National Repository of Grey Literature 12 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Platform Independent Storge of Sensitive Data
Klemens, Jakub ; Herout, Adam (referee) ; Španěl, Michal (advisor)
This thesis addresses the issues when securing sensitive data for Windows, iOS and MacOS, with the target being to create the ideal key-value data storage library. A C++ library has been designed and implemented based on a given facts. The library offers a simple application programming interface for storing data and structuring them into modules. A base functionality is verified by set of unit tests.
Instant Messenging System
Fiedor, Jan ; Kašpárek, Tomáš (referee) ; Ráb, Jaroslav (advisor)
Nowadays many instant messenging clients exist. However, it is true, that many of them do not solve the security issues connected with communication, often deal with file transfer problems and are linked with specific protocol. This thesis is trying to find out the best solution of those problems and use it to develop secure and reliable client independent of concrete protocol.
Authentication in Smart Grids
Janáč, Richard ; Šťastný, Ladislav (referee) ; Franek, Lešek (advisor)
This thesis is dealing with the possibilities of authentication of service engineers for Smart Grid network devices. The aim was to select the most appropriate type of authentication security token. Therefore, we examined the main principals of cryptography and described the algorithms used in the security token. At the end of the paper, the main three types of security tokens are compared. Further, the paper evaluates their use in equipment for the implementation of Smart Grid networks and token selection for subsequent processing demonstration applications.
Software library of basic symmetric and asymmetric primitives of modern cryptography on embedded platforms
Miška, Matěj ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
This master thesis deals with a search of cryptographic primitives for embedded systems, which are tested on Raspberry Pi platforms and the results compared in the subsequent practical part. The content of the research is an explanation of the use of cryptography in information systems, an example of a protocol using cryptography in the energy sector, the selection of cryptographic primitives based on recommendations from security institutions, a description of Raspberry Pi embedded platforms and an introduction of cryptographic libraries providing tools to perform cryptographic operations. The theoretical part of the thesis results in an overview of the information needed to create a test tool. The subsequent practical part deals with the theoretical design of the required tool, the determination of the functions that the tool must have and the way of performing the testing. This is followed by a description of the choice of the programming language and development environment suitable for this work, together with a description of the internal structure of the developed application. The testing parameters are mainly the computational, memory and time requirements of the cryptographic primitives on the system. The paper concludes with methods of running and controlling the application, possible presentation of the measured results, the actual results of testing the selected embedded platforms and a discussion of these results.
Analysis of Encipherement Methods for Disk Cloning
Chromečka, Jiří ; Černý, Martin (referee) ; Drahanský, Martin (advisor)
The presented text deals with designing of a multilingual application and its following implementation in the C++ language. The application encrypts disk volumes with Microsoft Windows system using symmetric cryptography and password authentication, where the password security strength is verified. Securing the sensitive data is one of the important security goals in area of information technology. The symmetric cryptography uses the same key for both the encryption and the decryption and due to its speed it is suitable for the data storage encryption. For the higher security it is possible to encrypt a whole disk volume with sensitive data.
Comparison of cryptographic primitives used in elliptic curve cryptograpny on different hardware platforms
Brychta, Josef ; Martinásek, Zdeněk (referee) ; Fujdiak, Radek (advisor)
This master thesis deals with the implementation of variants of cryptographic libraries containing primitives for elliptic curves. By creating custom metering charts to compare each implementation. The main task was not only the implementation of libraries but also the design and implementation of test scenarios together with the creation of measurement methods for different libraries and hardware platforms. As a result, a number of experimental tests were conducted on different curves and their parameters so that the results of the work included complex problems of elliptic curves in cryptography. The main parameters were power, time and memory consumption.
Software library of basic symmetric and asymmetric primitives of modern cryptography on embedded platforms
Miška, Matěj ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
This master thesis deals with a search of cryptographic primitives for embedded systems, which are tested on Raspberry Pi platforms and the results compared in the subsequent practical part. The content of the research is an explanation of the use of cryptography in information systems, an example of a protocol using cryptography in the energy sector, the selection of cryptographic primitives based on recommendations from security institutions, a description of Raspberry Pi embedded platforms and an introduction of cryptographic libraries providing tools to perform cryptographic operations. The theoretical part of the thesis results in an overview of the information needed to create a test tool. The subsequent practical part deals with the theoretical design of the required tool, the determination of the functions that the tool must have and the way of performing the testing. This is followed by a description of the choice of the programming language and development environment suitable for this work, together with a description of the internal structure of the developed application. The testing parameters are mainly the computational, memory and time requirements of the cryptographic primitives on the system. The paper concludes with methods of running and controlling the application, possible presentation of the measured results, the actual results of testing the selected embedded platforms and a discussion of these results.
Platform Independent Storge of Sensitive Data
Klemens, Jakub ; Herout, Adam (referee) ; Španěl, Michal (advisor)
This thesis addresses the issues when securing sensitive data for Windows, iOS and MacOS, with the target being to create the ideal key-value data storage library. A C++ library has been designed and implemented based on a given facts. The library offers a simple application programming interface for storing data and structuring them into modules. A base functionality is verified by set of unit tests.
Instant Messenging System
Fiedor, Jan ; Kašpárek, Tomáš (referee) ; Ráb, Jaroslav (advisor)
Nowadays many instant messenging clients exist. However, it is true, that many of them do not solve the security issues connected with communication, often deal with file transfer problems and are linked with specific protocol. This thesis is trying to find out the best solution of those problems and use it to develop secure and reliable client independent of concrete protocol.
Comparison of cryptographic primitives used in elliptic curve cryptograpny on different hardware platforms
Brychta, Josef ; Martinásek, Zdeněk (referee) ; Fujdiak, Radek (advisor)
This master thesis deals with the implementation of variants of cryptographic libraries containing primitives for elliptic curves. By creating custom metering charts to compare each implementation. The main task was not only the implementation of libraries but also the design and implementation of test scenarios together with the creation of measurement methods for different libraries and hardware platforms. As a result, a number of experimental tests were conducted on different curves and their parameters so that the results of the work included complex problems of elliptic curves in cryptography. The main parameters were power, time and memory consumption.

National Repository of Grey Literature : 12 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.