National Repository of Grey Literature 8 records found  Search took 0.00 seconds. 
Network Traffic Encryptor on Linux Platform
Havlín, Jan ; Sysel, Petr (referee) ; Hajný, Jan (advisor)
This bachelor thesis focuses on providing encrypted communication between two Linux operating system stations. It involves encryption using the AES-GCM-256 cipher, which uses a hybrid key derived from three separately generated keys. The methods for generating these keys are Quantum Key Distribution, CRYSTALS-Kyber and Elliptic Curve Diffie-Hellmann. Thus, we use functions of three types of cryptography - classical, quantum and post-quantum. The paper also deals with the extension of the functionality of the original cryptography to authenticate the communicating parties using certificates and deployment of the encryptor in practice.
Hybrid key-combiner for network traffic
Mogrovics, Alexander ; Dzurenda, Petr (referee) ; Ricci, Sara (advisor)
Klasická kryptografie se opírá převážně o celočíselnou faktorizaci (IF), která využívá RSA, a problém diskrétního logaritmu (DLP), na jehož principu funguje protokol Diffie- Hellman. Bezpečnost těchto problémů je ohrožena nástupem kvantových počítačů. Například Shorrův algoritmus je schopen řešit IF i DLP v polynomiálním čase. Cílem této práce je prostudovat schémata, která patří do klasické kryptografie a postkvantové kryptografie, aby bylo možné implementovat navrhovaný hybridní slučovač klíčů. Tento slučovač klíčů využívá klíče ze schémat QKD, Kyber a ECDH a interně používá SHA-3 a HMAC.
Post-quantum cryptography on constrained devices
Matula, Lukáš ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In recent years, there has been a lot of technological development, which among other things, brings the designs and implementation of quantum computing. Using Shor’s algorithm for quantum computing, it is highly likely that the mathematical problems, which underlie the cryptographic systems, will be computed in polynomial time. Therefore, it is necessary to pay attention to the development of post-quantum cryptography, which is able to secure systems against quantum attacks. This work includes the summary and the comparison of different types of post-quantum cryptography, followed by measuring and analysing its levels of difficulty in order to implement them into limited devices, such as smart cards. The measured values on the PC are used to determine the most suitable implementation on the circuit card and then the verification method itself is implemented on it.
Methods of post-quantum cryptography
Popelová, Lucie ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In the last decades there has been such a fundamental development in the technologies including postquantum technologies. In case that the Shor algorithm would be used on quantum computers it is likely to solve mathematical problems in real time which are major for our security. It is necessary to focus on postquantum cryptography, which is able to resist quantum attacks and secure our systems. This work analyses and compares different types of postquantum cryptography. Afterwards this work chooses postquantum protocols which are measured and analysed on the PC and IoT device. Furthemore data are used to find the most effective postquantum protocol for key exchange and signature scheme.
Linux encryptor of network traffic
Tůma, Petr ; Sysel, Petr (referee) ; Hajný, Jan (advisor)
This master’s thesis is focused on network traffic encryption on Linux platform. Goal of the thesis was to create an IPv4 network traffic encryptor. The chosen encryption method is encryption of the entire packet on the virtual interface. The encryptor uses methods from classical, quantum and post-quantum cryptography. Network traffic is encrypted with the AES-GCM-256 algorithm with a hybrid key established using QKD and CRYSTALS Kyber.
Post-quantum cryptography on constrained devices
Matula, Lukáš ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In recent years, there has been a lot of technological development, which among other things, brings the designs and implementation of quantum computing. Using Shor’s algorithm for quantum computing, it is highly likely that the mathematical problems, which underlie the cryptographic systems, will be computed in polynomial time. Therefore, it is necessary to pay attention to the development of post-quantum cryptography, which is able to secure systems against quantum attacks. This work includes the summary and the comparison of different types of post-quantum cryptography, followed by measuring and analysing its levels of difficulty in order to implement them into limited devices, such as smart cards. The measured values on the PC are used to determine the most suitable implementation on the circuit card and then the verification method itself is implemented on it.
Methods of post-quantum cryptography
Popelová, Lucie ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In the last decades there has been such a fundamental development in the technologies including postquantum technologies. In case that the Shor algorithm would be used on quantum computers it is likely to solve mathematical problems in real time which are major for our security. It is necessary to focus on postquantum cryptography, which is able to resist quantum attacks and secure our systems. This work analyses and compares different types of postquantum cryptography. Afterwards this work chooses postquantum protocols which are measured and analysed on the PC and IoT device. Furthemore data are used to find the most effective postquantum protocol for key exchange and signature scheme.
Cyber security from the perspective of business entities
Kameníček, Lukáš ; Buchalcevová, Alena (advisor) ; Čermák, Igor (referee)
This thesis deals with the issue of cyber security in enterprises. The main objective of this thesis is to compile a comprehensive overview of the issue of cyber security related to the Czech business entities. It is written in the context in Czech language and in less technical form. This thesis first identifies the current cyber threats, supported by examples of actual incidents. On the basis of the threats thesis defines the categories of business entities that are vulnerable to the threats, and with regard to the Czech legal system analyzes cybersecurity responsibilities. Above the legal obligations there are recommended measures and types of security tests that can check the level of cybersecurity. The output is also a methodological tool for better understanding of cyber security in companies which summarize acquired information and context in comprehensive tables. The expected contribution of this thesis is that summarized findings will serve to increase the level of IT security for Czech businesses.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.