National Repository of Grey Literature 195 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Group theoretical properties of the group generated by the action of the AES-128 key schedule
Appah, Patrick ; Pavlík, Jan (referee) ; Aragona, Riccardo (advisor)
The AES key scheduling algorithm selects the round keys which are xor-ed with the partially encrypted state in each iteration. In this work, we examine the group that arises from the AES-128 key scheduling operation. We show that the smallest group _AES containing and all translations of the message space is primitive. This implies that we cannot have a linear partition of the message space that is invariant under the action of _AES .
Asymmetric-Key Cryptography in Embedded Systems
Záhorský, Matej ; Kula, Michal (referee) ; Nosko, Svetozár (advisor)
Účelom tejto práce je prieskum a implementácia existujúceho asymetrického kryptografického algoritmu v FPGA a vyhodnotenie jeho výkonu. Prvá kapitola sa zameriava na vstavané systémy a FPGA, pričom popisuje ich štruktúru a použitie. V druhej kapitole je porovnanie kryptografických algoritmov a ich vlastností, ktoré umožňujú ich použitie vo vstavaných systémoch. Fázy návrhu a implementácie v tomto projekte popisujú a implementujú riešenie, ktoré zahŕňa výber a integráciu podpisovacieho algorithmu v FPGA. Dodatočné optimalizácie na zvýšenie výkonu sú taktiež naimplementované vo forme hardvérovej akcelerácie, ktoré sú zároveň porovnané s pôvodným algoritmom v kapitole vyhodnotenia.
Centralized Cryptocurrency Exchange with Trusted Computing
Sasák, Tomáš ; Očenášek, Pavel (referee) ; Homoliak, Ivan (advisor)
Táto práca sa zaoberá návrhom, implementáciou a analýzou centralizovanej zmenárne kryptomien, ktorá pracuje na platforme trusted computing. Aktuálne centralizované zmenárne fungujú na základe plnej dôvery používateľa v operátorov zmenárne. Na opačnej strane, decentralizované zmenárne využívajú jeden blockchain a tým sú limitované iba na mince na danom blockchaine. Použitím trusted computing platformy Intel SGX je možné kód zverejniť (open source) a zákazník si dokáže overiť pomocou SGX atestácie (remote attestation) že tento kód beží na platforme zmenárne. Kombináciou so smart contract platformou na verejnom blockchaine zmenáreň dosahuje odolnosť voči nejednoznačnosti a vytvára lepšiu vrstvu bezpečnosti a transparentnosti pre používateľa. Zmenáreň bola implementovaná ako proof-of-concept pomocou programovacieho jazyka Go, za použitím frameworku EGo pre tvorbu SGX enkláv. Pre ukladanie dát bola použitá databáza PebbleDB a relačná databáza PostgreSQL. Smart contract zmenárne bol implementovaný v jazyku Solidity a nasadený na Ethereum. Implementácia je schopná vyhodnotiť približne 35 vkladov mincí za sekundu a 23 ponúk na výmenu mincí za sekundu. Aktualizácia poslednej verzie ledgeru na kontrakte stojí približne 0.00255 ETH, pri tendencií aktualizácie každú minútu deň behu zmenárne stojí približne 3.6742 ETH.
A portal to support the teaching of applied cryptography
Vojáčková, Veronika ; Sikora, Marek (referee) ; Zeman, Václav (advisor)
Cryptography has a rich history, ranging from ancient civilizations to modern times, ensuring confidentiality and security has always played a very important role. In order to understand these algorithms, however, it is necessary to understand the basics of this issue, which can be a very difficult task without comprehensive resources. The thesis first examines web portals dealing with cryptography on the Czech and foreign Internet. Next, it compiles all the necessary knowledge for the subject of applied cryptography. As part of the work, a web portal is created bringing together the necessary information to support teaching along with a practical demonstration of algorithms and their use in the Python programming language.
Linux encryptor for network traffic
Suchý, Daniel ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This bachelor's thesis deals with the possibilities of encrypting network traffic on the Linux platform. The goal is to create a virtual machine that can encrypt incoming traffic and send it to it‘s destination. Encryption of network traffic was implemented using the ip-xfrm framework in the form of encryption of the packet’s payload. The encryption algorithm chosen was AES-256 with a key generated and established using QKD. For the possibility of expanding the functionality of the encryptor for multiple clients, a VPN server was implemented on the encryptor.
