Publications & Downloads

This section gathers our research results from most recent projects. Both important publications and experimental implementations can be found here.

DateAuthorsTitleConference/JournalLink
2020/01/20MALINA, L.; RICCI, S.; DZURENDA, P.; SMÉKAL, D.; HAJNÝ, J.; GERLICH, T. Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms.Innovative Security Solutions for Information Technology and CommunicationsSpringer
2019/12/10MALINA, L.; SRIVASTAVA, G.; DZURENDA, P.; HAJNÝ, J.; RICCI, S.A Privacy-Enhancing Framework for Internet of Things Services.13th International Conference on Network and System SecuritySpringer
2019/09/17MALINA, L.; SRIVASTAVA, G.; DZURENDA, P.; HAJNÝ, J.; FUJDIAK, R. A Secure Publish/Subscribe Protocol for Internet of ThingsARES 2019ACM
2019/06/05HAJNÝ, J.; DZURENDA, P.; CAMENISCH, J.; DRIJVERS, MFast Keyed-Verification Anonymous Credentials on Standard Smart CardsIFIP Advances in Information and Communication TechnologySpringer
2018/10/15MARTINÁSEK, Z.; HAJNÝ, J.; SMÉKAL, D.; MALINA, L.; MATOUŠEK, D.; KEKELY, M.; MENTES, N.200 Gbps Hardware-Accelerated Encryption System for FPGA Network CardsACM CCS ASHESTBA
2018/08/01MALINA, L.; DZURENDA, P.; HAJNÝ, J.; MARTINÁSEK, Z.Secure and Efficient Two-factor Zero-knowledge Authentication Solution for Access Control SystemsCOMPUTERS & SECURITYElsevier
2018/08/01MALINA, L.; HAJNÝ, J.; DZURENDA, P.; RICCI, S.Lightweight Ring Signatures for Decentralized Privacy-preserving TransactionsSECRYPT 2018SCITEPRESS
2018/08/01HAJNÝ, J.; DZURENDA, P.; MALINA, L.; RICCI, S.Anonymous Data Collection Scheme from Short Group SignaturesSECRYPT 2018ScitePress
2018/07/29HAJNÝ, J.; DZURENDA, P.; MALINA, L.Multidevice Authentication with Strong Privacy ProtectionWIRELESS COMMUNICATIONS & MOBILE COMPUTINGWiley/Hindawi
2017/10/10DZURENDA, P.; RICCI SARA; HAJNÝ, J.; MALINA, L.Performance Analysis and Comparison of Different Elliptic Curves on Smart Cards15th International Conference on Privacy, Security and Trust (PST) 2017UniCalgary
2017/07/24DZURENDA, P.; HAJNÝ, J.; MALINA, L.; RICCI, S.Anonymous Credentials with Practical Revocation using Elliptic CurvesSECRYPT 2017ScitePress
2016/11/14MALINA, L.; HAJNÝ, J.; FUJDIAK, R.; HOŠEK, J. On Perspective of Security and Privacy- Preserving Solutions in the Internet of Things. Computer NetworksElsevier
2016/11/14MALINA, L.; HORVÁTH, T.; MÜNSTER, P.; HAJNÝ, J.Security Solution with Signal Propagation Measurement for Gigabit Passive Optical Networks. OPTIKElsevier
2016/11/14MALINA, L.; HAJNÝ, J.; MLÝNEK, P.; MACHÁČEK, J.; SVOBODA, R.Towards Efficient Application of Cryptographic Schemes on Constrained Microcontroller. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERSJCSC
2016/11/14HAJNÝ, J.; DZURENDA, P.; MALINA, L. Multi- Device Authentication using Wearables and IoT.SECRYPT 2016. Lisbon, PortugalTBA
2016/11/14MARTINÁSEK, Z.; ZEMAN, V.; MALINA, L.; MARTINÁSEK, J.k- Nearest Neighbors Algorithm in Profiling Power Analysis Attacks. RadioengineeringTBA
2016/10/24CAMENISCH, J.; DRIJVERS, M.; HAJNÝ, J.Scalable Revocation Scheme for Anonymous Credentials Based on n- times Unlinkable ProofsCCS WPES 2016, Vienna, ATTBA
2016/03/14OMETOV, A.; MAŠEK, P.; MALINA, L.; FLOREA, R.; HOŠEK, J.; ANDREEV, S.; HAJNÝ, J.; NIUTANEN, J.; KOUCHERYAVY, Y. Feasibility Characterization of Cryptographic Primitives for Constrained (Wearable) IoT DevicesIEEE International Conference on Pervasive Computing and Communications (PerCom). 2016, Sydney, AUTBA
2015/11/01HAJNÝ, J.; DZURENDA, P.; MALINA, L.Privacy-Enhanced Data Collection Scheme for Smart- MeteringINSCRYPT 2015, Beijing, ChinaSpringer
