National Repository of Grey Literature 339 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Linux encryptor for network traffic
Suchý, Daniel ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This bachelor's thesis deals with the possibilities of encrypting network traffic on the Linux platform. The goal is to create a virtual machine that can encrypt incoming traffic and send it to it‘s destination. Encryption of network traffic was implemented using the ip-xfrm framework in the form of encryption of the packet’s payload. The encryption algorithm chosen was AES-256 with a key generated and established using QKD. For the possibility of expanding the functionality of the encryptor for multiple clients, a VPN server was implemented on the encryptor.
Cryptographic coprocessors for IoT microcontrollers communication protection
Český, Michal ; Zeman, Václav (referee) ; Slavíček, Karel (advisor)
This bachelor thesis outlines the issue of how communication can be secured within the IoT. The microcontroller itself can also be used for this purpose, however, security will never be assured as it will be when using a hardware cryptographic co-processor. To generate the keys and certificate, the ATECC608B coprocessor is chosen which holds the necessary "secrets" used to secure the communication. As a demonstration of the cryptographic coprocessor functionality, the ESP32 microcontroller is connected to the AWS server where all the connections to the server are established using the cryptographic coprocessor.
Demonstration of Cryptographic Problems through an Interactive Educational Game
Fišarová, Anežka ; Mezina, Anzhelika (referee) ; Mikulec, Marek (advisor)
The bachelor thesis is focused on the design and implementation of a cryptographic interactive educational game. It focuses on various cryptographic ciphers specifically selected so that people outside the field can be introduced to the subject in a demonstrative and entertaining way. Java and JavaFX were used as the programming language. The thesis consists of four parts, the first two are oriented towards the theoretical part of cryptography and the second two are more focused on the practical application and code development. As motivation for the players, a score for correctly cracked ciphers was used. Furthermore, the work includes a choice of difficulty, which influences which ciphers will be presented to the players. At the end of the thesis, the author reflects on the results and explores ways to further improve the methods presented.
Software support of education in cryptography area based on elliptic curves
Szturc, Jakub ; Sobotka, Jiří (referee) ; Burda, Karel (advisor)
The master‘s thesis is focusing on cryptography based on elliptical curves consists of four main parts. The first part provides an overview of the basic cryptographic and mathematical concepts. A key element of this work is the second part which are described in detail the mechanisms of counting two points on elliptic curve and counting point to themselves over the various fields. On this mechanism is based almost the entire issue. In the third section provides the best-known algorithms and protocols for key exchange, encryption and digital signature. The goal of this paper is to devise software to support teaching. This material is created as a web presentation, which described the theoretical foundations and the main characteristics of cryptosystems based on elliptical curves. The whole issue is supported by practical examples of calculations examples, there are also examples for independent work. Additionally, java applets are prepared that allow an interactive opportunity to try the basic parameters of curves, or verify the calculations.
Electronic Registry for Local Authority
Stránský, Karel ; Burget, Radek (referee) ; Rychlý, Marek (advisor)
Bachelor thesis "Electronic registry for local authority" is focused on usage of electronic registries for electronic communication between citizens and public authority. The first part describes the legislative page incidental with e-registries, principles of their functionality, and important requierements which are set on e-registiries. Furthermore elementary electronic signature's informations are included, along with creation and verification, and informations about certificates and certification authorities. The usage of digital signature at communication with electronic registry is also described. The second part is used to present particular concept of implemented sample electronic registry's system, and the solution of picked problems.
Modeling and Simulation of Incentive Mechanisms in Ethereum
Burianová, Tereza ; Fiedor, Jan (referee) ; Perešíni, Martin (advisor)
Tématem této bakalářské práce je poplatkový mechanismus v síti Ethereum, zejména změny představeny v EIP-1559. Cílem práce je zkoumat chování mechanismu a navrhnout případná možná vylepšení v případě nalezených nedostatků. Dříve používaný aukční systém vyžadoval libovolné nastavení výše poplatku uživatelem, což vedlo k přeplatkům a vysoké volatilitě výše poplatků. Tyto problémy nastaly převážně kvůli vyššímu vytížení sítě po popularizaci projektů jako například decentralizované finance, NFT kolekce a metaverse. Nový poplatkový mechanismus zavedl proměnlivou velikost bloku, která se dokáže přizpůsobit aktuálnímu vytížení sítě. Base fee, hodnota značící minimální výši poplatku potřebnou pro zahrnutí do bloku, je pak vypočítána na základě zaplněnosti předchozího bloku, což dělá poplatky více předvídatelnými. Bylo navrženo několik simulačních experimentů, které zkoumají typické chování a možné slabiny mechanismu. Nakonec bylo nalezeno možné vylepšení a byl navržen další výzkum. Cíle práce byly splněny a výsledky byly prezentovány.
Secure data transmition using bar codes
Kratochvíl, Martin ; Herout, Adam (referee) ; Beran, Vítězslav (advisor)
The goal of this thesis was to create a system for visual data transmition using bar codes. It focuses mainly on the protection of the system against abuse. A mechanism was designed for the data transmition itself and the various security concepts. The most appropriate bar code for data transmition was selected on the basis of the analysis.
Use of Heuristics for Password Recovery with GPU Acceleration
Gazdík, Peter ; Holkovič, Martin (referee) ; Hranický, Radek (advisor)
This thesis discusses various techniques to enhance the password recovery process with GPU acceleration. The first part introduces a Markov model and simple regular expressions. These techniques dramatically reduce the password space to be searched. This is based on observations of users and their use of letters in passwords. We propose the design of a parallel algorithm that combines both techniques. Last part of the thesis contains the results of experiments to prove benefits of Markov model.
Simulation of cryptographic algorithms using FPGA
Németh, František ; Mašek, Jan (referee) ; Smékal, David (advisor)
Bachelor thesis is dealing with a cipher standard AES and with a design of encryption and decryption components for AES in special modes of operation. Programming language is VHDL. In theoretical part of thesis is a further descriptions of AES and behaviour of block cipher operation modes. Furthermore the brief description of VHDL, FPGA and NetCOPE framework is a piece of theoretical part as well. The practical part contains designs which are made in developing environment Vivado from Xilinx. Programmed modes of operation are ECB, CBC, CTR and CFB. Simulation outputs and synthesis results are summerized in tables.
Decentralized communication tool with anonymity guarantee
Legéň, Michal ; Burget, Radim (referee) ; Malý, Jan (advisor)
Anonymity on the internet is becoming a actuall issue nowadays. There are several tools, that can be used to monitor user's activity and it can lead to lose privacy of users. The aim of this master's thesis is to describe different ways of working anonymous systems, especially the method called Onion Routing. The introduction of this work is devoted to the description of this method together with asymmetric cryptosystem RSA. The second part belongs to basics of socket programming and to the implementation of anonymous system in programming language C++. The final part is focussed on analysis of system in terms of security and time complexity. The conditions of anonymity and decentralization are accomplished. There is no presence of central server in the system and the management is handled by signalling messages.

National Repository of Grey Literature : 339 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.