• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 776
  • 132
  • 121
  • 68
  • 67
  • 36
  • 27
  • 24
  • 12
  • 12
  • 8
  • 7
  • 7
  • 7
  • 6
  • Tagged with
  • 1463
  • 516
  • 464
  • 315
  • 236
  • 232
  • 221
  • 197
  • 162
  • 159
  • 156
  • 144
  • 134
  • 134
  • 111
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1071

Zabezpečený přenos dat pomocí čarových kódů / Secure data transmition using bar codes

Kratochvíl, Martin January 2011 (has links)
The goal of this thesis was to create a system for visual data transmition using bar codes. It focuses mainly on the protection of the system against abuse. A mechanism was designed for the data transmition itself and the various security concepts. The most appropriate bar code for data transmition was selected on the basis of the analysis.
1072

Softwarová podpora výuky klasické kryptoanalýzy / Software support of education in classical cryptoanalysis

Fojtová, Lucie January 2010 (has links)
Number of today's modern cipher systems are based on the classical symmetric cipher systems, such as the transposition principle in the DES cipher. Successful analysis and deciphering of these ciphers is therefore underlined by solid knowledge of the elementary cryptanalysis methods. This implies the importance of classical cryptanalysis education -- for better a understanding of the field, using visual means is of utmost importance. The aim of the thesis is to summarize selected cipher methods of the classical cryptanalysis, namely the mono-- and polyalphabetical substitution and transposition route cipher. Along with the theoretical part, ciphering/deciphering software is introduced to be used for educational purposes, particularly a website and a standalone application providing tools for ciphering, analysis and code breaking of the classical cipher based code.
1073

Elektronický geocaching / Electronic geocaching

Průcha, Jan January 2013 (has links)
The master’s thesis is focusing on electronization of worldwide known game geocaching. It contains introduction to classic geocashing, analysis of current status and outline of possible solution. The design of electronization is based on smart card Gemalto. Very important part of the thesis is cryptographic security, therefore there is explanation of symetric and asymetric cryptography. The digital signature of transmitted message is realized by RSA algorithm, which is supported by the Gemalto smart card. Due to future expandability, it is appropriate to use general protocol. For this reason was chosen the ACP protocol which the supervisor of thesis adviced. In the following part, there is introduction to smart cards, their types and detailed description of Gemalto smart card. In the chapter 7 starts the solution of this issue and there are described the programmed apps.
1074

Použití smart-karet v moderní kryptografii / The use of smart-cards in modern cryptography

Kočíř, Michal January 2013 (has links)
This thesis discusses the general use of smart cards in MULTOS in cryptographic applications. At first is described two types of authentication - the authentication by the subject with focusing on authenticators and the authentication by the knowledge. Furthermore there is the description of the anonymous authentication and attribute authentization. This is followed by a description of smart cards with a focus on MULTOS cards. There is also performed analysis of programmable smart cards .NET, JavaCard and MULTOS. Practical part is focused on the implementation of an authentication scheme, which is being developed at FEEC. The communication of authentication protocol is between the MULTOS card and reader connected to a PC. The protocol is composed of cryptographic functions such as random number generation, hash function, modular exponentiation, modular multiplication and difference of large numbers. It was also implemented the measurement of specific applications.
1075

Formální analýza kryptografických protokolů / Formal analysis of cryptographic protocols

Petrovský, Peter January 2015 (has links)
This diploma thesis deals with cryptography. It describes its basic allocation and problems of number theory that needs to be addressed. It also deals with methods used to review the formal security of cryptographic protocols from a mathematical point of view. It analyse the tools used to automatic and semi-automatic evaluation of the safety of cryptographic protocols. It describes the process of working with these tools and finally test the security of protocols Kerberos, EKE and Unilateral authentication using symmetric cryptography, HMAC function and hash function. These tests are in tools AVISPA, ProVerif and Scyther. At the end is comparison of results.
1076

Webové aplikace pro autentizaci uživatelů / Web applications for user authentication

Vybíral, Petr January 2014 (has links)
The thesis deals with the problems of user authentication. The first chapter analyzes the problem of authentication, its methods and its utilization. The second chapter presents the different security options for communication. The chapter describes security, communication and authentication protocols. There is the 2D barcode QR Code described at the end of the chapter. The third chapter is devoted to ASP.NET technology, its development and possibilities of utilization. Attention is focused on web form and server controls. There is an analysis of elements of cookies and possibilities of their use. The last chapter consists of a practical part, which describes the development of a web application. There is a description of the parts of application, such as the database, the Web navigation, master pages and etc. in the following chapter. The cardinal part of the chapter consists of an analysis and implementation of forms authentication, the attribute authentication and authentication with QR code. Finally, there is a description of way how to secure the communication by using a certificate.
1077

Autentizační protokoly a ochrana soukromí / Authentication Protocols and Privacy Protection

