National Repository of Grey Literature 6 records found  Search took 0.00 seconds. 
Encoding algorithms of soft cryptography
Havlíček, Jiří ; Burda, Karel (referee) ; Člupek, Vlastimil (advisor)
This bachelor's thesis deals with so called lightweight crptography which is specified for low-efficiency hardware. The first part of my thesis explains basic terms and principles of cryptography, difference between symmetrical and asymmetrical encryption including description of the most widespread examples of both of these cryptography's branches. The thesis continues with the description and parametric comparison of newly developed algorithms focusing on lightweight cryptography. I specially pay attention to current and block ciphers and hash functions. Afterwards the thesis describes limited computing power hardware. This is about device which is limited from the point of view of power supply and size of chips. The description is focused on smart cards, RFD chips and microcontrollers. The practical part deals with testing of current ciphers which are designed for software implementations and with testing of current ciphers designed for lightweight cryptography. Results of the tests provide comprehensive view of differences of output of individual ciphers specified for different implementations.
Software library of basic symmetric and asymmetric primitives of modern cryptography on embedded platforms
Miška, Matěj ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
This master thesis deals with a search of cryptographic primitives for embedded systems, which are tested on Raspberry Pi platforms and the results compared in the subsequent practical part. The content of the research is an explanation of the use of cryptography in information systems, an example of a protocol using cryptography in the energy sector, the selection of cryptographic primitives based on recommendations from security institutions, a description of Raspberry Pi embedded platforms and an introduction of cryptographic libraries providing tools to perform cryptographic operations. The theoretical part of the thesis results in an overview of the information needed to create a test tool. The subsequent practical part deals with the theoretical design of the required tool, the determination of the functions that the tool must have and the way of performing the testing. This is followed by a description of the choice of the programming language and development environment suitable for this work, together with a description of the internal structure of the developed application. The testing parameters are mainly the computational, memory and time requirements of the cryptographic primitives on the system. The paper concludes with methods of running and controlling the application, possible presentation of the measured results, the actual results of testing the selected embedded platforms and a discussion of these results.
Software library of basic symmetric and asymmetric primitives of modern cryptography on embedded platforms
Miška, Matěj ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
This master thesis deals with a search of cryptographic primitives for embedded systems, which are tested on Raspberry Pi platforms and the results compared in the subsequent practical part. The content of the research is an explanation of the use of cryptography in information systems, an example of a protocol using cryptography in the energy sector, the selection of cryptographic primitives based on recommendations from security institutions, a description of Raspberry Pi embedded platforms and an introduction of cryptographic libraries providing tools to perform cryptographic operations. The theoretical part of the thesis results in an overview of the information needed to create a test tool. The subsequent practical part deals with the theoretical design of the required tool, the determination of the functions that the tool must have and the way of performing the testing. This is followed by a description of the choice of the programming language and development environment suitable for this work, together with a description of the internal structure of the developed application. The testing parameters are mainly the computational, memory and time requirements of the cryptographic primitives on the system. The paper concludes with methods of running and controlling the application, possible presentation of the measured results, the actual results of testing the selected embedded platforms and a discussion of these results.
Lightweight Cryptography
Šalda, Jakub ; Palovský, Radomír (advisor) ; Ivánek, Jiří (referee)
In the bachelor thesis Lightweight cryptography I describe the basics of light cryptography, analyze and compare selected lightweight symmetric ciphers. Lightweight is about trade-off between low-cost, security and performace. There are many lightweight ciphers designes, therefore I chose nad explored some of those from the point of view of their features, hardware implementation, performance and security. Analyzed ciphers are in total of fifteen and include E0, A5/1, GRAIN, Trivium, LED, SKINNY, RECTANGLE, SPARX, mCrypton, PRESENT, SIMON and SPECK, XTEA, SEA, LBlock and CLEFIA. I have come to the conclusion that the stream cipher GRAIN is very fast and safe. Block ciphers LED and SKINNY are well secured and SIMON and PRESENT hardware-efficient. With the increased use of constrained devices, it is also necessary to keep up with security, so lightweight cryptography could have a great future ahead.
Cube Attacks
Bárta, Josef ; Hojsík, Michal (advisor) ; Příhoda, Pavel (referee)
Based on the Cube Attack by Itai Dinur and Adi Shamir and another, in the essence simi- lar, method we devised a new polynomial linearisation technique, which proved to be more powerful, than the Cube Attack alone. Moreover, we present detailed description with formal proof not only of our findings, but also of the Cube Attack. Finally, we demonstrate the results of our efforts on a Trivium variant that is reduced in key and initialisation vector bit count. We managed to linearise polynomials representing a keystream bit output after up to 621 initialisation rounds using purely techniques described in this thesis, compared to 581 initialisation rounds with original attack.
Encoding algorithms of soft cryptography
Havlíček, Jiří ; Burda, Karel (referee) ; Člupek, Vlastimil (advisor)
This bachelor's thesis deals with so called lightweight crptography which is specified for low-efficiency hardware. The first part of my thesis explains basic terms and principles of cryptography, difference between symmetrical and asymmetrical encryption including description of the most widespread examples of both of these cryptography's branches. The thesis continues with the description and parametric comparison of newly developed algorithms focusing on lightweight cryptography. I specially pay attention to current and block ciphers and hash functions. Afterwards the thesis describes limited computing power hardware. This is about device which is limited from the point of view of power supply and size of chips. The description is focused on smart cards, RFD chips and microcontrollers. The practical part deals with testing of current ciphers which are designed for software implementations and with testing of current ciphers designed for lightweight cryptography. Results of the tests provide comprehensive view of differences of output of individual ciphers specified for different implementations.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.