National Repository of Grey Literature 24 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Cryptography protocol with public key
Fujdiak, Radek ; Rášo, Ondřej (referee) ; Mlýnek, Petr (advisor)
The Master thesis is an introduction to cryptology. The Thesis describe cryptosystems and selects one ideal cypher for low-power microcontroler. In thesis provides manual for instal development program COde Composer Studio, basic implementation of selected cryptosystem with small numbers and suggestion for implementation selected cyptosystem with big numbers.
Elliptic curve based cryptosystems
Křivka, Petr ; Hajný, Jan (referee) ; Stančík, Peter (advisor)
In this bachelor thesis is examined problems elliptic curve cryptosystems. It is described mathematical underground, which use these systems. In more details is analyzed arithmetic finite fields. An important part of this work is the analysis of elliptical curves in cryptography. Among analyzed algorithms include e.g. ECDH or ECDSA. In conclusion is designed software solution, which helps in the study cryptosystems based elliptic curves. It allows basic operations over prime field.
Implementation of cryptographic protocols on smart cards
Moravanský, Michal ; Hajný, Jan (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis is focused on cryptographic schemes using Attribute-Based Credentials, which try to minimize the negative impact on the protection of a user's privacy when using authentication systems. The aim of the bachelor's thesis was the implementation of two specified schemes on smart cards as a device with limited performance. Schemes differ only in the ability to revoke user. The practical part of this paper contains the analysis and selection of smart card platform and cryptographic libraries depending on performance. The work also describes the architecture of both schemes and individual protocols, including ongoing communication. The implementation of the Attribute-Based Credentials scheme was performed on a programmable smart card Multos (user side) and Raspberry Pi 2 (issuer and verifier side). The time complexity of the selected algorithms was also compared. In the end, the dependencies affecting the resulting efficiency and speed of the protocol were formulated.
Diffie-Hellman key exchange protocol
Člupek, Vlastimil ; Burda, Karel (referee) ; Sobotka, Jiří (advisor)
In this bachelor's thesis there is explained principle of cryptography, encryption methods and primarily cryptographic protocol key exchange Diffie-Hellman. There is described key exchange process via public channel. Problem of discrete logarithm. Attack "Man in the middle" on this protocol and protection against this attack. Subsequently there is described a newer version of this protocol, which work's with elliptic curves. Its name is Elliptic Curve Diffie-Hellman (ECDH). In this protocol there is hereinafter described a procedure of calculate a secret point on elliptic curve. Problem of Elliptic discrete logarithm. Attack "Man in the middle" on protocol ECDH and protection against this attack. Furthermore this thesis deals with analyzing mutual compatibility between protocol DH and ECDH and its possible solutions.
Elliptic curves in cryptography
Geyer, Lukáš ; Burda, Karel (referee) ; Lambertová, Petra (advisor)
The objective of this bachelor thesis is to decribe the role of the elliptic curves in modern cryptosystems, explain the mathematical fundamentals upon which the elliptic curves are based along with their advantages and disadvantages, followed by application in the digital signature. The project is concluded by a software solution demonstrating the use of elliptic curves in digital signature scheme ECDSA
Contactless microcomputer card as a hiding place for geocaching
Vertaľ, Damián ; Dzurenda, Petr (referee) ; Burda, Karel (advisor)
This master’s thesis focuses on the possibility of using contactless smart cards as an electronic hiding place in an activity known as Geocaching. The first part explains the theoretical knowledge about cards, smart card programming, the development of android applications for communication with the smart card using the NFC interface and usage of eliptic curves to sign digital messages. The second part is dedicated to the design of a Java card application and an Android application, which are able to communicate
Rings of endomorphisms of elliptic curves and Mestre's theorem
Szásziová, Lenka ; Hrdina, Jaroslav (referee) ; Kureš, Miroslav (advisor)
Eliptické křivky jsou mocným nástrojem dnešní doby. Jednak přispěly k vyřešení mnoha matematických problémů, ale také nalezly četná uplatnění v aplikacích, jako je například kryptografie založená na eliptických křivkách (ECC). Tato metoda veřejného klíče má velkou budoucnost, neboť v mnohém doplňuje nedostatky známé RSA metody. Jedním z hlavních problémů kryptografie založené na eliptických křivkách je určení řádu eliptické křivky, tedy výpočet počtu bodů eliptické křivky nad prvočíselným polem. Tomuto zásadnímu problému je věnována tato práce. Na určení řádu eliptické křivky existuje řada algoritmů. Pro menší prvočísla (čili pro charakteristiku prvočíselného pole) se užívá metoda založená na přímém výpočtu, tzv. naivní algoritmus. Velkou pomocí v této problematice je Hasseho teorém, který omezuje řád eliptické křivky intervalem. Pro větší prvočísla se s úspěchem používají Shanksův algoritmus a jeho vylepšení Mestreho algoritmus. Oba algoritmy mají dvě části - Baby Step a Giant Step. Shanksův algoritmus je však v určitých případech nepoužitelný a tento problém řeší Mestreho algoritmus, který používá pojem twist eliptické křivky. Díky Mestreho teorému bylo dokázáno, že řád eliptické křivky nad prvočíselným polem muže být spočten pro každé prvočíslo vetší než 457. Důkaz, který spočívá především v isomorfismu okruhu endomorfismů nad eliptickými křivkami a imaginárního kvadratického řádu, je uveden na závěr této práce.
The transfer of elliptic curves onto the torus
Bajko, Jaroslav ; Hrdina, Jaroslav (referee) ; Kureš, Miroslav (advisor)
Elliptic curves are an essential part of modern mathematics and play an important role especially in cryptography. The bachelor work focuses on the visualization elliptic curves and group operation in real plane and torus. In the first chapter we will introduce elliptic curves over field of real numbers and above all over prime fields. In order to describe the problematics rigorously the graphical outputs and also the experimental results in the field of discrete elliptic curves will be mentioned. In the next section we will pay a particular attention to topology, functions between topological spaces and to the introduction of the concept of smooth manifold. We will search the suitable functions which can transfer geometrical objects from the real plane onto torus. A software specifically developed for transfering the elliptic curves onto the torus works on the basis of aforementioned functions.
Point Counting on Elliptic and Hyperelliptic Curves
Vácha, Petr ; Šťovíček, Jan (advisor) ; Drápal, Aleš (referee)
In present work we study the algorithms for point counting on elliptic and hy- perelliptic curves. At the beginning we describe a few simple and ineffective al- gorithms. Then we introduce more complex and effective ways to determine the point count. These algorithms(especially the Schoof's algorithm) are important for the cryptography based on discrete logarithm in the group of points of an el- liptic or hyperelliptic curve. The point count is important to avoid the undesirable cases where the cryptosystem is easy to attack. 1
Weil pairing
Luňáčková, Radka ; Drápal, Aleš (advisor) ; Šťovíček, Jan (referee)
This work introduces fundamental and alternative definition of Weil pairing and proves their equivalence. The alternative definition is more advantageous for the purpose of computing. We assume basic knowledge of elliptic curves in the affine sense. We explain the K-rational maps and its generalization at the point at infinity, rational map. The proof of equivalence of the two mentioned definitions is based upon the Generalized Weil Reciprocity, which uses a concept of local symbol. The text follows two articles from year 1988 and 1990 written by L. Charlap, D. Robbins a R. Coley, and corrects a certain imprecision in their presentation of the alternative definition. Powered by TCPDF (www.tcpdf.org)

National Repository of Grey Literature : 24 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.