National Repository of Grey Literature 147 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
A portal to support the teaching of applied cryptography
Vojáčková, Veronika ; Sikora, Marek (referee) ; Zeman, Václav (advisor)
Cryptography has a rich history, ranging from ancient civilizations to modern times, ensuring confidentiality and security has always played a very important role. In order to understand these algorithms, however, it is necessary to understand the basics of this issue, which can be a very difficult task without comprehensive resources. The thesis first examines web portals dealing with cryptography on the Czech and foreign Internet. Next, it compiles all the necessary knowledge for the subject of applied cryptography. As part of the work, a web portal is created bringing together the necessary information to support teaching along with a practical demonstration of algorithms and their use in the Python programming language.
Linux encryptor for network traffic
Suchý, Daniel ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This bachelor's thesis deals with the possibilities of encrypting network traffic on the Linux platform. The goal is to create a virtual machine that can encrypt incoming traffic and send it to it‘s destination. Encryption of network traffic was implemented using the ip-xfrm framework in the form of encryption of the packet’s payload. The encryption algorithm chosen was AES-256 with a key generated and established using QKD. For the possibility of expanding the functionality of the encryptor for multiple clients, a VPN server was implemented on the encryptor.
Demonstration of Cryptographic Problems through an Interactive Educational Game
Fišarová, Anežka ; Mezina, Anzhelika (referee) ; Mikulec, Marek (advisor)
The bachelor thesis is focused on the design and implementation of a cryptographic interactive educational game. It focuses on various cryptographic ciphers specifically selected so that people outside the field can be introduced to the subject in a demonstrative and entertaining way. Java and JavaFX were used as the programming language. The thesis consists of four parts, the first two are oriented towards the theoretical part of cryptography and the second two are more focused on the practical application and code development. As motivation for the players, a score for correctly cracked ciphers was used. Furthermore, the work includes a choice of difficulty, which influences which ciphers will be presented to the players. At the end of the thesis, the author reflects on the results and explores ways to further improve the methods presented.
Cryptographic coprocessors for IoT microcontrollers communication protection
Český, Michal ; Zeman, Václav (referee) ; Slavíček, Karel (advisor)
This bachelor thesis outlines the issue of how communication can be secured within the IoT. The microcontroller itself can also be used for this purpose, however, security will never be assured as it will be when using a hardware cryptographic co-processor. To generate the keys and certificate, the ATECC608B coprocessor is chosen which holds the necessary "secrets" used to secure the communication. As a demonstration of the cryptographic coprocessor functionality, the ESP32 microcontroller is connected to the AWS server where all the connections to the server are established using the cryptographic coprocessor.
Cryptography and modern cryptographic algorithms
Orság, Dominik ; Dobrovský, Ladislav (referee) ; Nevoral, Tomáš (advisor)
The goal of this bachelor thesis is to provide a comprehensive overview of the historical development of cryptography as well as important cryptographic methods of today. The theoretical section begins with an exploration of fundamental concepts and the historical progression of cryptographic algorithms. This is followed by a descroption of modern symmetric and asymmetric algorithms. The greatest attention is paid to the RSA algorithm and its implementation in the Python language.
Difussion of Bitcoin in the Czech republic: The relation of innovation attributes on the innovation-decision process.
Havrland, Ladislav ; Remr, Jiří (advisor) ; Hájek, Martin (referee)
Bitcoin is a topic that affects almost the entire adult population of the Czech Republic that has an Internet connection. Almost every Czech is familiar with Bitcoin online and two-thirds of them spontaneously remember it. Bitcoin ownership was declared by 17% of respondents. Other cryptocurrencies in the Czech environment lag significantly behind in terms of key indicators. The relationship between Bitcoin attributes and the decision making process is statistically significant. Contrary to the original assumption that the attributes of Bitcoin would be the independent variable, the correlation analysis revealed that aspects of the decision-making process were the independent variable. It must be added that this result needs to be taken in the context of data measurement. The measured data shows that in the attitude and confirmation phase of the decision- making process, the relationship with the attributes of Bitcoin is positive. In stages, people perceive the attributes of Bitocin as simple and see in it the advantages that they can use. In the stages of knowledge, decision and application, the association with the attributes of Bitcoin is rather negative. At those stages, Bitcoin is difficult for people to grasp or where I don't see a use for them. Thus, the stages of awareness, decision and application...
