparison of different types of post-quantum cryptography, followed by measuring and analysing its levels of difficulty in order to implement them into limited devices, such as smart cards. The measured values on the PC are used to determine the most suitable implementation on the circuit card and then the verification method itself is implemented on it.

National Repository of Grey Literature : 25 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.