2015/10/30MALINA, L.; HAJNÝ, J.; ZEMAN, V.Light-weight group signatures with time- bound membershipSecurity and Communication NetworksWiley
2015/08/01HAJNÝ, J.; MALINA, L.; DZURENDA, P.Secure Physical Access Control with Strong Cryptographic ProtectionSECRYPT 2015. Colmar, FranceScitePress
2015/08/01MALINA, L.; MÜNSTER, P.; HAJNÝ, J.; HORVÁTH, T.Towards Secure Gigabit Passive Optical NetworksSECRYPT 2015. Colmar, FranceScitePress
2015/07/10HAJNÝ, J.; DZURENDA, P.; MALINA, L.Attribute- based credentials with cryptographic collusion prevention. Security and Communication NetworksWiley
2015/02/01MALINA, L.; HAJNÝ, J.; DZURENDA, P.; ZEMAN, V.Privacy- preserving security solution for cloud services.Journal of Applied Research and TechnologyJART
2014/11/14MALINA, L.; VIVES-GUASCH, A.; CASTELLA-ROCA, J.; VIEJO, A.; HAJNÝ, J. Efficient Group Signatures for Privacy- Preserving Vehicular NetworksTelecommunication SystemsSpringer
2014/11/03HAJNY, J.; DZURENDA, P.; MALINA, L.Privacy-PAC: Privacy-Enhanced Physical Access ControlCCS 2014, Scottsdale, USAACM
2014/08/27HAJNY, J.; MALINA, L.; TETHAL, O.Privacy-Friendly Access Control Based on Personal Attributes IWSEC 2014, Hirosaki, JapanSpringer
2013/11/27MARTINASEK, Z.; HAJNY, J.; MALINA, L.Optimization of Power Analysis Using Neural NetworkCARDIS 2013, Berlin, GermanySpringer
2013/10/21Malina, L., Clupek, V., Martinasek, Z., Hajny, J., Oguchi, K., Zeman, V.Evaluation of Software-Oriented Block Ciphers
on Smartphones.
In Foundations and Practice of Security, FPS 2013, La Rochelle, FranceSpringer
2013/09/12HAJNY, J.; MALINA, L.; MARTINASEK, Z.; TETHAL, O.Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-cards and Smart-phonesESORICS DPM 2013, Egham, UKSpringer
2013/08/31MALINA, L.; HAJNY, J.Privacy-preserving framework for geosocial applicationsSecurity and Communication NetworksWiley
2013/08/30MALINA, L.; HAJNY, J.Efficient modular multiplication for programmable smart-cardsTelecommunication SystemsSpringer
2013/07/30MALINA, L.; HAJNY, J.; MARTINASEK, ZEfficient Group Signatures with Verifier- local Revocation Employing a Natural Expiration.Secrypt 2013, Reykjavik, IcelandTo be added
2013/07/30HAJNY, J.; MALINA, L.; MARTINASEK, Z.; ZEMAN, V.Privacy-preserving SVANETsSecrypt 2013, Reykjavik, IcelandSCITEPRESS
2012/12/11HAJNY, J.; MALINA, L.Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-CardsCARDIS 2012, Graz, AustriaSpringer
2012/10/02HAJNY, J.; MALINA, L.Anonymous Credentials with Practical RevocationSecurity and Privacy Special Track at the IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL)IEEE
2012/10/25MALINA, L.; CASTELLA-ROCA, J.; VIVES-GUASCH, A.; HAJNY, J.Short-term Linkable Group Signatures with Categorized Batch VerificationThe Foundations & Practice of Security (FPS) Symposium 2012, Montreal, CanadaSpringer
2012/10/21MALINA, L.; HAJNY, J.; ZEMAN, V.Group Signatures for Secure and Privacy Preserving Vehicular Ad Hoc NetworksThe 8th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Paphos, CyprusACM
2012/09/03HAJNY, J.; MALINA, L.Practical Revocable Anonymous Credentials13th Joint IFIP TC6 and TC11 Conference on
Communications and Multimedia Security - CMS 2012, Canterbury, UK
Springer
2011/18/18MALINA, L.; HAJNY, J.Accelerated Modular Arithmetic for Low- Performance Devices34th International Conference on Telecommunications and Signal Processing, Budapest, HungaryIEEE
2011/07/18HAJNY, J.; MALINA, L.; ZEMAN, V.Practical Anonymous Authentication: Designing Anonymous Authentication for Everyday UseSecrypt 2011, Seville, SpainDBLP
2011/07/12HAJNY, J.; ZEMAN, V.Anonymous Authentication with Spread RevelationCryptologiaTaylor & Francis

Software List


Software: Modular Arithmetic Library for .NET Cards

Authors

Ing. Lukas Malina (malina@feec.vutbr.cz)
Ing. Jan Hajny (hajny@feec.vutbr.cz)

Download

It is possible to download the software (limited version) here.

Read more

Publication to be cited

MALINA, L.; HAJNY, J. Accelerated Modular Arithmetic for Low-Performance Devices. In 34th International Conference on Telecommunications and Signal Processing (TSP 2011). 2011 s. 1-5. ISBN: 978-1-4577-1409-2.

Project

The software (Modular Arithmetic Library for .NET Cards) was sponsored by the Technology Agency of the Czech Republic (project TA02011260).

Description

The implemented Modular Arithmetic Library provides  basic mathematical operations such as addition, subtraction, multiplication, and exponentiation of large integers (from 0 to 1024 bits -limited version, to 2048 bits –full version) on the .NET Smart Cards. The library brings the missing arithmetic operations with large integers onto the .NET Smart Card platform that allows to build own algorithms which require modular arithmetic. The examples of such algorithms are advanced cryptographic schemes, anonymous authentication systems, etc.  Also, the library includes an efficient algorithm for multiplication of large integers. The library (full version) uses advanced algorithms to achieve efficient multiplication of numbers in the range 0 to 2048 bitlength, see results in the related citation.

The graphical user interface (developed in C#/.NET 3.5) is used for testing and verification of implemented operations. You can test the time-performance of individual operations that are calculated by the library on a smart card using the implemented modular arithmetic algorithms. These methods within the library have a public access modifier, so the methods may be used by other applications.

In the package, you can find a test application with graphical user interface (Program.exe), and the compiled library implementation with modular arithmetic (Server.exe) which is ready to be imported on a smart card. For more detailed instructions about installation and operation see the Read Me document inside in zip file.

If you are interested in more info, please contact authors.

License

This software is licensed as closed source software under exclusive legal right of the copyright holder. The software is free for personal use only. For more information about the license, please contact:

Technology Transfer Office Brno University of Technology

E-mail: info@tt.vutbr.cz
http://www.vutbr.cz/utt

Read less


Software: Experimental Implementation of Modular Arithmetic Operations on the MultOS Smart Cards

Authors

Ing. Lukas Malina (malina@feec.vutbr.cz)
Ing. Jan Hajny (hajny@feec.vutbr.cz)

Download

It is possible to download the software here.

Read more


Project

The software was sponsored by the Technology Agency of the Czech Republic (project TA02011260).

Description

This software consists of the main application with a graphical user interface and a test implementation of modular arithmetic operations running on MultOS cards. The test implementation is developed in C language, limited to the platform MultOS.

The main program (developed in Java) provides a user interface for communication with the chip cards, MultOS or JAVA. The aim is to provide middleware which ensures the communication between the card reader and chip card. The user can put data directly into the graphical user interface and display the results processed on the card. The main program is used as a handler for calling the methods of application that is imported on the Multos smart card. Either contact or non-contact smart cards are supported.

The application also offers testing of modular arithmetic operations on chosen MultOS cards. These operations running on the card are measured and the results are used as reference points for the further optimization of these operations run on the MultOS smart cards.

In this software package, you can find the main application with a graphical user interface (dir: dist Multos_M.jar) and two compiled test implementations in two versions for contact cards (dir: CARDC0) and non-contact cards (dir: CARDCL). The test implementation of attribute authentication is marked aa719. The test implementation of modular arithmetic is marked ma719. alu.

For both test implementations, individual certificates for loading (*.ALR) and deleting (*.ADR) are attached to the contact and non-contact card MultOS versions. To import a test implementation (alu), we recommend to download the freely available utility Mutil (http://www.multos.com/developer_centre/tools_and_sdk/), where you can import the  *.alu  along with the certificate *.ALR using the “load live”. For more detailed instructions about installation and operation, see document Read Me inside in zip file.

If you are interested in more info, please contact authors.

License

This software is licensed as closed source software under exclusive legal right of the copyright holder. The software is free for personal use only. For more information about the license, please contact:

Technology Transfer Office
Brno University of Technology

E-mail: info@tt.vutbr.cz
http://www.vutbr.cz/utt

Read less


Software: Secured Client – Server Messenger with Scalable Authentication

Authors

Ing. Lukas Malina (malina@feec.vutbr.cz)
Ing. Zdenek Martinasek (martinasek@feec.vutbr.cz)

Read more


Project

The software was sponsored by the project FR-TI4/647.

Description

This
software provides the secure client-server transmission of messages,
the scalable authentication of entities (a client and a server), a
secret key establishment and the variable encryption of transmitted
data. The software is developed in JAVA and consists of two applications
with graphical user interfaces. The application Client represents a
client device (a remote PC, an external adapter, etc.) which is securely
connected to an integration server. Client can securely communicate
through the TCP / IP protocol. The application Server represents the
integration server that authenticates clients, collects income messages
and sends response messages. The software supports three protocols of
authentication: the light version (a HOTP method), the medium version (a
HOPT method and a key exchange via using asymmetric cryptography) and
the robust version (certificates and a key exchange via using asymmetric
cryptography).


If you are interested in more info, please contact authors.

License

This software is used by TTC Telekomunikace s. r. o. as the result of
research project FR-TI4/647. For more information about the license,
please contact:

Technology Transfer Office
Brno University of Technology

E-mail: info@tt.vutbr.cz
http://www.vutbr.cz/utt

Read less


Software: Attribute Authentication Verifier for Smartphones

Authors

Ing. Lukas Malina (malina@feec.vutbr.cz)
Ing. Jan Hajny (hajny@feec.vutbr.cz)

Download

It is possible to download the software (version 0.9) here.

Read more

Publication to be cited

[1]
HAJNY, J.; MALINA, L. Unlinkable Attribute-Based Credentials with
Practical Revocation on Smart- Cards. In Smart Card Research and
Advanced Applications. Lecture Notes in Computer Science. LNCS. Berlin:
Springer- Verlag, 2013. pp. 62-76. ISBN: 978-3-642-37287- 2. ISSN: 0302-
9743.

Project

The software was sponsored by the project FEKT-S-11-15.

Description

This
software consists of two applications, the Verifier and the Client. The
Verifier is the main application with a graphical user interface. The
software serves especially as a tool for a verifier entity in the
attribute authentication system [1]. The verifier can verify personal
attributes that serve as client’s authentication tokens to access a
service. Basic principle is depicted in Figure 1. Attribute
authentication systems allow the verification of individual clients
without any loss of their personal information. The full description of
the system and the proposed cryptographic scheme can be found in our
publication [1]. The software also contains the client application with a
graphical user interface developed on the Android platform.


