Examining RSA keys in selected real-world systems – Mgr. Matúš Nemec
Mgr. Matúš Nemec
Advanced ('rigorózní') thesis
Examining RSA keys in selected real-world systems
Examining RSA keys in selected real-world systems
Abstract:
Útoky na súčasné kryptografické algoritmy a protokoly obvykle majú náskok pred vývojom nových obranných mechanizmov. Prelamovanie novo navhrnutých špecifikácií je prirodzenou súčasťou štandardizačného procesu. Pre zachovanie a vylepšenie bezpečnosti praktických aplikácií týchto algoritmov je nutné nepretržité úsilie a výskum. Existujúce útoky často bývajú úmyselne alebo neúmyselne ignorované a nepokladajú …moreAbstract:
Attacks on contemporary cryptographic algorithms and protocols are usually ahead of the development of new defenses. It is a natural part of a standardization process to break newly proposed specifications. Only by a continuing effort and scrutiny the security of practical applications of the algorithms can be preserved and improved. Existing attacks have a history of being deliberately or unintentionally …more
Language used: English
Date on which the thesis was submitted / produced: 6. 3. 2018
Identifier:
https://is.muni.cz/th/idjio/
Thesis defence
- Date of defence: 1. 6. 2018
- Reader: Prof. Chen-Mou Cheng, Graham Steel, PhD
Full text of thesis
Contents of on-line thesis archive
Published in Theses:- světu
Other ways of accessing the text
Institution archiving the thesis and making it accessible: Masarykova univerzita, Fakulta informatikyMasaryk University
Faculty of InformaticsAdvanced ('rigorózní řízení') programme / field:
Informatics / Information Technology Security
Theses on a related topic
-
Visualization of cryptographic protocols
Michael Koudela -
Analysis and Use of Standard Cryptographic Interfaces
Kristián Mika -
Analyzing use of cryptographic primitives by machine learning approaches
Adam Janovský -
Securing cryptographic implementations against advanced attackers
Ján Jančár -
Proposal of semiformal model of anonymity based cryptographic tasks and protocols and their analysis
Josef Šprojcar -
Verifikace kryptografických vlastností platebního protokolu
Peter Chriašteľ -
Randomness and cryptographic functions
Dušan Klinec -
Generátory pseudonáhodných čísel a jejich implementace v (kryptografických) knihovnách a kryptografických protokolech
Robert Šefr