National Repository of Grey Literature 16 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Portal for the support of cryptography instruction
Forman, Tomáš ; Doležel, Radek (referee) ; Zeman, Václav (advisor)
The main goal of this master's thesis is building of web portal for presentation basic cryptography algorithms. Those algorithms would be explained in the theoretical page in the first place. After that, they would be demonstrated by scripts. One part of this project is designing simplified theoretical element for basic impletion portal of information. Next part is creating web portal by one of the free available CMS´s systems. Programming language JAVA would be used as an instrument for creating demonstration scripts. For creating animations will be used the Flash animation tool. Target of formed web portal is creating community of expert public. It would make new articles, scripts and knowledge. This way, the portal would be kept current. The section which would include failure the most widely used algorithms and instructions how to eliminate it will be part of portal.
Comparison of Cryptographic Libraries in Linux Environment
Bartoš, Milan ; Malinka, Kamil (referee) ; Barabas, Maroš (advisor)
Bachelor's thesis deals with the comparison of the three cryptographic libraries used in the Linux environment. These are GnuTLS/nettle, NSS and OpenSSL. These are compared in terms of support for basic cryptographic functionality (symmetric and asymmetric ciphers, hash algorithms, SSL/TLS), working with hardware tokens and SSL/TLS. Libraries are also compared in terms of API design with a focus on stability and work with certificates and the possibility of more independent use of the library in a single process.
Secure communication in systems using restricted devices
Michálek, Tomáš ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
This thesis presents the usability and analysis of cryptographic methods on devices with low computing power and low memory capacity. The thesis describes different methods and shows examples of their usability in practice. According to certain parameters of security methods, such as code size and memory size it is selected and compared symetric ciphers and authentication codes. There are also described some security protocols and possible attacks. The next part includes a comparison of ciphers and chosen candidates are tested on our microcontroller. In the end there are propose, implemented and analyzed security protocols.
Analysis of Encipherement Methods for Disk Cloning
Chromečka, Jiří ; Černý, Martin (referee) ; Drahanský, Martin (advisor)
The presented text deals with designing of a multilingual application and its following implementation in the C++ language. The application encrypts disk volumes with Microsoft Windows system using symmetric cryptography and password authentication, where the password security strength is verified. Securing the sensitive data is one of the important security goals in area of information technology. The symmetric cryptography uses the same key for both the encryption and the decryption and due to its speed it is suitable for the data storage encryption. For the higher security it is possible to encrypt a whole disk volume with sensitive data.
Cryptographic methods of data security
Miloš, Jiří ; Koutný, Martin (referee) ; Lambertová, Petra (advisor)
Bachelor‘s thesis on theme Cryptographic methods of data security consists of three parts. In first part are itemized general theoretical principles, which employs in these sphere. There are also mentioned not only contemporaneous but historical cryptographic standards or algorithms. The second part of these bachelor‘s thesis refer to a possibility of breaking these standards. There are described most applied cryptoanalytics principes and their practical using, especially in the sphere of computer networks and their services. The final part contains a description of the development of simple computer application, which demonstrates the use cryptographic methods in the security packages in personal computer.
Secure Communications in Wireless Embedded Systems
Marek, Pavel ; Šimek, Milan (referee) ; Červenka, Vladimír (advisor)
This bachelor thesis deals with secure communication in wireless sensor networks. There are given and described options of encryption protocols that using symmetric and asymmetric ciphers. This protocols are evaluated from aspect of computational performance and energy comsumption. Pursuant this evaluations there is designed and implemented key distribution protocol for symmetric cipher. Encryption of communication s implemented by IEEE 802.15.4 standard. This implementation is performed on ARM Cortex-M3.
Access control system for carsharing application
Texl, Filip ; Ilgner, Petr (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis is devoted to access systems with an emphasis on carsharing applications, both from a theoretical point of view, where it analyzes their advantages and disadvantages and uses cryptographic primitives, and also from a practical point of view, where the practical part includes the design of an access system and its subsequent implementation. Bluetooth Low Energy technology and Near field communication are also used in the bachelor thesis, which is again described from a theoretical point of view, especially the key concepts of these technologies, as well as its practical use for access systems.
Security Proofs in Symmetric Cryptography
Švarcová, Marie ; Rudolf, Bohuslav (advisor) ; Hlaváč, Martin (referee)
In the present work we investigate into security proofs techniques in symmetric cryptography with aim at authenticated encryption schemes. The results of this area are in each chapter shown and proven. We begin with studying security notions of symmetric cryptography and relations among them. Then we analyze security of authenticated encryption schemes designed by generic composition and introduce keyed hash functions and the NMAC scheme. The last topic we study is an authenticated encryption with associated data. Finally, we describe presented proofs generally and unify the methods used.
Secure Communications in Wireless Embedded Systems
Marek, Pavel ; Šimek, Milan (referee) ; Červenka, Vladimír (advisor)
This bachelor thesis deals with secure communication in wireless sensor networks. There are given and described options of encryption protocols that using symmetric and asymmetric ciphers. This protocols are evaluated from aspect of computational performance and energy comsumption. Pursuant this evaluations there is designed and implemented key distribution protocol for symmetric cipher. Encryption of communication s implemented by IEEE 802.15.4 standard. This implementation is performed on ARM Cortex-M3.
Security Proofs in Symmetric Cryptography
Švarcová, Marie ; Hlaváč, Martin (referee) ; Rudolf, Bohuslav (advisor)
In the present work we investigate into security proofs techniques in symmetric cryptography with aim at authenticated encryption schemes. The results of this area are in each chapter shown and proven. We begin with studying security notions of symmetric cryptography and relations among them. Then we analyze security of authenticated encryption schemes designed by generic composition and introduce keyed hash functions and the NMAC scheme. The last topic we study is an authenticated encryption with associated data. Finally, we describe presented proofs generally and unify the methods used.

National Repository of Grey Literature : 16 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.