Figure 1. Use-case example of attribute authentication system.

The
verifier application provides three communication interfaces for the
authentication of clients. The communication interfaces are NFC
peer-to-peer communication, QR codes scanning and smart cards scanning
via NFC. The first communication interface provides the peer-to-peer
transmission of authentication attributes from the client to the
verifier via short NFC messages. This transmission is possible only if
the client uses a smartphone with a NFC module. NFC connection works
only for small distances (< 4 cm). The second interface allows a data
transmission using QR codes. This transmission is suitable for cases
where the client does not have a smartphone with NFC. The successful
transfer of QR codes depends on the quality of a camera (resolution,
zooming, …), and a good visibility between the camera and the display
with the QR code. The third communication interface scans chip cards
(smartcards) via NFC module.

If you are interested in more info, please contact authors.

License

In case of interest in these applications, please contact authors.
This software is licensed as closed source software under exclusive
legal right of the copyright holder. The software is free for personal
use only. For more information about the license, please contact:

Technology Transfer Office
Brno University of Technology

E-mail: info@tt.vutbr.cz
http://www.vutbr.cz/utt

Read less


Software: Attribute Authentication Client for iOS

Authors

Ing. Jan Hajny (hajny@feec.vutbr.cz)
Ing. Lukas Malina (malina@feec.vutbr.cz)

Download

It is possible to download the software (version 0.9) here.

Read more

Publication to be cited

[1] HAJNY, J.; MALINA, L. Unlinkable Attribute-Based Credentials with Practical Revocation on Smart- Cards. In Smart Card Research and Advanced Applications. Lecture Notes in Computer Science. LNCS. Berlin: Springer- Verlag, 2013. pp. 62-76. ISBN: 978-3-642-37287- 2. ISSN: 0302-9743.

Project

The software was sponsored by the project FEKT-S-11-15.

Description

The package contains the complete Xcode project of a client app that allows users to be anonymously verified as valid attribute holders. The app generates a QR code with necessary cryptographic values. The code is scanned and checked by the Verifier’s app.

If you are interested in more info, please contact authors.

License

The software is free for personal use only. For more information about the license, please contact:

Technology Transfer Office
Brno University of Technology

E-mail: info@tt.vutbr.cz
http://www.vutbr.cz/utt

Read less


Software: DPA Contest v4 Attack

Authors

Ing. Zdeněk Martinásek, Ph.D. (martinasek@feec.vutbr.cz)
Ing. Ondřej Zapletal (xzaple26@stud.feec.vutbr.cz)
Ing. Lukáš Malina, Ph.D. (malina@feec.vutbr.cz)

Download

It is possible to download the software here.

Read more

Publication to be cited

[1]
MARTINÁSEK, Z.; HAJNÝ, J.; MALINA, L. Optimization of Power Analysis
Using Neural Network. In Smart Card Research and Advanced Applications,
Lecture Notes in Computer Science. Springer, 2014. s. 94-107. ISBN:
978-3-319-08302- 5.

Project

The software
(DPA_Contest_attack) was sponsored by the Ministry of Industry and Trade
of the Czech Republic (project FR-TI4/647).

Description

This
program realizes a power analysis attack for the DPA contest v4
(http://www.dpacontest.org/v4/index.php). Target implementation is a
masked AES-256 implemented in software on an Atmel ATMega-163 smart
card. This implementation is called AES-256 RSM (Rotating Sbox Masking).
Our implementation of the attack consists of two basic steps (see
Fig.1). In the first step, the secret offset of AES RSM is revealed by
MLP (Multi-Layer Perceptron) trained from power traces. In the second
step, the classical differential power analysis (DPA) based on a
correlation coefficient reveals a secret key stored in a cryptographic
device. A target intermediate value during DPA is the output of the
SubBytes function in the first round. The attack requires about 20 power
traces to obtain the secret key.


