National Repository of Grey Literature 79 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Specialized Instruction Design
Koscielniak, Jan ; Zachariášová, Marcela (referee) ; Hruška, Tomáš (advisor)
The purpose of this thesis is to design and implement specialized instructions for RISC-V instruction set architecture. These instruction are used to accelerate a set of selected cryptographic algorithms. New instructions are implemented in Codasip Studio for 32bit processor model with RV32IM instruction set. Open source implementations were selected and edited to use new instructions. Instructions were used on respective algorithms, tested and profiled. The outcome of this thesis is instruction set extension, that enables up to seven times speed up, depending on used algorithm.
Safe Communication App for Windows Phone
Vícha, Tomáš ; Veľas, Martin (referee) ; Herout, Adam (advisor)
The aim of this thesis is to describe the application development for secure communication between two users. The description begins with the analysis of already existing solutions, continues with the design of the user interface and the determination of requirements. There is also described a selection of suitable technologies and stages of application development together with its testing. The result of this work is an user-friendly application for the Windows Phone platform that performs end-to-end encryption of individual messages.
Secure data transmition using bar codes
Kratochvíl, Martin ; Herout, Adam (referee) ; Beran, Vítězslav (advisor)
The goal of this thesis was to create a system for visual data transmition using bar codes. It focuses mainly on the protection of the system against abuse. A mechanism was designed for the data transmition itself and the various security concepts. The most appropriate bar code for data transmition was selected on the basis of the analysis.
SMS Encryption for Mobile Communication
Lisoněk, David ; Bouška, Petr (referee) ; Drahanský, Martin (advisor)
This thesis deals with encryption of short text message (SMS) in mobile communication. Introduction is dedicated to overview of the parts of GSM radiotelephone nets and SMS messages transfer . Next chapter is reserved for description of cryptographic methods especially symetric and asymetric encryptografic aproaches. A design of a SMS messages encryption and decryption techniques is in next. For SMS encryption and sign, there is used the asymetric cypher RSA. Encryption use OAEP padding schema. The public key is saved in certificate. The Symbian OS has been choosen as a suitable platform for programming of mobile devices.
Online DNSSEC Records Validation
Bachtík, Martin ; Čejka, Rudolf (referee) ; Lampa, Petr (advisor)
Master's Thesis is studying an extension that secures the domain name system by introducing the verifiability of authenticity of data, known as DNSSEC. Productive output is proposal of application and its subsequent implementation that at each stage of browse the namespace to the selected domain name checks the appropriatenesses of this extension and in detail reports the trusted chain.
Modern Asymmetric Cryptosystems
Walek, Vladislav ; Sobotka, Jiří (referee) ; Malina, Lukáš (advisor)
Asymmetric cryptography uses two keys for encryption public key and for decryption private key. The asymmetric cryptosystems include RSA, ElGamal, Elliptic Curves and others. Generally, asymmetric cryptography is mainly used for secure short messages and transmission encryption key for symmetric cryptography. The thesis deals with these systems and implements selected systems (RSA, ElGamal, McEliece, elliptic curves and NTRU) into the application. The application can test the features of chosen cryptosystems. These systems and their performance are compared and evaluated with the measured values. These results can predict the future usage of these systems in modern informatics systems.
Facebook Social Network Datamining and Reconstruction of Captured Communication
Bruckner, Tomáš ; Kmeť, Martin (referee) ; Pluskal, Jan (advisor)
This thesis deals with social network Facebook from perspective of computer forensic science with focus on obtaining sensitive information about tracked users. Its main goal is implementation of the tools for reconstruction of captured communication and Facebook data mining. Core of this application has been implemented in framework for processing of captured communication Netfox.Framework, which is being developed by Faculty of Information Technology, Brno University of Technology. Man-in-the-Middle attack has been used for capturing of decipherable communication. Selenium WebDriver has been used as a tool for data mining. Developed solution is able to reconstruct Facebook conversations between users, addition of new statuses and comments, and interception of sent files. Data mining module is able to obtain public information about tracked users, especially places they recently visited, past and upcoming events, public user details, albums and photos, friendlists and mutual friends with other users. As part of the bachelor thesis, data analysis, implementation of the application, validity testing and benchmark analysis have been performed.
Instant Messenging System
Fiedor, Jan ; Kašpárek, Tomáš (referee) ; Ráb, Jaroslav (advisor)
Nowadays many instant messenging clients exist. However, it is true, that many of them do not solve the security issues connected with communication, often deal with file transfer problems and are linked with specific protocol. This thesis is trying to find out the best solution of those problems and use it to develop secure and reliable client independent of concrete protocol.
Hardware accelerated data transfer using TLS protocol
Zugárek, Adam ; Pokorný, Jiří (referee) ; Smékal, David (advisor)
This paper describes implementation of the whole cryptographic protocol TLS including control logic and used cryptographic systems. The goal is to implement an application in the FPGA technology, so it could be used in hardware accelerated network card. The reason for this is new supported higher transmission speeds that Ethernet is able to operate on, and the absence of implementation of this protocol on FPGA. In the first half of this paper is described theory of cryptography followed by description of TLS protocol, its development, structure and operating workflow. The second half describes the implementation on the chosen technology that is also described here. It is used already existing solutions of given cryptographic systems for the implementation, or at least their parts that are modified if needed for TLS. It was implemented just several parts of whole protocol, such are RSA, Diffie-Hellman, SHA and part of AES. Based on these implementations and continuing studying in this matter it was made conclusion, that FPGA technology is inappropriate for implementation of TLS protocol and its control logic. Recommendation was also made to use FPGA only for making calculations of given cryptographic systems that are controlled by control logic from software implemented on standard processors.
ECG and PPG derived respiration estimation
Chmela, Radek ; Smital, Lukáš (referee) ; Králík, Martin (advisor)
This work deals with the estimation of the respiratory curve from ECG and PPG signals. The first part deals with the description and monitoring of electrical activity of the heart, physiology and methodology of respiratory sensing and photoplethysmography. The second part deals with methods of extracting respiratory cycle information from ECG and PPG recordings. The third part deals with the algorithmic implementation and evaluation of individual procedures for estimating the breath curve from both of the above-mentioned signals on records from the web PhysioNet. In the last part, the algorithms are compared and evaluated.

National Repository of Grey Literature : 79 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.