Modeling and Simulation of Incentive Mechanisms in Ethereum
Burianová, Tereza ; Fiedor, Jan (referee) ; Perešíni, Martin (advisor)
Tématem této bakalářské práce je poplatkový mechanismus v síti Ethereum, zejména změny představeny v EIP-1559. Cílem práce je zkoumat chování mechanismu a navrhnout případná možná vylepšení v případě nalezených nedostatků. Dříve používaný aukční systém vyžadoval libovolné nastavení výše poplatku uživatelem, což vedlo k přeplatkům a vysoké volatilitě výše poplatků. Tyto problémy nastaly převážně kvůli vyššímu vytížení sítě po popularizaci projektů jako například decentralizované finance, NFT kolekce a metaverse. Nový poplatkový mechanismus zavedl proměnlivou velikost bloku, která se dokáže přizpůsobit aktuálnímu vytížení sítě. Base fee, hodnota značící minimální výši poplatku potřebnou pro zahrnutí do bloku, je pak vypočítána na základě zaplněnosti předchozího bloku, což dělá poplatky více předvídatelnými. Bylo navrženo několik simulačních experimentů, které zkoumají typické chování a možné slabiny mechanismu. Nakonec bylo nalezeno možné vylepšení a byl navržen další výzkum. Cíle práce byly splněny a výsledky byly prezentovány.
Cryptocurrency – a modern kind of money
Petrenec, Vojtěch ; Baumgartnerová, Alena (referee) ; Jašková, Jana (advisor)
Kryptoměna se stala známým fenoménem ve světě bankovních a elektronických plateb, ale pro širokou veřejnost je stále záhadou, a ne vše je vysvětleno tak, aby s ní mohl kdokoliv obchodovat. Tato práce se zaměřuje na kryptoměny. Studie se zaměřuje na původ kryptoměn, principy, na kterých jejich zabezpečení funguje, proč jsou jejich transakce nevysledovatelné a jak jsou tyto převody prováděny. Následně se práce zabývá tím, kde může majitel uchovávat své kryptoměny, jaké typy peněženek existují, čím se těžba kryptoměn zabývá a co lze jejím prostřednictvím získat. Jednotlivé kryptoměny jsou diskutovány ke konci práce, včetně jejich historie a které peněženky jsou vhodné pro každou minci. Dále se tato práce věnuje fiat měnám, včetně jejich historie a ekonomických funkcí, které plní. Nakonec jsou tyto ekonomické funkce aplikovány na kryptoměny. Cílem této práce je získat větší přehled o kryptoměnách, včetně toho, co jsou zač, jak fungují a jak s nimi zacházet.
Analysis of cryptographic operations on various processor architectures
Kubík, Hynek ; Gerlich, Tomáš (referee) ; Lieskovan, Tomáš (advisor)
Bachelor’s thesis analyzes cryptographic operations and algorithms on different server processor architectures. The thesis in its theoretical part deals with the analysis of individual cryptographic algorithms, processor architecture, computing cluster and HPC. An application is made for the analysis, which, depending on the input parameters, selected architectures and configuration selected by the user, performs the measurement of the performance of individual operations.The results from performance measurements and various cryptographic operations and architectures and with various input application parameters are subsequently years in the form of graphs.
Secret Sharing Authentication Key Agreement
Ryšavá, Pavla ; Dzurenda, Petr (referee) ; Ricci, Sara (advisor)
Práce se zabývá implementací a vytvořením kryptografické knihovny a grafického uživatelského rozhraní (GUI) pro nově navržený protokol "Smlouva o autentizačním klíči na základě Shamirova sdílení tajemnství" (ang. "Shamir’s Secret Sharing-based Authenticated Key Agreement", zkráceně ShSSAKA). Protokol je založený na principu AKA (autentizovaná domluva klíče), Schnorrově podpisu a rozšířen Paillierovým schématem pro možnost podílení se více zařízení na podpisu a autentizaci. Prezentovány jsou také benchmarky na osobním počítači a RaspberryPi.

National Repository of Grey Literature : 147 records found   1 - 10nextend  jump to record: