Bc. Michael Koudela
Bachelor's thesis
Visualization of cryptographic protocols
Visualization of cryptographic protocols
Abstract:
Cílem této práce je popsat, jak lze vizualizovat kryptografické protokoly a jaké nástroje pro tento účel lze použít. Práce představuje různé pohledy na tuto problematiku. Dále je provedena analýza možných přístupů za účelem zjistit, které metody by měly být preferovány, a to obecně a ve čtyřech vzorových scénářích. Existující nástroje jsou podrobeny testování a následně prezentovány tak, aby bylo jasné …moreAbstract:
The aim of this thesis is to describe how cryptographic protocols get visualized and to review the tools that can be used for that purpose. Various possible views are introduced, and it is analysed which approaches should be preferred, both in general and in four sample scenarios. The existing tools are tested and presented in such a way that it is clear which of them are available, what are their …more
Language used: English
Date on which the thesis was submitted / produced: 25. 5. 2021
Identifier:
https://is.muni.cz/th/tvcgk/
Thesis defence
- Date of defence: 28. 6. 2021
- Supervisor: prof. RNDr. Václav Matyáš, M.Sc.
- Reader: RNDr. Martin Ukrop
Full text of thesis
Contents of on-line thesis archive
Published in Theses:- světu
Other ways of accessing the text
Institution archiving the thesis and making it accessible: Masarykova univerzita, Fakulta informatikyMasaryk University
Faculty of InformaticsBachelor programme / field:
Applied Informatics / Applied Informatics
Theses on a related topic
-
3DES Key Cryptography on Android
Jozef Kovaľák -
Threshold Cryptography on Secure Hardware Devices
Antonín Dufka -
Exemining and improving the security of elliptic curve cryptography
Vladimír Sedláček -
Cycles of pairing-friendly elliptic curves and their applications in cryptography
Tomáš Novotný -
Analyzing semantic stability of cryptography libraries using Diffkemp
Pavol Žáčik -
PYECSCA: Reverse-engineering black-box Elliptic Curve Cryptography implementations via side-channels
Ján Jančár -
Simulation of real-world side-channel attacks on elliptic-curve cryptography
Andrej Bátora -
Security and cryptography in GO
Lenka Svetlovská