National Repository of Grey Literature 4 records found  Search took 0.01 seconds. 
Alternative methods in cryptology
Hampl, Dalibor ; Doležel, Radek (referee) ; Hajný, Jan (advisor)
In the first part of this thesis explains, what is generally cryptography, generally analyze the problem of the current encryption methods. These include asymmetric, symmetric and hybrid encryption methods. The second part focuses on the theory of lattices and their main mathematical problems, then the shortest vector problem, the closest vector problem, the approximate shortest vector problem and the approximate closest vector problem. Mathematically difficult problems of lattice are used in an encryption method GGH for asymmetrically encrypted communications method and GGH for digital signatures. It explains mathematical methods, which use these encryption methods. Another part of this thesis deals with the encryption method and the establishment of XTR on Diffie-Hellman protocol, thus XTR-DH. It explains mathematical methods, which use methods XTR, XTR-DH and Diffie-Hellman protocol. There are shown the main mathematical problems for this part of thesis DHP (Diffie-Hellman problem) and DLP (discrete logarithm problem). The fourth part focuses on a program designed to demonstrate the GGH encryption method for asymmetrically encrypted communications. Describes the structure, functionality, graphical part of the program and shows to a user interface. Students can test how the GGH encryption method behave when entering different input values. During the work with the program, the user should obtain sufficient information to understand the principles of this encryption method.
Conversion of XTR Output of UPPAAL Tool into User-Friendly Representation
Mazánek, Antonín ; Mrázek, Vojtěch (referee) ; Strnadel, Josef (advisor)
The master's thesis introduces the Uppaal tool. It describes the principles and possibilities of modeling and analysis of systems using this tool. It also discusses in more detail the file formats that Uppaal tool uses. The structure of the XML file used to store created systems, the XTR format, which Uppaal uses to store simulation traces, and the IF format, which is necessary to understand the contents of the file in XTR format. The text also mentions available software support for working with these formats. Next part of this master's thesis is about designing user-friendly representation of simulations traces, along with designing application that translates simulation traces into designed representation. At the end of this thesis, the possible continuation of the project is mentioned together with the evaluation of the designed representation and the application.
Conversion of XTR Output of UPPAAL Tool into User-Friendly Representation
Mazánek, Antonín ; Mrázek, Vojtěch (referee) ; Strnadel, Josef (advisor)
The master's thesis introduces the Uppaal tool. It describes the principles and possibilities of modeling and analysis of systems using this tool. It also discusses in more detail the file formats that Uppaal tool uses. The structure of the XML file used to store created systems, the XTR format, which Uppaal uses to store simulation traces, and the IF format, which is necessary to understand the contents of the file in XTR format. The text also mentions available software support for working with these formats. Next part of this master's thesis is about designing user-friendly representation of simulations traces, along with designing application that translates simulation traces into designed representation. At the end of this thesis, the possible continuation of the project is mentioned together with the evaluation of the designed representation and the application.
Alternative methods in cryptology
Hampl, Dalibor ; Doležel, Radek (referee) ; Hajný, Jan (advisor)
In the first part of this thesis explains, what is generally cryptography, generally analyze the problem of the current encryption methods. These include asymmetric, symmetric and hybrid encryption methods. The second part focuses on the theory of lattices and their main mathematical problems, then the shortest vector problem, the closest vector problem, the approximate shortest vector problem and the approximate closest vector problem. Mathematically difficult problems of lattice are used in an encryption method GGH for asymmetrically encrypted communications method and GGH for digital signatures. It explains mathematical methods, which use these encryption methods. Another part of this thesis deals with the encryption method and the establishment of XTR on Diffie-Hellman protocol, thus XTR-DH. It explains mathematical methods, which use methods XTR, XTR-DH and Diffie-Hellman protocol. There are shown the main mathematical problems for this part of thesis DHP (Diffie-Hellman problem) and DLP (discrete logarithm problem). The fourth part focuses on a program designed to demonstrate the GGH encryption method for asymmetrically encrypted communications. Describes the structure, functionality, graphical part of the program and shows to a user interface. Students can test how the GGH encryption method behave when entering different input values. During the work with the program, the user should obtain sufficient information to understand the principles of this encryption method.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.