National Repository of Grey Literature 29 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Cryptography protocol with public key
Fujdiak, Radek ; Rášo, Ondřej (referee) ; Mlýnek, Petr (advisor)
The Master thesis is an introduction to cryptology. The Thesis describe cryptosystems and selects one ideal cypher for low-power microcontroler. In thesis provides manual for instal development program COde Composer Studio, basic implementation of selected cryptosystem with small numbers and suggestion for implementation selected cyptosystem with big numbers.
Elliptic curve based cryptosystems
Křivka, Petr ; Hajný, Jan (referee) ; Stančík, Peter (advisor)
In this bachelor thesis is examined problems elliptic curve cryptosystems. It is described mathematical underground, which use these systems. In more details is analyzed arithmetic finite fields. An important part of this work is the analysis of elliptical curves in cryptography. Among analyzed algorithms include e.g. ECDH or ECDSA. In conclusion is designed software solution, which helps in the study cryptosystems based elliptic curves. It allows basic operations over prime field.
Implementation of cryptographic protocols on smart cards
Moravanský, Michal ; Hajný, Jan (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis is focused on cryptographic schemes using Attribute-Based Credentials, which try to minimize the negative impact on the protection of a user's privacy when using authentication systems. The aim of the bachelor's thesis was the implementation of two specified schemes on smart cards as a device with limited performance. Schemes differ only in the ability to revoke user. The practical part of this paper contains the analysis and selection of smart card platform and cryptographic libraries depending on performance. The work also describes the architecture of both schemes and individual protocols, including ongoing communication. The implementation of the Attribute-Based Credentials scheme was performed on a programmable smart card Multos (user side) and Raspberry Pi 2 (issuer and verifier side). The time complexity of the selected algorithms was also compared. In the end, the dependencies affecting the resulting efficiency and speed of the protocol were formulated.
Diffie-Hellman key exchange protocol
Člupek, Vlastimil ; Burda, Karel (referee) ; Sobotka, Jiří (advisor)
In this bachelor's thesis there is explained principle of cryptography, encryption methods and primarily cryptographic protocol key exchange Diffie-Hellman. There is described key exchange process via public channel. Problem of discrete logarithm. Attack "Man in the middle" on this protocol and protection against this attack. Subsequently there is described a newer version of this protocol, which work's with elliptic curves. Its name is Elliptic Curve Diffie-Hellman (ECDH). In this protocol there is hereinafter described a procedure of calculate a secret point on elliptic curve. Problem of Elliptic discrete logarithm. Attack "Man in the middle" on protocol ECDH and protection against this attack. Furthermore this thesis deals with analyzing mutual compatibility between protocol DH and ECDH and its possible solutions.
Algorithms for Determining the Order of the Group of Points on an EllipticCurve with Application in Cryptography
Trchalíková, Jana ; Knoflíček, František (referee) ; Kureš, Miroslav (advisor)
Eliptické křivky jsou rovinné křivky, jejíž body vyhovují Weierstrassově rovnici. Jejich hlavní využití je v kryptografii, kde představují důležitý nástroj k tvorbě těžko rozluštitelných kódů bez znalosti klíče, který je v porovnání s ostatními šifrovacími systémy krátký. Díky těmto přednostem jsou hojně využívány. Abychom mohli kódovat a dekódovat zprávy v systému eliptických křivek, musíme znát řád dané eliptické křivky. K jeho získání se mimo jiné používá Shanksův algoritmus a jeho vylepšená varianta, Mestreho algoritmus.
Elliptic curves in cryptography
Geyer, Lukáš ; Burda, Karel (referee) ; Lambertová, Petra (advisor)
The objective of this bachelor thesis is to decribe the role of the elliptic curves in modern cryptosystems, explain the mathematical fundamentals upon which the elliptic curves are based along with their advantages and disadvantages, followed by application in the digital signature. The project is concluded by a software solution demonstrating the use of elliptic curves in digital signature scheme ECDSA
Secure User Authentication Using Smart Cards
Koutný, Tomáš ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
This thesis deals with Basic Card problém and their analysis in terms of the offered features cryptographic security measures. Elliptic curve method was used in this thesis. The thesis contains design of authentication protocol and its implementation.
Cryptographic protocols for privacy protection
Hanzlíček, Martin ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
This work focuses on cryptographic protocol with privacy protection. The work solves the question of the elliptic curves and use in cryptography in conjunction with authentication protocols. The outputs of the work are two applications. The first application serves as a user and will replace the ID card. The second application is authentication and serves as a user authentication terminal. Both applications are designed for the Android operating system. Applications are used to select user attributes, confirm registration, user verification and show the result of verification.
Rings of endomorphisms of elliptic curves and Mestre's theorem
Szásziová, Lenka ; Hrdina, Jaroslav (referee) ; Kureš, Miroslav (advisor)
Eliptické křivky jsou mocným nástrojem dnešní doby. Jednak přispěly k vyřešení mnoha matematických problémů, ale také nalezly četná uplatnění v aplikacích, jako je například kryptografie založená na eliptických křivkách (ECC). Tato metoda veřejného klíče má velkou budoucnost, neboť v mnohém doplňuje nedostatky známé RSA metody. Jedním z hlavních problémů kryptografie založené na eliptických křivkách je určení řádu eliptické křivky, tedy výpočet počtu bodů eliptické křivky nad prvočíselným polem. Tomuto zásadnímu problému je věnována tato práce. Na určení řádu eliptické křivky existuje řada algoritmů. Pro menší prvočísla (čili pro charakteristiku prvočíselného pole) se užívá metoda založená na přímém výpočtu, tzv. naivní algoritmus. Velkou pomocí v této problematice je Hasseho teorém, který omezuje řád eliptické křivky intervalem. Pro větší prvočísla se s úspěchem používají Shanksův algoritmus a jeho vylepšení Mestreho algoritmus. Oba algoritmy mají dvě části - Baby Step a Giant Step. Shanksův algoritmus je však v určitých případech nepoužitelný a tento problém řeší Mestreho algoritmus, který používá pojem twist eliptické křivky. Díky Mestreho teorému bylo dokázáno, že řád eliptické křivky nad prvočíselným polem muže být spočten pro každé prvočíslo vetší než 457. Důkaz, který spočívá především v isomorfismu okruhu endomorfismů nad eliptickými křivkami a imaginárního kvadratického řádu, je uveden na závěr této práce.
The transfer of elliptic curves onto the torus
Bajko, Jaroslav ; Hrdina, Jaroslav (referee) ; Kureš, Miroslav (advisor)
Elliptic curves are an essential part of modern mathematics and play an important role especially in cryptography. The bachelor work focuses on the visualization elliptic curves and group operation in real plane and torus. In the first chapter we will introduce elliptic curves over field of real numbers and above all over prime fields. In order to describe the problematics rigorously the graphical outputs and also the experimental results in the field of discrete elliptic curves will be mentioned. In the next section we will pay a particular attention to topology, functions between topological spaces and to the introduction of the concept of smooth manifold. We will search the suitable functions which can transfer geometrical objects from the real plane onto torus. A software specifically developed for transfering the elliptic curves onto the torus works on the basis of aforementioned functions.

National Repository of Grey Literature : 29 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.