In
the zip package, you can find an executable console application
(DPA_Contest_attack.exe), source m-files (one for linux and one for
windows) and an installation package. For more detailed instructions
about the installation and running of this program see the ReadMe.txt
document inside in the zip file.

If you are interested in more info, please contact authors.

License

This
software is licensed as the closed source software under the exclusive
legal right of the copyright holder. The software is free for personal
use only. For more information about the license, please contact:

Technology Transfer Office
Brno University of Technology

E-mail: info@tt.vutbr.cz
http://www.vutbr.cz/utt

Read less


Software: Group Signatures Library

Authors

Ing. Jan Hajny (hajny@feec.vutbr.cz)
Ing. Lukas Malina (malina@feec.vutbr.cz)
Ing. Petr Dzurenda
Martin Jaros
Lukas Pohanka

Download

It is possible to download the library (limited version) here.

Read more

Publication to be cited

[1]
HAJNÝ, J.; DZURENDA, P.; MALINA, L. Privacy-Enhanced Data Collection
Scheme for Smart-Metering. In Proceedings of the International
Conference on Information Security and Cryptology. Lecture Notes in
Computer Science. 2015. p. 1-18. ISSN: 0302-9743.

Project

The software was sponsored by the Technology Agency of the Czech Republic (project TA03010818).

Description

The
software library (libGS) written in the C language enables the
calculation of the group signature and its verification (demo version).
Group signatures ensure data security, nonrepudation and also protects
the privacy of signers. The library is suitable for use on both sides
the client (the device) and the server side. The public API of the full
version provides the following functionality: the assignment of system
parameters of the defined values, generating client and server parts of
the private key (the key has 2 parts), the generation and validation of
group signatures and generating the revocation token.

If you are interested in more info, please contact the main author (hajny@feec.vutbr.cz).

License

The software is free for personal use only. For more information about the license, please contact:

Technology Transfer Office
Brno University of Technology

E-mail: info@tt.vutbr.cz
http://www.vutbr.cz/utt

Read less


Software for authentication module using the protected storage IKE_PSK_SAM_v1

Authors

Ing. Lukáš Malina, Ph.D. (malina@feec.vutbr.cz)
Ing. Zdeněk Martinásek, Ph.D. (martinasek@feec.vutbr.cz)

Download

It is possible to download the demo version here.

Read more

Publication to be cited

TBA

Project

The software (IKE_PSK_SAM_v1) was sponsored by the Ministry of the Interior of the Czech Republic (project VI20162018036).

Description

The
main features of the software is to verify the authenticity of the data
by using a pre-shared secret key on a smart card programmable and
provide the calculation of the encryption keys for the IPSec protocol.
Smart card hosts critical operations and secret parameters. These
operations are performed in this secure storage. The JAVA application
Card Handler (PC) is created in order to establish APDU communication
with a smart card via a USB interface-based reader. The application
presents the graphical user interface for the applet on a smart card.

In
the zip package, you can find an executable GUI JAVA application
(Java_Card_Handler.exe) and java card applet (for java card with JCAPI
2.2.2 or newer). For more detailed instructions about the installation
and running of this program see the ReadMe.txt document inside in the
zip file.

If you are interested in more info, please contact authors.

License

This
software is licensed as the closed source software under the exclusive
legal right of the copyright holder. The software is free for personal
use only. For more information about the license, please contact:

Technology Transfer Office
Brno University of Technology

E-mail: info@tt.vutbr.cz
http://www.vutbr.cz/utt

Read less


Software: libABC

Authors

Ing. Petr Dzurenda (dzurenda@feec.vutbr.cz)
doc. Ing. Jan Hajný, Ph.D. (hajny@feec.vutbr.cz)

Download

It is possible to download the software here.

Read more

Project

The software was sponsored by the project GACR GP14-25298P

Description

This
software implements group signatures HM12, Schnorr Signature, Weak-BS
signature and efficient proof of knowledge of Weak-BS signature. The
software allows benchmarking of these signatures. For more info read the
manual.

If you are interested in more info, please contact authors.

