Safety and security is always a hot topic in the world of information security, but only a few solve how much cryptographic algorithms affect the performance of systems. Newer longer-key algorithms may provide more security, but it takes longer to encrypt data, that is, they may contain extra bits, which increases transfer time and uses more memory to store additional information. This bachelor thesis is focused on the analysis of the impact of the security requirements of the ANSI/ISA-62443 standard on the performance of industrial systems. Communication is simulated in which cryptographic algorithms AES and SHA were used. These simulations are carried out in the open source simulation tool TTool, which enables embedded systems, hardware a...
Nowadays the need of speed in cipher and decipher operations is more important than in the past. Thi...
The bachelor thesis deals with the measurement of cryptographic performance of ARM Cortex-A series m...
The main goal of the thesis was to study cyber security implementation in different software develop...
Bezpečnost a zabezpečení je vždy horkým tématem ve světě informační bezpečnosti, ale jen málokdo řeš...
Nowadays, information security management systems are important parts of managing a system for bette...
Bachelor thesis is dealing with a cipher standard AES and with a design of encryption and decryption...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
The design flow of a digital cryptographic device must take into account the evaluation of its secur...
This paper describes an overview of data security algorithms and its performance evaluation. AES, RC...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Cryptography is the study of mathematical techniques related to aspects of information security such...
Several encryption algorithms exist today for securing data in storage and transmission over network...
The main objective of this article is to implement a hardware-software prototype for sending and rec...
The goal of this thesis is to design a hardware realization of circuit which will implement the AES ...
This research evaluates complexity of proper security implementation in embedded devices that posses...
Nowadays the need of speed in cipher and decipher operations is more important than in the past. Thi...
The bachelor thesis deals with the measurement of cryptographic performance of ARM Cortex-A series m...
The main goal of the thesis was to study cyber security implementation in different software develop...
Bezpečnost a zabezpečení je vždy horkým tématem ve světě informační bezpečnosti, ale jen málokdo řeš...
Nowadays, information security management systems are important parts of managing a system for bette...
Bachelor thesis is dealing with a cipher standard AES and with a design of encryption and decryption...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
The design flow of a digital cryptographic device must take into account the evaluation of its secur...
This paper describes an overview of data security algorithms and its performance evaluation. AES, RC...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Cryptography is the study of mathematical techniques related to aspects of information security such...
Several encryption algorithms exist today for securing data in storage and transmission over network...
The main objective of this article is to implement a hardware-software prototype for sending and rec...
The goal of this thesis is to design a hardware realization of circuit which will implement the AES ...
This research evaluates complexity of proper security implementation in embedded devices that posses...
Nowadays the need of speed in cipher and decipher operations is more important than in the past. Thi...
The bachelor thesis deals with the measurement of cryptographic performance of ARM Cortex-A series m...
The main goal of the thesis was to study cyber security implementation in different software develop...