National Repository of Grey Literature 13 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Web application on elliptic curve cryptography
Štark, Daniel ; Dzurenda, Petr (referee) ; Ricci, Sara (advisor)
Kryptografie na eliptických křivkách je v současné době nejpoužívanější formou asymetrické kryptografie. Teoretická část této práce je rozdělena na dvě kapitoly. První kapitola vysvětluje vybraná témata z algebry a teorie čísel, na kterých je kryptografie na eliptických křivkách postavená. Konkrétně se jedná o grupy, konečná tělesa, eliptické křivky a matematické principy dvou známých a hojně používaných protokolů -- ECDH a ECDSA. Druhá kapitola se zabývá popisem nástrojů, které byly použity k implementaci uživatelsky přívětivé webové aplikace, umožňující simulaci jak základních operací na eliptické křivce, tak i dvou výše zmíněných protokolů. Stěžejními nástroji, představenými v této kapitole, jsou matematický systém SageMath a framework Spring, určený k tvorbě webových aplikací v jazyce Java. Třetí kapitola této práce popisuje jak byly představené nástroje použity, tedy samotnou implementaci webové aplikace.
Elliptic curve based cryptosystems
Křivka, Petr ; Hajný, Jan (referee) ; Stančík, Peter (advisor)
In this bachelor thesis is examined problems elliptic curve cryptosystems. It is described mathematical underground, which use these systems. In more details is analyzed arithmetic finite fields. An important part of this work is the analysis of elliptical curves in cryptography. Among analyzed algorithms include e.g. ECDH or ECDSA. In conclusion is designed software solution, which helps in the study cryptosystems based elliptic curves. It allows basic operations over prime field.
Secure Communication in Embedded Systems
Rácek, Luboš ; Mlýnek, Petr (referee) ; Červenka, Vladimír (advisor)
Bachelor’s thesis focuses on a design and analysis of protocol to provide secure communication using a hardware accelerator. The protocol will be designed with low power consumption and small computing power of a microcontroller. Asymetric cryptography will be taken into account in the design.
Efficient Digital Signature Schemes
Varga, Ondrej ; Sobotka, Jiří (referee) ; Malina, Lukáš (advisor)
Digital signatures, which take the properties of classical signatures, are used to secure the actual content of documents, which can be modified during transmission over an insecure channel. The problems of security and protection of communicating participants are solved by cryptographic techniques. Identity verification, message integrity, credibility, the ownership of documents, and the secure transmission of information over an unsecured channel, are all dealt with in secure communications - Public Key Infrastructure, which uses digital signatures. Nowadays digital signatures are often used to secure data in communication over an unsecured channel. The aim of the following master’s thesis is to familiarize readers with the necessary technological aspects of digital signatures, as well as their advantages and disadvantages. By the time digital signatures are being used they will have to be improved and modified to be secure against more sophisticated attacks. In this paper, proposals of new efficient digital signature schemes and their comparison with current ones are described. Also are examined their implications for computationally weak devices, or deployment in low speed channel transmission systems. After an explanation of cryptography and a description of its basic subjects, digital signatures are introduced. The first chapter describes the possible formatting and architecture of the digital signature. The second part of this master’s thesis is about current digital signature schemes and their properties. Chapter 3 describes some proposals of new efficient digital signature schemes and their comparison to those currently in use. In the practical part, the implementations (in the environment .NET in C#) of two effective digital signature schemes as part of a client-server application are presented and described (Chapter 4). In the last chapter the comparison and analysis of the implemented signature schemes are provided.
Cryptographic protocols for privacy protection
Hanzlíček, Martin ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
This work focuses on cryptographic protocol with privacy protection. The work solves the question of the elliptic curves and use in cryptography in conjunction with authentication protocols. The outputs of the work are two applications. The first application serves as a user and will replace the ID card. The second application is authentication and serves as a user authentication terminal. Both applications are designed for the Android operating system. Applications are used to select user attributes, confirm registration, user verification and show the result of verification.
Secure Communications in Wireless Embedded Systems
Marek, Pavel ; Šimek, Milan (referee) ; Červenka, Vladimír (advisor)
This bachelor thesis deals with secure communication in wireless sensor networks. There are given and described options of encryption protocols that using symmetric and asymmetric ciphers. This protocols are evaluated from aspect of computational performance and energy comsumption. Pursuant this evaluations there is designed and implemented key distribution protocol for symmetric cipher. Encryption of communication s implemented by IEEE 802.15.4 standard. This implementation is performed on ARM Cortex-M3.
Web application on elliptic curve cryptography
Štark, Daniel ; Dzurenda, Petr (referee) ; Ricci, Sara (advisor)
Kryptografie na eliptických křivkách je v současné době nejpoužívanější formou asymetrické kryptografie. Teoretická část této práce je rozdělena na dvě kapitoly. První kapitola vysvětluje vybraná témata z algebry a teorie čísel, na kterých je kryptografie na eliptických křivkách postavená. Konkrétně se jedná o grupy, konečná tělesa, eliptické křivky a matematické principy dvou známých a hojně používaných protokolů -- ECDH a ECDSA. Druhá kapitola se zabývá popisem nástrojů, které byly použity k implementaci uživatelsky přívětivé webové aplikace, umožňující simulaci jak základních operací na eliptické křivce, tak i dvou výše zmíněných protokolů. Stěžejními nástroji, představenými v této kapitole, jsou matematický systém SageMath a framework Spring, určený k tvorbě webových aplikací v jazyce Java. Třetí kapitola této práce popisuje jak byly představené nástroje použity, tedy samotnou implementaci webové aplikace.
Secure Bootloader For Arm Microcontrollers
Prítel, Pavol
Embedded systems are single purpose devices, where software updates are often omitted or very limited in comparison with personal computer systems. Such systems are typically using microcontrollers with limited memory and computing power. Enabling software updates on an embedded system brings some security issues that need to be taken into account. As soon as there is a possibility of software update, the device is exposed to risk of malicious or not original applications being executed on the device. In this paper a reference implementation of bootloader with security features is described. As a result of using asymmetric cryptography, the memory footprint and startup time is increased significantly. The contribution of this work is in finding the right algorithm that will offer trade-off between level of security and used resources of targeted microcontroller.
Cryptographic protocols for privacy protection
Hanzlíček, Martin ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
This work focuses on cryptographic protocol with privacy protection. The work solves the question of the elliptic curves and use in cryptography in conjunction with authentication protocols. The outputs of the work are two applications. The first application serves as a user and will replace the ID card. The second application is authentication and serves as a user authentication terminal. Both applications are designed for the Android operating system. Applications are used to select user attributes, confirm registration, user verification and show the result of verification.
Secure Communications in Wireless Embedded Systems
Marek, Pavel ; Šimek, Milan (referee) ; Červenka, Vladimír (advisor)
This bachelor thesis deals with secure communication in wireless sensor networks. There are given and described options of encryption protocols that using symmetric and asymmetric ciphers. This protocols are evaluated from aspect of computational performance and energy comsumption. Pursuant this evaluations there is designed and implemented key distribution protocol for symmetric cipher. Encryption of communication s implemented by IEEE 802.15.4 standard. This implementation is performed on ARM Cortex-M3.

National Repository of Grey Literature : 13 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.