License

For more information about the license, please contact:

Technology Transfer Office
Brno University of Technology

E-mail: info@tt.vutbr.cz
http://www.vutbr.cz/utt

Read less


Software: Android mobile application for access control system

Authors

Ing. Petr Dzurenda (dzurenda@feec.vutbr.cz)
doc. Ing. Jan Hajný, Ph.D. (hajny@feec.vutbr.cz)

Download

To get the software, please contact IMA, s.r.o.

Read more

Project

The software was sponsored by the project TAČR TA04010476.

Description

This software implements user authentication protocols for access control systems using a mobile phone.

If you are interested in more info, please contact authors.

License

For more information about the license, please contact:

Technology Transfer Office
Brno University of Technology

E-mail: info@tt.vutbr.cz
http://www.vutbr.cz/utt

Read less


Software: Smart Card Based Authentication Software

Authors

Ing. Lukáš Malina, Ph.D. (malina@feec.vutbr.cz),
Ing. Petr Dzurenda (dzurenda@feec.vutbr.cz),
Ing. David Smékal (smekal@phd.feec.vutbr.cz),
Ing. Jakub Konečný (xkonec58@stud.feec.vutbr.cz),
Ing. Švehlák Milan (milansvehlak@gmail.com),
Doc. Ing. Jan Hajný, Ph.D. (hajny@feec.vutbr.cz),
prof. Ing. Kamil Vrba, CSc. (vrbak@feec.vutbr.cz)

Download

To get the free demo version for non-commercial purposes, please contact the corresponding author (Lukas Malina, email: malina@feec.vutbr.cz).
To get the full version for commercial purposes, please contact the corresponding author (Lukas Malina, email: malina@feec.vutbr.cz).

Read more

Project

This software was financed by the Ministry of Interior under grant VI20162018003.

Description

The
software “Smart Card Based Authentication Software” implements an
advanced authentication protocol for access control systems based on
smart card platforms (Basic Cards and MultOS Cards). The authentication
protocol is based on a zero-knowledge protocol and provides strong
security level (NIST 2016-2030 and beyond). The protocol on the cards
provides 8 security versions including ECC versions (ECC up to 512b).
The user with smart cards with installed card applications can be
verified via USB card readers by the JAVA Smart card handler application
that run on PC.
On this site, we present a description of software
that contains runnable JAVA application providing basic graphical user
interface (see a figure below) and two compiled Multos card application
(version ECC 256) for developer Multos cards. The full version is
protected under a license and is available on demand (please use the
contact email). The full version contains runnable JAVA application,
compiled Multos card applications for all versions and Basic card
application supporting all protocol versions (1024, 2048, 3072, ECC192,
ECC 224, ECC 256, ECC 384, ECC 512). For further information about card
compatibilities and GUI please read read-me files inside the SW package.
The main parts of SW package are:
– GUI JAVA application: Smart card handler application – Manager
– Basic Card application (all versions in one app) *only in full version
– Multos Card applications (two apps for v3072 and other versions)
o mvcr-ima-2017-USER-v3072.alu
o mvcr-ima-2017-USER.alu
– read me files and supported SW for upload app on the Multos Cards

If you are interested, please contact the correspond author: Lukas Malina (malina@feec.vutbr.cz).


License

For more information about the license, please contact:

Technology Transfer Office
Brno University of Technology

E-mail: info@tt.vutbr.cz
http://www.vutbr.cz/utt

Read less


Secure Access Module Based Authentication – Verifier Software

Authors

Ing. Lukáš Malina, Ph.D. (malina@feec.vutbr.cz),
Ing. Petr Dzurenda (dzurenda@feec.vutbr.cz),
Ing. Pavel Kristof (pavel.kristof@ima.cz),
Ing. Vlastimil Beneš (vlastimil.benes@ima.cz),
Ing. Jakub Frolka (frolka@feec.vutbr.cz),
Ing. Tomáš Lieskovan (xliesk00@stud.feec.vutbr.cz),
prof. Ing. Kamil Vrba, CSc. (vrbak@feec.vutbr.cz)

Download

To get the free demo version for non-commercial purposes, please contact the corresponding author (Lukas Malina, email: malina@feec.vutbr.cz).
To get the full version for commercial purposes, please contact the corresponding author (Lukas Malina, email: malina@feec.vutbr.cz).

