National Repository of Grey Literature 2 records found  Search took 0.00 seconds. 
Authentication protocols on restricted devices
Šebesta, David ; Člupek, Vlastimil (referee) ; Malina, Lukáš (advisor)
This thesis deals with authentication methods, especially about authentication based on knowledge. In the thesis, the hash functions such as MD hash function, SHA hash function, Keccak, Blake, Grostl, Jh, Skein are described and shown their compilation on low frequency microcontrollers. Into the microcontroller MSP430F2274 are Keccak, Blake, Grostl, JH, md5, SHA–1, SHA–224, SHA–256 a Skein hashing algorithms implemented and measured. Also simple authentication protocols client–server are designed and their implementation and measuring was done. Protocols are focused on low memory requirement and the smallest number of measured messages during authentication. The first solution is determined for the beginning of the communication from client and the second from server.
Authentication protocols on restricted devices
Šebesta, David ; Člupek, Vlastimil (referee) ; Malina, Lukáš (advisor)
This thesis deals with authentication methods, especially about authentication based on knowledge. In the thesis, the hash functions such as MD hash function, SHA hash function, Keccak, Blake, Grostl, Jh, Skein are described and shown their compilation on low frequency microcontrollers. Into the microcontroller MSP430F2274 are Keccak, Blake, Grostl, JH, md5, SHA–1, SHA–224, SHA–256 a Skein hashing algorithms implemented and measured. Also simple authentication protocols client–server are designed and their implementation and measuring was done. Protocols are focused on low memory requirement and the smallest number of measured messages during authentication. The first solution is determined for the beginning of the communication from client and the second from server.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.