National Repository of Grey Literature 8 records found  Search took 0.01 seconds. 
Specialized Instruction Design
Koscielniak, Jan ; Zachariášová, Marcela (referee) ; Hruška, Tomáš (advisor)
The purpose of this thesis is to design and implement specialized instructions for RISC-V instruction set architecture. These instruction are used to accelerate a set of selected cryptographic algorithms. New instructions are implemented in Codasip Studio for 32bit processor model with RV32IM instruction set. Open source implementations were selected and edited to use new instructions. Instructions were used on respective algorithms, tested and profiled. The outcome of this thesis is instruction set extension, that enables up to seven times speed up, depending on used algorithm.
Encrypting Landlines Phone Communication
Vávra, Jakub ; Kumpošt, Marek (referee) ; Cvrček, Daniel (advisor)
This master's thesis is about making draft and implementing land-line phone call encryption using FITkit. The ultimate goal is to find suitable compression and encryption methods, implement or adapt them for FITkit board and create functional solution.
Implementation of cryptographic primitives
Jégrová, Eliška ; Fujdiak, Radek (referee) ; Ležák, Petr (advisor)
This semestral thesis is focused on cryptographic methods. Part of it deals with block ciphers, where are described algorithms of Blowfish and 3DES. It also deals with hash functions of which are analysed algorithms of SHA-3 and Tiger in detail.
Cryptography on an embedded platform
Korenčiak, Peter ; Hynčica, Ondřej (referee) ; Fiedler, Petr (advisor)
This bachelor thesis deals with adjusting parts of the public domain cryptographic library LibTomCrypt so that it can be used on an embedded platform Rabbit 3000. The hash functions MD5, SHA-1 and RIPEMD-128, the Blowfish cipher and CBC block cipher mode have been successfully ported to this platform. These algorithms have been analysed by measuring of the exectution time for the computational power requirements, especially with regard to the length of the input data. The abovementioned hash functions showed non-linear relationship between the execution time and the length of input, the graph of which is like that of a step function. The non-existence of the relationship to the data values was confirmed. The measurements with Blowfish cipher in CBC block cipher mode showed that inicialization of cipher is time consuming (it lasted almost one second on the hardware used) and that it does not depend on the keysize or length of input. The encryption and decryption itself showed a linear relationship to input data length. In the scope of this thesis there was also verification of correct function of SSL/TLS library from the producer of Rabbit microprocessor by creating a HTTPS server and verifying that secure connection with the web browser has been established. The library worked correctly according to manual without any significant problems.
Specialized Instruction Design
Koscielniak, Jan ; Zachariášová, Marcela (referee) ; Hruška, Tomáš (advisor)
The purpose of this thesis is to design and implement specialized instructions for RISC-V instruction set architecture. These instruction are used to accelerate a set of selected cryptographic algorithms. New instructions are implemented in Codasip Studio for 32bit processor model with RV32IM instruction set. Open source implementations were selected and edited to use new instructions. Instructions were used on respective algorithms, tested and profiled. The outcome of this thesis is instruction set extension, that enables up to seven times speed up, depending on used algorithm.
Implementation of cryptographic primitives
Jégrová, Eliška ; Fujdiak, Radek (referee) ; Ležák, Petr (advisor)
This semestral thesis is focused on cryptographic methods. Part of it deals with block ciphers, where are described algorithms of Blowfish and 3DES. It also deals with hash functions of which are analysed algorithms of SHA-3 and Tiger in detail.
Encrypting Landlines Phone Communication
Vávra, Jakub ; Kumpošt, Marek (referee) ; Cvrček, Daniel (advisor)
This master's thesis is about making draft and implementing land-line phone call encryption using FITkit. The ultimate goal is to find suitable compression and encryption methods, implement or adapt them for FITkit board and create functional solution.
Cryptography on an embedded platform
Korenčiak, Peter ; Hynčica, Ondřej (referee) ; Fiedler, Petr (advisor)
This bachelor thesis deals with adjusting parts of the public domain cryptographic library LibTomCrypt so that it can be used on an embedded platform Rabbit 3000. The hash functions MD5, SHA-1 and RIPEMD-128, the Blowfish cipher and CBC block cipher mode have been successfully ported to this platform. These algorithms have been analysed by measuring of the exectution time for the computational power requirements, especially with regard to the length of the input data. The abovementioned hash functions showed non-linear relationship between the execution time and the length of input, the graph of which is like that of a step function. The non-existence of the relationship to the data values was confirmed. The measurements with Blowfish cipher in CBC block cipher mode showed that inicialization of cipher is time consuming (it lasted almost one second on the hardware used) and that it does not depend on the keysize or length of input. The encryption and decryption itself showed a linear relationship to input data length. In the scope of this thesis there was also verification of correct function of SSL/TLS library from the producer of Rabbit microprocessor by creating a HTTPS server and verifying that secure connection with the web browser has been established. The library worked correctly according to manual without any significant problems.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.