National Repository of Grey Literature 169 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Program for testing speed of cryptographic algorithms
Volf, Lukáš ; Sajdl, Ondřej (referee) ; Kadlec, Jaroslav (advisor)
Program for testing of speed of encryption algorithms is project aimed to build a program, which will be able to test specific properties of each single encryption algorithm protocol and results of testing will be saved for later statistical analysis. Program is going to be build in C# program language. In statistical analysis part all data and results from testing of each single algorithm will be processed and reviewed in transparent reports.
Safe Communication App for Windows Phone
Vícha, Tomáš ; Veľas, Martin (referee) ; Herout, Adam (advisor)
The aim of this thesis is to describe the application development for secure communication between two users. The description begins with the analysis of already existing solutions, continues with the design of the user interface and the determination of requirements. There is also described a selection of suitable technologies and stages of application development together with its testing. The result of this work is an user-friendly application for the Windows Phone platform that performs end-to-end encryption of individual messages.
Simulation of cryptographic algorithms using FPGA
Németh, František ; Mašek, Jan (referee) ; Smékal, David (advisor)
Bachelor thesis is dealing with a cipher standard AES and with a design of encryption and decryption components for AES in special modes of operation. Programming language is VHDL. In theoretical part of thesis is a further descriptions of AES and behaviour of block cipher operation modes. Furthermore the brief description of VHDL, FPGA and NetCOPE framework is a piece of theoretical part as well. The practical part contains designs which are made in developing environment Vivado from Xilinx. Programmed modes of operation are ECB, CBC, CTR and CFB. Simulation outputs and synthesis results are summerized in tables.
Alternative methods in cryptology
Hampl, Dalibor ; Doležel, Radek (referee) ; Hajný, Jan (advisor)
In the first part of this thesis explains, what is generally cryptography, generally analyze the problem of the current encryption methods. These include asymmetric, symmetric and hybrid encryption methods. The second part focuses on the theory of lattices and their main mathematical problems, then the shortest vector problem, the closest vector problem, the approximate shortest vector problem and the approximate closest vector problem. Mathematically difficult problems of lattice are used in an encryption method GGH for asymmetrically encrypted communications method and GGH for digital signatures. It explains mathematical methods, which use these encryption methods. Another part of this thesis deals with the encryption method and the establishment of XTR on Diffie-Hellman protocol, thus XTR-DH. It explains mathematical methods, which use methods XTR, XTR-DH and Diffie-Hellman protocol. There are shown the main mathematical problems for this part of thesis DHP (Diffie-Hellman problem) and DLP (discrete logarithm problem). The fourth part focuses on a program designed to demonstrate the GGH encryption method for asymmetrically encrypted communications. Describes the structure, functionality, graphical part of the program and shows to a user interface. Students can test how the GGH encryption method behave when entering different input values. During the work with the program, the user should obtain sufficient information to understand the principles of this encryption method.
Current security trends in mobile networks
Jirkovská, Šárka ; Sobotka, Jiří (referee) ; Doležel, Radek (advisor)
This master's thesis deals with the issue of the security of GSM and UMTS mobile communication systems. In the thesis the principles of the authentication and encryption of both the mobile systems are described. Further, the constituent algorithms used for identity verification, key generation and encryption are mentioned. The commonly used algorithms are described along with their weaknesses. In the following part of this thesis, well-known attacks on GSM system are mentioned. In the part where UMTS system is dealt with one can find the algorithms used in this system to increase the security of transmitted data and authentication in comparison with GSM system. Therefore the whole process of authentication and encryption is described separately. In the last part the creation of programming models of authentication and encryption in GSM and encryption in UMTS is described. These models are created in the environment of Matlab version 2009b.
Security prospects of wireless communication networks
Hráček, Jiří ; Lambertová, Petra (referee) ; Škorpil, Vladislav (advisor)
This master thesis deals with all types of wireless networks security – in personal, local, metropolitan and also mobile networks. This work is mostly focused on wireless local area networks (WLANs), which are the most widespread at nowadays. This work describes attacks to the wireless local area network, attackers steps and possible protection against it. Some of these attacks are tested in practical part of this work. In this master thesis there were also designed and created two laboratory exercises. One of them is a simulation in the wireless network using Opnet Modeler application. The other exercise is strictly practical type.
SMS Encryption for Mobile Communication
Lisoněk, David ; Bouška, Petr (referee) ; Drahanský, Martin (advisor)
This thesis deals with encryption of short text message (SMS) in mobile communication. Introduction is dedicated to overview of the parts of GSM radiotelephone nets and SMS messages transfer . Next chapter is reserved for description of cryptographic methods especially symetric and asymetric encryptografic aproaches. A design of a SMS messages encryption and decryption techniques is in next. For SMS encryption and sign, there is used the asymetric cypher RSA. Encryption use OAEP padding schema. The public key is saved in certificate. The Symbian OS has been choosen as a suitable platform for programming of mobile devices.
Security risks of wireless access networks
Špidla, Milan ; Hošek, Jiří (referee) ; Polívka, Michal (advisor)
Master´s thesis „Security risks of wireless access networks“ deals with wireless access networks, which are the most widespread in this time. The main target is realization of attacks wireless access networks protected by various using methods. This thesis shows main securities gaps, which originate from project this networks. These securities gaps are used for realization attacts in practical part. In the next part I took attention of network´s monitoring possibilities.
Cryptography on Computationally Limited Devices
Hampl, Dalibor ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
The thesis focuses on cryptographic algorithms of low performance devices, and mutual authentication of authentication server and user using smart cards. In the first part of this thesis the cryptography, cryptographic primitives, cryptographic goals, security models and cryptographic algorithms of low performance devices are presented. The second part focuses on low performance devices as RFID tags, NFC technology, microcontrollers and smart cards (.NET cards, java cards, MIFARE cards). The practical part deals with the comparison of chosen low performance devices and measure the time required for encryption and decryption using different cryptographic algorithms on Gemalto .NET Smart Card V2+. This thesis describes and explains the three authentication schemes for mutual authentication of remote server and user using smart cards. The new authentication scheme, which is based on the second related scheme, attempts to eliminate possible security attacks and keeps efficiency. For all four authentication schemes the application is implemented to test required time for authentication of server and user using smart cards.
The Security Risks of E-commerce
Bauer, Oldřich ; Konečný, Vladimír (referee) ; Dvořák, Jiří (advisor)
This thesis is concerned with the security risks in company and it is oriented to risks connected with electronic commerce. It describes these technologies a gives comprehensive view to security risks, designed for concrete firm in practice.

National Repository of Grey Literature : 169 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.