National Repository of Grey Literature 2 records found  Search took 0.01 seconds. 
Electronic ID security
Šánek, Jaromír ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This work is dedicated the security of Electronic identity card and the platform of Multos smart card. In the first part are descripted symmetric and asymmetric cryptographic algorithms which are used in the area of eID. The second part is engaged the solution of electronic identity cards in Belgium, Estonia and Germany and Czech Republic. In this part are specified the eID, chips and digital certificates and applications. The part contains standard CEN TS 15480 European Citizen Card and access control mechanisms BAC, EAC and EAC v2. Next section is dedicated to describing the specification of passports with a chip and security of data stored on the chip. Last section is dedicated the practical part. In this part is described smart card Multos and development of applications for this smart card. Created application demonstrates the basic cryptographic functions. Between implemented functions are functions for generating random number, hash algorithm SHA-1, modular exponentiation and modular multiplication.
Electronic ID security
Šánek, Jaromír ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This work is dedicated the security of Electronic identity card and the platform of Multos smart card. In the first part are descripted symmetric and asymmetric cryptographic algorithms which are used in the area of eID. The second part is engaged the solution of electronic identity cards in Belgium, Estonia and Germany and Czech Republic. In this part are specified the eID, chips and digital certificates and applications. The part contains standard CEN TS 15480 European Citizen Card and access control mechanisms BAC, EAC and EAC v2. Next section is dedicated to describing the specification of passports with a chip and security of data stored on the chip. Last section is dedicated the practical part. In this part is described smart card Multos and development of applications for this smart card. Created application demonstrates the basic cryptographic functions. Between implemented functions are functions for generating random number, hash algorithm SHA-1, modular exponentiation and modular multiplication.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.