National Repository of Grey Literature 12 records found  1 - 10next  jump to record: Search took 0.00 seconds. 
Elliptic curve based cryptosystems
Křivka, Petr ; Hajný, Jan (referee) ; Stančík, Peter (advisor)
In this bachelor thesis is examined problems elliptic curve cryptosystems. It is described mathematical underground, which use these systems. In more details is analyzed arithmetic finite fields. An important part of this work is the analysis of elliptical curves in cryptography. Among analyzed algorithms include e.g. ECDH or ECDSA. In conclusion is designed software solution, which helps in the study cryptosystems based elliptic curves. It allows basic operations over prime field.
Hyperelliptic curves and their application in cryptography
Perzynová, Kateřina ; Tomáš, Jiří (referee) ; Kureš, Miroslav (advisor)
Cílem této práce je zpracovat úvod do problematiky hypereliptických křivek s důrazem na konečná pole. T práci je dále popsán úvod do teorie divizorů na hypereliptických křivkách, jejich reprezentace, aritmetika nad divizory a jejich využití v kryptografii. Teorie je hojně demonstrována příklady a výpočty v systému Mathematica.
Two types of septic trinomials and their use in hyperelliptic cryptography
Felcmanová, Adéla ; Tomáš, Jiří (referee) ; Kureš, Miroslav (advisor)
This thesis deals with two types of septic trinomials and genus three hyperelliptic curves constructed from them. It includes an introduction to the theory of hyperelliptic curves and divisors, as well as terms and algorithms necessary for their implementation in hyperelliptic cryptosystems. The principle of the hyperelliptic curve cryptography is presented along with two examples of cryptosystems. It also contains several exercises, some of which were programmed in Python language.
Two types of septic trinomials and their use in hyperelliptic cryptography
Felcmanová, Adéla ; Tomáš, Jiří (referee) ; Kureš, Miroslav (advisor)
This thesis deals with two types of septic trinomials and genus three hyperelliptic curves constructed from them. It includes an introduction to the theory of hyperelliptic curves and divisors, as well as terms and algorithms necessary for their implementation in hyperelliptic cryptosystems. The principle of the hyperelliptic curve cryptography is presented along with two examples of cryptosystems. It also contains several exercises, some of which were programmed in Python language.
Combinatorial group theory and cryptography
Ferov, Michal ; Příhoda, Pavel (advisor) ; Růžička, Pavel (referee)
In the presented work we focus on applications of decision problems from combinatorial group theory. Namely we analyse the Shpilrain-Zapata pro- tocol. We give formal proof that small cancellation groups are good platform for the protocol because the word problem is solvable in linear time and they are generic. We also analyse the complexity of the brute force attack on the protocol and show that in a theoretical way the protocol is immune to attack by adversary with arbitrary computing power.
Cryptography based on semirings
Mach, Martin ; Korbelář, Miroslav (advisor) ; El Bashir, Robert (referee)
Cryptography based on semirings can be one of the possible approaches for the post-quantum cryptography in the public-key schemes. In our work, we are interested in only one concrete semiring - tropical algebra. We are examining one concrete scheme for the key-agreement protocol - tropical Stickel's protocol. Although there was introduced an attack on it, we have implemented this attack and more importantly, stated its complexity. Further, we propose other variants of Stickel's protocol and we are investigating their potential for practical usage. During the process, we came across the theory of tropical matrix powers, thus we want to make an overview of it due to the use in cryptography based on matrices over the tropical algebra semiring. 1
A study on ``A New Public-Key Cryptosystem via Mersenne Numbers''
Richter, Filip ; Göloglu, Faruk (advisor) ; El Bashir, Robert (referee)
In 2016 NIST announced a start of a process of development and standardiza- tion of a post-quantum public-key encryption scheme. Mersenne-756839 was one of the proposals. This proposal is described in this thesis, as well as the known attacks against it. The description and the theoretical background behind these attacks are presented in a rigorous way and are accessible to the reader without any previous knowledge about the post-quantum cryptography. New additional ideas for the implementation of the attacks are also presented. Finally, these attacks are implemented and attached to the thesis. 1
NTRU cryptosystem and its modifications
Poláková, Kristýna ; Příhoda, Pavel (advisor) ; Korbelář, Miroslav (referee)
The theses firstly introduces the basics of lattice problems. Then it focuses on various aspects of the cryptosystem NTRU which is based on the mentioned problems. The system is then compared with the most common encryption methods used nowadays. Its supposed quantum resistence is mentioned briefly. Subsequently the author tries to minimize the system's disadvantages by various cryptosystem modifications. Powered by TCPDF (www.tcpdf.org)
Diffie and Hellman are exchanging matrices over group rings
Linkeová, Romana ; Příhoda, Pavel (advisor) ; El Bashir, Robert (referee)
Title: Diffie and Hellman are exchanging matrices over group rings Author: Romana Linkeová Department: Department of Algebra Supervisor: Mgr. Pavel Příhoda, Ph.D., Department of Algebra Abstract: The Diffie-Hellman key exchange protocol is not suitable for devices with limited computational power while computing over group Z∗ p (where p is at least a 300-digit number). This fact led to the research of other algebraic structures, which may help in reducing the computational and storage cost of the protocol. D. Kahrobaei et al. posted in 2013 a proposal for working over a structure of small matrices and claimed that this modification will not affect the security of the protocol. We will attempt to attack this modification of the Diffie- Hellman protocol with the help of the theory of symmetric group representations. Firstly, we mention the basics of the theory of representations together with both the classical and the modified Diffie-Hellman protocol. Next, we elaborate the attack step by step and complement some of the steps with examples. Then, we probed security of the modified protocol against the baby-step giant-step attack. Keywords: public key cryptography, symmetric group representations, Diffie-Hellman protocol 1
Combinatorial group theory and cryptography
Ferov, Michal ; Příhoda, Pavel (advisor) ; Růžička, Pavel (referee)
In the presented work we focus on applications of decision problems from combinatorial group theory. Namely we analyse the Shpilrain-Zapata pro- tocol. We give formal proof that small cancellation groups are good platform for the protocol because the word problem is solvable in linear time and they are generic. We also analyse the complexity of the brute force attack on the protocol and show that in a theoretical way the protocol is immune to attack by adversary with arbitrary computing power.

National Repository of Grey Literature : 12 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.