National Repository of Grey Literature 7 records found  Search took 0.01 seconds. 
Implementation of Encryption Algorithms in VHDL Language
Kožený, Petr ; Martínek, Tomáš (referee) ; Kořenek, Jan (advisor)
This thesis deals with design and implementation of AES and DES encryption architectures for embedded systems. Architectures are implemented in VHDL language and design for FPGA technology. The proposed implementations are mapped on the Xilinx Spartan 3 technology. Both architectures are applied in simple ECB (Electronic Codebook) scheme with cache memories. A maximum throughput of design DES architecture 370 Mbps is achived with clock frequency of 104 MHz. The throughput of AES architecture at the maximum clock frequency of 118 MHz is 228 Mbps. Compared to software implementations for embedded systems, we achieve significantly higher throughput for both architectures.
Software support of education in cryptography based on integer factorization
Vychodil, Petr ; Martinásek, Zdeněk (referee) ; Burda, Karel (advisor)
This thesis deals with new teaching software, which supports asymmetric encryption algorithms based on the issue of large numbers´ factorization. A model program was created. It allows to carry out operations related to encryption and decryption with an interactive control. There is a simple way to understand the principle of the RSA encryption method with its help. The encryption of algorithms is generally analysed in chapters 1,2. Chapters 3 and 4 deals with RSA encryption algorithm in much more details, and it also describes the principles of the acquisition, management and usage of encryption keys. Chapters 5 suggest choosing of appropriate technologies for the creation of the final software product, which allow an appropriate way to present the characteristics of the extended RSA encryption algorithm. The final software product is the java applet. Aplet is described in the chaprers 6 and 7. It is divided into a theoretical and practical part. The theoretical part presents general information about the RSA encryption algorithm. The practical part allows the users of the program to have a try at tasks connected with the RSA algorthm in their own computers. The last part of Java applet deals with the users´ work results. The information obtained by the user in the various sections of the program are satisfactory enough to understand the principle of this algorithm´s operations.
Possibilities of post-quantum cryptography
Burda, Patrik ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
With rapidly evolving technologies and a potential threat of quantum computers that could break all of today’s secure communication, there is a need for ways to deal with this threat. This work deals with the analysis of cryptographic schemes resistant to today’s known quantum attacks such as Shore’s algorithm. The work also includes measurement and evaluation of speed and memory usage. Based on the measurement a suitable postquantum scheme is then implemented on smart card.
Quantum Cryptography And Laser Data Transfers
Litwora, Martin ; Maršík, Lukáš (referee) ; Zemčík, Pavel (advisor)
The purpose of this work was to explore and describe the possibilities of quantum key distribution. Describe individual protocols based on quantum mechanics, and different variants of quantum channels of wireless laser connections. At the same time, analyze individual encryption algorithms from the point of view of their security, energy consumption and encryption speed. Furthermore, part of the work included measuring the transfer properties of a real system for the quantum key distribution, including measuring the attenuation of a given connection using an attenuation cell. The goal then was to apply the measurement results to laser data transfers. Laser connections are affected by atmospheric conditions, especially cloud cover. For these purposes, a simulation tool was created that serves to simulate laser quantum channels in the atmosphere.
Possibilities of post-quantum cryptography
Burda, Patrik ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
With rapidly evolving technologies and a potential threat of quantum computers that could break all of today’s secure communication, there is a need for ways to deal with this threat. This work deals with the analysis of cryptographic schemes resistant to today’s known quantum attacks such as Shore’s algorithm. The work also includes measurement and evaluation of speed and memory usage. Based on the measurement a suitable postquantum scheme is then implemented on smart card.
Implementation of Encryption Algorithms in VHDL Language
Kožený, Petr ; Martínek, Tomáš (referee) ; Kořenek, Jan (advisor)
This thesis deals with design and implementation of AES and DES encryption architectures for embedded systems. Architectures are implemented in VHDL language and design for FPGA technology. The proposed implementations are mapped on the Xilinx Spartan 3 technology. Both architectures are applied in simple ECB (Electronic Codebook) scheme with cache memories. A maximum throughput of design DES architecture 370 Mbps is achived with clock frequency of 104 MHz. The throughput of AES architecture at the maximum clock frequency of 118 MHz is 228 Mbps. Compared to software implementations for embedded systems, we achieve significantly higher throughput for both architectures.
Software support of education in cryptography based on integer factorization
Vychodil, Petr ; Martinásek, Zdeněk (referee) ; Burda, Karel (advisor)
This thesis deals with new teaching software, which supports asymmetric encryption algorithms based on the issue of large numbers´ factorization. A model program was created. It allows to carry out operations related to encryption and decryption with an interactive control. There is a simple way to understand the principle of the RSA encryption method with its help. The encryption of algorithms is generally analysed in chapters 1,2. Chapters 3 and 4 deals with RSA encryption algorithm in much more details, and it also describes the principles of the acquisition, management and usage of encryption keys. Chapters 5 suggest choosing of appropriate technologies for the creation of the final software product, which allow an appropriate way to present the characteristics of the extended RSA encryption algorithm. The final software product is the java applet. Aplet is described in the chaprers 6 and 7. It is divided into a theoretical and practical part. The theoretical part presents general information about the RSA encryption algorithm. The practical part allows the users of the program to have a try at tasks connected with the RSA algorthm in their own computers. The last part of Java applet deals with the users´ work results. The information obtained by the user in the various sections of the program are satisfactory enough to understand the principle of this algorithm´s operations.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.