Analyzing use of cryptographic primitives by machine learning approaches – Mgr. Adam Janovský
Mgr. Adam Janovský
Advanced ('rigorózní') thesis
Analyzing use of cryptographic primitives by machine learning approaches
Analyzing use of cryptographic primitives by machine learning approaches
Abstract:
Systémy, které implementují kryptografická primitiva a protokoly jsou neustále zlepšovány v mnoha ohledech. Jsou konstruována nová kryptografická primitiva, která nahrazují stárnoucí a slabá primitiva. Rovněž i implementace systémů jsou často předmětem auditu nebo dokonce standardizace. I přesto je možné prohlásit, že kryptografická komunita mnohokrát selhala při snaze implementovat bezpečné systémy …moreAbstract:
Systems that employ cryptographic primitives and protocols are being improved continuously on a multitude of layers. Modern cryptographic primitives have been introduced that have been replacing the weak primitives. Also, the implementations of the systems get frequently audited or even standardized. Still, the security community has failed many times at implementing secure systems, often falling into …more
Language used: English
Date on which the thesis was submitted / produced: 3. 10. 2020
Identifier:
https://is.muni.cz/th/kvv26/
Thesis defence
- Date of defence: 27. 1. 2021
- Reader: prof. Riccardo Focardi, Dr. Fabrizio Biondi
Citation record
Full text of thesis
Contents of on-line thesis archive
Published in Theses:- světu
Other ways of accessing the text
Institution archiving the thesis and making it accessible: Masarykova univerzita, Fakulta informatikyMasaryk University
Faculty of InformaticsAdvanced ('rigorózní řízení') programme / field:
Computer systems, communication and security / Computer systems, communication and security
Theses on a related topic
-
Labeling of Android malware with help of cryptographic API usage
Dominik Macko -
Security analysis of passwords and keys managers
Matúš Dugáček -
Detection of Bitcoin keys from hierarchical wallets generated using BIP32 with weak seed
David Rajnoha -
Analysis of EC keys in the wild
Jan Kubeša -
Continuous monitoring of cryptographic libraries using biased RSA keys
Peter Sekan -
Examining RSA keys in selected real-world systems
Matúš Nemec -
The statistical properties of ECC keys generated from software libraries
Bathini Srinivas Goud -
The tool for origin library classification based on the biased bits of RSA keys
Peter Sekan