Demonstration of Cryptographic Problems through an Interactive Educational Game
Fišarová, Anežka ; Mezina, Anzhelika (referee) ; Mikulec, Marek (advisor)
The bachelor thesis is focused on the design and implementation of a cryptographic interactive educational game. It focuses on various cryptographic ciphers specifically selected so that people outside the field can be introduced to the subject in a demonstrative and entertaining way. Java and JavaFX were used as the programming language. The thesis consists of four parts, the first two are oriented towards the theoretical part of cryptography and the second two are more focused on the practical application and code development. As motivation for the players, a score for correctly cracked ciphers was used. Furthermore, the work includes a choice of difficulty, which influences which ciphers will be presented to the players. At the end of the thesis, the author reflects on the results and explores ways to further improve the methods presented.
Cryptographic coprocessors for IoT microcontrollers communication protection
Český, Michal ; Zeman, Václav (referee) ; Slavíček, Karel (advisor)
This bachelor thesis outlines the issue of how communication can be secured within the IoT. The microcontroller itself can also be used for this purpose, however, security will never be assured as it will be when using a hardware cryptographic co-processor. To generate the keys and certificate, the ATECC608B coprocessor is chosen which holds the necessary "secrets" used to secure the communication. As a demonstration of the cryptographic coprocessor functionality, the ESP32 microcontroller is connected to the AWS server where all the connections to the server are established using the cryptographic coprocessor.
Cryptography and modern cryptographic algorithms
Orság, Dominik ; Dobrovský, Ladislav (referee) ; Nevoral, Tomáš (advisor)
The goal of this bachelor thesis is to provide a comprehensive overview of the historical development of cryptography as well as important cryptographic methods of today. The theoretical section begins with an exploration of fundamental concepts and the historical progression of cryptographic algorithms. This is followed by a descroption of modern symmetric and asymmetric algorithms. The greatest attention is paid to the RSA algorithm and its implementation in the Python language.
Difussion of Bitcoin in the Czech republic: The relation of innovation attributes on the innovation-decision process.
Havrland, Ladislav ; Remr, Jiří (advisor) ; Hájek, Martin (referee)
Bitcoin is a topic that affects almost the entire adult population of the Czech Republic that has an Internet connection. Almost every Czech is familiar with Bitcoin online and two-thirds of them spontaneously remember it. Bitcoin ownership was declared by 17% of respondents. Other cryptocurrencies in the Czech environment lag significantly behind in terms of key indicators. The relationship between Bitcoin attributes and the decision making process is statistically significant. Contrary to the original assumption that the attributes of Bitcoin would be the independent variable, the correlation analysis revealed that aspects of the decision-making process were the independent variable. It must be added that this result needs to be taken in the context of data measurement. The measured data shows that in the attitude and confirmation phase of the decision- making process, the relationship with the attributes of Bitcoin is positive. In stages, people perceive the attributes of Bitocin as simple and see in it the advantages that they can use. In the stages of knowledge, decision and application, the association with the attributes of Bitcoin is rather negative. At those stages, Bitcoin is difficult for people to grasp or where I don't see a use for them. Thus, the stages of awareness, decision and application...
The Outdoor Escape Game in Biology Teaching for the 6th Grade of Elementary School
Ševčíková, Kateřina ; Říhová, Dagmar (advisor) ; Škodová, Jana (referee)
The topic of the diploma thesis is an outdoor escape game and the possibility of its inclusion in the teaching of Biology in the sixth grade of elementary school. The work is divided into a theoretical and a practical part. The aim of the theoretical part is to describe the elements and process of the classic escape game, outdoor escape game and its use in education. The thesis approaches the history of escape games, geocaching and the educational trail, including elements used in outdoor escape games. The thesis provides an overview of basic ciphers that can be used in escape games. The goal of the practical part is to create my own digital outdoor escape game using the Glitr application, which will be tested in practice. The game aims to revise and expand the knowledge gained in Biology lessons and to develop key competences. The practical part describes individual elements of the application, their possible use and the process of creating outdoor escape games. The theme of the game is insects with a connection to the history of the city of Klecany. It also includes a description of the individual locations and tasks used in the game. The outdoor escape game was tested on three classes of the sixth grade of local elementary school. An analysis of the collected data was carried out, namely the...

National Repository of Grey Literature : 195 records found   1 - 10nextend  jump to record: