National Repository of Grey Literature 13 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Portal for the support of cryptography instruction
Forman, Tomáš ; Doležel, Radek (referee) ; Zeman, Václav (advisor)
The main goal of this master's thesis is building of web portal for presentation basic cryptography algorithms. Those algorithms would be explained in the theoretical page in the first place. After that, they would be demonstrated by scripts. One part of this project is designing simplified theoretical element for basic impletion portal of information. Next part is creating web portal by one of the free available CMS´s systems. Programming language JAVA would be used as an instrument for creating demonstration scripts. For creating animations will be used the Flash animation tool. Target of formed web portal is creating community of expert public. It would make new articles, scripts and knowledge. This way, the portal would be kept current. The section which would include failure the most widely used algorithms and instructions how to eliminate it will be part of portal.
Secure communication in systems using restricted devices
Michálek, Tomáš ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
This thesis presents the usability and analysis of cryptographic methods on devices with low computing power and low memory capacity. The thesis describes different methods and shows examples of their usability in practice. According to certain parameters of security methods, such as code size and memory size it is selected and compared symetric ciphers and authentication codes. There are also described some security protocols and possible attacks. The next part includes a comparison of ciphers and chosen candidates are tested on our microcontroller. In the end there are propose, implemented and analyzed security protocols.
Analysis of Encipherement Methods for Disk Cloning
Chromečka, Jiří ; Černý, Martin (referee) ; Drahanský, Martin (advisor)
The presented text deals with designing of a multilingual application and its following implementation in the C++ language. The application encrypts disk volumes with Microsoft Windows system using symmetric cryptography and password authentication, where the password security strength is verified. Securing the sensitive data is one of the important security goals in area of information technology. The symmetric cryptography uses the same key for both the encryption and the decryption and due to its speed it is suitable for the data storage encryption. For the higher security it is possible to encrypt a whole disk volume with sensitive data.
Cryptographic methods of data security
Miloš, Jiří ; Koutný, Martin (referee) ; Lambertová, Petra (advisor)
Bachelor‘s thesis on theme Cryptographic methods of data security consists of three parts. In first part are itemized general theoretical principles, which employs in these sphere. There are also mentioned not only contemporaneous but historical cryptographic standards or algorithms. The second part of these bachelor‘s thesis refer to a possibility of breaking these standards. There are described most applied cryptoanalytics principes and their practical using, especially in the sphere of computer networks and their services. The final part contains a description of the development of simple computer application, which demonstrates the use cryptographic methods in the security packages in personal computer.
Secure Communications in Wireless Embedded Systems
Marek, Pavel ; Šimek, Milan (referee) ; Červenka, Vladimír (advisor)
This bachelor thesis deals with secure communication in wireless sensor networks. There are given and described options of encryption protocols that using symmetric and asymmetric ciphers. This protocols are evaluated from aspect of computational performance and energy comsumption. Pursuant this evaluations there is designed and implemented key distribution protocol for symmetric cipher. Encryption of communication s implemented by IEEE 802.15.4 standard. This implementation is performed on ARM Cortex-M3.
Wireless Sensor Network
Nosko, Matúš ; Materna, Zdeněk (referee) ; Zemčík, Pavel (advisor)
The work was focused on creating a secure sensor network based on mesh topology, built on devices from Espressif. It also concentrates on code security and connecting this network to the cloud. The mesh network created is dynamic, regenerative, and self-organizing. The entire network is built on Wi-Fi, making it easy to connect to the internet, as the only condition for its operation is to have Wi-Fi at the installation site, eliminating the need for any special device to connect the network to the internet - it's gatewayless. Even if one node fails, the network self-organizes according to the newly created conditions and continues to function. The most modern security methods are used to secure the devices, such as secure boot and flash encryption. The MQTT protocol is used to connect the mesh network to the server. The MQTT broker, database, and API interface on the server side are dockerized. Thanks to these docker containers, it is easy to extend server parts. Also, values from devices are stored in a database and displayed on a website. The entire network solution was implemented in the ESP-IDF environment and tested on ESP32-S3 devices.
Security Proofs in Symmetric Cryptography
Švarcová, Marie ; Rudolf, Bohuslav (advisor) ; Hlaváč, Martin (referee)
In the present work we investigate into security proofs techniques in symmetric cryptography with aim at authenticated encryption schemes. The results of this area are in each chapter shown and proven. We begin with studying security notions of symmetric cryptography and relations among them. Then we analyze security of authenticated encryption schemes designed by generic composition and introduce keyed hash functions and the NMAC scheme. The last topic we study is an authenticated encryption with associated data. Finally, we describe presented proofs generally and unify the methods used.
Secure Communications in Wireless Embedded Systems
Marek, Pavel ; Šimek, Milan (referee) ; Červenka, Vladimír (advisor)
This bachelor thesis deals with secure communication in wireless sensor networks. There are given and described options of encryption protocols that using symmetric and asymmetric ciphers. This protocols are evaluated from aspect of computational performance and energy comsumption. Pursuant this evaluations there is designed and implemented key distribution protocol for symmetric cipher. Encryption of communication s implemented by IEEE 802.15.4 standard. This implementation is performed on ARM Cortex-M3.
Security Proofs in Symmetric Cryptography
Švarcová, Marie ; Hlaváč, Martin (referee) ; Rudolf, Bohuslav (advisor)
In the present work we investigate into security proofs techniques in symmetric cryptography with aim at authenticated encryption schemes. The results of this area are in each chapter shown and proven. We begin with studying security notions of symmetric cryptography and relations among them. Then we analyze security of authenticated encryption schemes designed by generic composition and introduce keyed hash functions and the NMAC scheme. The last topic we study is an authenticated encryption with associated data. Finally, we describe presented proofs generally and unify the methods used.
Analysis of Encipherement Methods for Disk Cloning
Chromečka, Jiří ; Černý, Martin (referee) ; Drahanský, Martin (advisor)
The presented text deals with designing of a multilingual application and its following implementation in the C++ language. The application encrypts disk volumes with Microsoft Windows system using symmetric cryptography and password authentication, where the password security strength is verified. Securing the sensitive data is one of the important security goals in area of information technology. The symmetric cryptography uses the same key for both the encryption and the decryption and due to its speed it is suitable for the data storage encryption. For the higher security it is possible to encrypt a whole disk volume with sensitive data.

National Repository of Grey Literature : 13 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.