Hajný, Jan January 2012 (has links)
Tato dizertační práce se zabývá kryptografickými prostředky pro autentizaci. Hlavním tématem však nejsou klasické autentizační protokoly, které nabízejí pouze ověření identity, ale tzv. atributové autentizační systémy, pomocí kterých mohou uživatelé prokazovat svoje osobní atributy. Tyto atributy pak mohou představovat jakékoliv osobní informace, např. věk, národnost či místo narození. Atributy mohou být prokazovány anonymně a s podporou mnoha funkcí na ochranu digitální identity. Mezi takové funkce patří např. nespojitelnost autentizačních relací, nesledovatelnost, možnost výběru prokazovaných atributů či efektivní revokace. Atributové autentizační systémy jsou již nyní považovány za nástupce současných systémů v oficiálních strategických plánech USA (NSTIC) či EU (ENISA). Část požadovaných funkcí je již podporována existujícími kryptografickými koncepty jako jsou U-Prove či idemix. V současné době však není známý systém, který by poskytoval všechny potřebné funkce na ochranu digitální identity a zároveň byl prakticky implementovatelný na zařízeních, jako jsou čipové karty. Mezi klíčové slabiny současných systémů patří především chybějící nespojitelnost relací a absence revokace. Není tak možné efektivně zneplatnit zaniklé uživatele, ztracené či ukradené autentizační karty či karty škodlivých uživatelů. Z těchto důvodů je v této práci navrženo kryptografické schéma, které řeší slabiny nalezené při analýze existujících řešení. Výsledné schéma, jehož návrh je založen na ověřených primitivech, jako jsou $\Sigma$-protokoly pro důkazy znalostí, kryptografické závazky či ověřitelné šifrování, pak podporuje všechny požadované vlastnosti pro ochranu soukromí a digitální identity. Zároveň je však návrh snadno implementovatelný v prostředí smart-karet. Tato práce obsahuje plný kryptografický návrh systému, formální ověření klíčových vlastností, matematický model schématu v programu Mathematica pro ověření funkčnosti a výsledky experimentální implementace v prostředí .NET smart-karet. I přesto, že navrhovaný systém obsahuje podporu všech funkcí na ochranu soukromí, včetně těch, které chybí u existujících systémů, jeho výpočetní složitost zůstává stejná či nižší, doba ověření uživatele je tedy kratší než u existujících systémů. Výsledkem je schéma, které může velmi znatelně zvýšit ochranu soukromí uživatelů při jejich ověřování, především při využití v elektronických dokladech, přístupových systémech či Internetových službách.
1078

GPU akcelerované prolamování šifer / GPU Accelerated Ciphers Cracking

Schmied, Jan January 2014 (has links)
This work describes one - way hash functions and cryptographic algorithms . It also describes their implementation regarding DOC, PDF and ZIP files contents encryption . Subsequently , the implementation analyzis is provided . Following next, the brute - force attack procedure levereging GPU is proposed and evaluated.
1079

Cryptographie homomorphe et transcodage d’image/video dans le domaine chiffré / Homomorphic encryption and image/video transcoding in the encrypted domain