Read more

Project

This software was financed by the Ministry of Interior under grant VI20162018003.

Description

The
software “Secure Access Module Based Authentication – Verifier
Software” implements an advanced authentication protocol for access
control systems that use smart cards on the user and verifier sides. The
software provides mainly the application for SAM that runs on the
verifier side and provides the necessary functionality to authenticate
users with smart cards (Basic Cards and MultOS Cards). The implemented
authentication protocol is based on the zero knowledge protocol and
provides a strong level of security (NIST 2016-2030 and beyond). The
protocol in SAM contains 8 versions for different security levels,
including ECC versions (ECC to 512b). The verifier uses the SAM module
on which the created application for the contact chip cards runs, and
through a graphical user interface application, it can authenticate a
user with a smart card. The authentication JAVA application uses the
available USB card readers and provides communication and graphical
presentation of the results during the authentication process.
On
this site, we publish a description of software that contains runnable
JAVA application – SAM Verifier providing basic graphical user interface
(see a figure below), one compiled SAM application for Multos Cards and
two testing compiled Multos card applications for user side with
developer Multos cards. The full version is protected under a license
and is available on demand (please use the contact email). The full
version contains runnable JAVA application – SAM Verifier, compiled SAM
Multos card applications for all versions and SAM Basic card application
supporting all protocol versions (1024, 2048, 3072, ECC192, ECC 224,
ECC 256, ECC 384, ECC 512) and testing user smart card applications
(Multos and Basic). For further information about card compatibilities
and GUI please read read-me files inside the SW package.
The main parts (5 apps + readme) of SW package are:
– GUI JAVA application: SAM handler application – Verifier
– SAM Basic Card application (all versions in one app) *only in full version
– SAM Multos Card applications (two apps for v3072 and other versions)
o mvcr-ima-2017-SAM-v256.alu
o mvcr-ima-2017-SAM.alu*only in full version
– Basic Card application for a user (all versions in one app) *only in full version
– Multos Card applications for a user (two apps for v3072 and other versions)
o mvcr-ima-2017-USER-v3072.alu
o mvcr-ima-2017-USER.alu
– read me files and supported SW for upload app on the Multos Cards

If you are interested, please contact the correspond author: Lukas Malina (malina@feec.vutbr.cz).


License

For more information about the license, please contact:

Technology Transfer Office
Brno University of Technology

E-mail: info@tt.vutbr.cz
http://www.vutbr.cz/utt

Read less


Symmetric encryption on the FPGA card

Authors

Ing. David Smékal (smekal@phd.feec.vutbr.cz)
Ing. Zdeněk Martinásek, Ph.D. (martinasek@feec.vutbr.cz)
Ing. Lukáš Malina, Ph.D. (malina@feec.vutbr.cz)
doc. Ing. Jan Hajný, Ph.D. (hajny@feec.vutbr.cz)
prof. Ing. Kamil Vrba, CSc. (vrbak@feec.vutbr.cz)
Ing. Denis Matoušek (matousek@netcope.com)

Download

To get the software, please contact Netcope Technologies, a.s. (info@netcope.com).

Read more

Project

This software was financed by the Ministry of Interior under grant VI20162018036.

Description

The
software implements the AES (Advanced Encryption Standard) algorithm
for FPGAs (Field Programmable Gate Array) in the VHDL (Hardware
Description Language) programming language. The software contains of the
cryptographic core of the AES algorithm using a 128-bit key in GCM mode
(Galois/Counter Mode). This implementation is based on the 4 duplicated
encryption cores and employs pipelined processing in order to achieve
full 100 Gbps encryption speed. The design is implemented and verified
on the acceleration card NFB-100G2Q.

If you are interested, please contact the correspond author: Zdeněk Martinásek (martinasek@feec.vutbr.cz).

License

For more information about the license, please contact:

To get the software, please contact Netcope Technologies, a.s. (info@netcope.com).

Read less