Nokam Kuaté, Donald 14 December 2018 (has links)
L'apparition de nouvelles technologies comme l'informatique en nuages (cloud computing) offre de nouvelles opportunités de traitement de l'information. Par exemple, il est désormais facile de stocker ses photos ou vidéos personnelles sur des serveurs distants. Il est également possible de partager ces contenus à travers ces mêmes serveurs, ou encore via les réseaux sociaux ou les plateformes de téléchargement. Cependant, ces données personnelles sont bien souvent accessibles par le fournisseur de service, essentiellement pour des raisons pratiques : par exemple adapter une vidéo pour qu'elle s'affiche au bon format quel que soit l'appareil utilisé pour la visionner, permettre le partage de ses contenus avec d’autres personnes, etc. Cela soulève cependant un problème de confidentialité de ces données personnelles, et de confiance dans le fournisseur du service. La cryptographie classique apporte des solutions à ce problème, mais soulève malheureusement celui de la maniabilité des données : il devient par exemple impossible d'adapter un contenu vidéo au bon format d'affichage puisque le fournisseur ne peut plus « voir » la vidéo. Une solution alternative réside toutefois dans le chiffrement homomorphe. Cet outil un peu magique de la cryptographie avancée apporte la même sécurité que les algorithmes de cryptographie classique, mais permet de plus de manipuler les données tout en conservant leur forme chiffrée. Il offre ainsi une nouvelle perspective pour les fournisseurs puisque ceux-ci peuvent continuer à traiter l'information sans être capable de la voir, et donc sans atteinte à la vie privée de leurs utilisateurs, se conformant ainsi au nouveau Règlement Général sur la Protection des Données (RGPD). Bien que le chiffrement homomorphe soit très souvent considéré comme insuffisamment mature, du fait de sa complexité algorithmique, cette thèse cherche à montrer son caractère prometteur, en s'intéressant à son usage pour le traitement d'images et de vidéos chiffrées à la source. Nous regardons ainsi les différents algorithmes qui constituent un encodeur d'image/vidéo (JPEG/H264 et HEVC) et les transformons en des circuits qui sont manipulables par des systèmes de chiffrement homomorphes. Nous proposons ainsi dans cette thèse le tout premier pipeline de compression d'images de type JPEG ("homomorphic-JPEG") sur des pixels qui sont chiffrés de bout-en-bout. Pour optimiser la gestion des données ainsi protégées, nous proposons également de nouveaux outils applicables à tous les schémas de chiffrement homomorphe sur les réseaux idéaux. Notre approche permet de maximiser le nombre de slots dans un chiffré et introduit de nouvelles fonctions pour manipuler ces différents slots de manière indépendante les uns des autres. Ces travaux de thèse ont abouti à la publication de deux articles dans des conférences internationales ainsi qu’à la soumission d'un article supplémentaire. / The emergence of new technologies like cloud computing brings new opportunities in information processing. For example it is easy today to send our personal pictures or videos to a remote server (Google Drive, OneDrive …). We can also share this content among the same servers or via social networks and streaming services. However, this personal data is often also available to the service provider, mainly for practical reasons e.g. to configure a video to have the right format regardless of the displayer (smartphone or computer), to share our data with other people, etc. This raises issues of privacy and trust into the service provider. Classical cryptography brings some answers to this kind of issues, yet leaving the problem of handling the encrypted data: e.g., it becomes impossible to reconfigure a video because the provider can no longer “see” it. An alternative solution is “homomorphic encryption”. It is a powerful tool of advanced cryptography which provides the same security as classical cryptography algorithms, but it still allows us to manipulate ciphertexts such their underlying plaintexts are modified. Consequently, it offers a new perspective to service providers since they can continue to process their clients’information without knowing what it contains. This allows them to provide privacy-preserving services and comply with the new General Data Protection Regulation (GDPR). Although it is considered that homomorphic encryption does not have enough maturity due to its large algorithmic complexity, in this thesis, we are trying to show its potential by using it in the context of image and video processing over the encrypted data. In this context, we look at the different algorithms in an image/video encoder (JPEG/H264 and HEVC) and transform them to circuits which can be manipulated by homomorphic encryption schemes. Our main contribution is to propose the first pipeline for an image compression of type JPEG (homomorphic-JPEG) running on end-to-end encrypted pixels. To optimize the management of the encrypted data, we also propose new tools applicable to existing homomorphic encryption schemes over the ring version of lattices. Our approach allows us to maximize the number of slots in some ciphertext and we introduce new functions allowing to handle these slots independently in the encrypted domain. This thesis work also lead to two publications to international conferences as well as the submission of an additional article.
1080

Efficient lattice-based zero-knowledge proofs and applications / Preuves à divulgation nulle de connaissance efficaces à base de réseaux euclidiens et applications

Pino, Rafaël del 01 June 2018 (has links)
Le chiffrement à base de réseaux euclidiens a connu un grand essor durant les vingt dernières années. Autant grâce à l’apparition de nouvelles primitives telles que le chiffrement complètement homomorphe, que grâce à l’amélioration des primitives existantes, comme le chiffrement á clef publique ou les signatures digitales, qui commencent désormais à rivaliser avec leurs homologues fondés sur la théorie des nombres. Cela dit les preuves à divulgation nulle de connaissance, bien qu’elles représentent un des piliers des protocols de confidentialité, n’ont pas autant progressé, que ce soit au niveau de leur expressivité que de leur efficacité. Cette thèse s’attelle dans un premier temps à améliorer l’état de l’art en matière de preuves à divulgation nulle de connaissance. Nous construisons une preuve d’appartenance à un sous ensemble dont la taille est indépendante de l’ensemble en question. Nous construisons de même une preuve de connaissance amortie qui est plus efficace et plus simple que toutes les constructions qui la précèdent. Notre second propos est d’utiliser ces preuves à divulgation nulle de connaissance pour construire de nouvelles primitives cryptographiques. Nous concevons une signature de groupe dont la taille est indépendante du groupe en question, ainsi qu’un schéma de vote électronique hautement efficace, y compris pour des élections à grand échelle. / Lattice based cryptography has developed greatly in the last two decades, both with new and stimulating results such as fully-homomorphic encryption, and with great progress in the efficiency of existing cryptographic primitives like encryption and signatures which are becoming competitive with their number theoretic counterparts. On the other hand, even though they are a crucial part of many privacy-based protocols, zero-knowledge proofs of knowledge are still lagging behind in expressiveness and efficiency. The first goal of this thesis is to improve the quality of lattice-based proofs of knowledge. We construct new zero-knowledge proofs of knowledge such as a subset membership proof with size independent of the subset. We also work towards making zero-knowledge proofs more practical, by introducing a new amortized proof of knowledge that subsumes all previous results. Our second objective will be to use the proofs of knowledge we designed to construct novel and efficient cryptographic primitives. We build a group signature whose size does not depend on the size of the group, as well as a practical and highly scalable lattice-based e-voting scheme.

Page generated in 0.0239 seconds