National Repository of Grey Literature 6 records found  Search took 0.01 seconds. 
Lab exercise of the hidden camera and intercept.
Kočíř, Michal ; Pust, Radim (referee) ; Burda, Karel (advisor)
This thesis deals with design and build lab exercise of the hidden camera and intercept. The thesis describes the history of emission of safety, types of intelligence, intercept, camera and build their own laboratory experiments. The first chapter describes the history of the issue of safety. In the next chapter intelligence activities are focused on different types of intelligence. In Chapter interception mentioned the location, description and utilization, protection against eavesdropping and acoustic equipment GSM. Then the chapter describes the various camera parameters, location and detection. In other kapitel describes the concept of laboratory tasks. In the next chapter describes the design and build their own laboratory experiments. Then in the next chapter describes the design and build their own lab exercise. In this work are designed and assembled two lab exercise. The role of the laboratory deals with acoustical interception. The second deals with the role of the laboratory system of hidden cameras. The laboratory is the role of acoustic interception device used in radio memory analyzer MRA-3, with which you can find radio frequencies in the laboratory. In this lab exercise is also attached table of the laboratory spectrum. In the table are recorded audible radio frequencies to find in the lab. The table also recorded two intercept devices that we have attached the lab exercise. In the second lab exercise used hidden cameras are analogue devices video receiver, camera and video scanner XCS-99X. This role is focus tested the camera with attached zoom tools, which are accompanied by lab exercise. This target is gradually record in video receiver. The laboratory tested the role of distance function and image transmission between the camera and analog video receiver. Then tested the functionality of short smart noise generator SNG.
The use of smart-cards in modern cryptography
Kočíř, Michal ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This thesis discusses the general use of smart cards in MULTOS in cryptographic applications. At first is described two types of authentication - the authentication by the subject with focusing on authenticators and the authentication by the knowledge. Furthermore there is the description of the anonymous authentication and attribute authentization. This is followed by a description of smart cards with a focus on MULTOS cards. There is also performed analysis of programmable smart cards .NET, JavaCard and MULTOS. Practical part is focused on the implementation of an authentication scheme, which is being developed at FEEC. The communication of authentication protocol is between the MULTOS card and reader connected to a PC. The protocol is composed of cryptographic functions such as random number generation, hash function, modular exponentiation, modular multiplication and difference of large numbers. It was also implemented the measurement of specific applications.
Keeloq System Experiments
Kočíř, Michal ; Hajný, Jan (referee) ; Strašil, Ivo (advisor)
The bachelor thesis deals with security issues in wireless control. On this basis the laboratory task for experiments with Keeloq system is designed. The concept of laboratory task is justified and supplemented by processed documentation. In the first part of this thesis the principles of security and transfer of information for wireless technology are described. In the second part KeeLoq system is analysed. There are the principles of encoding and decoding of transmission of KeeLoq system telegrams described. KeeLoq 3 Development Kit of Microchip company is used for description of encoding and decoding. The next section deals with an attack on KeeLoq system by "brutal force", which is also demonstrated by generated code in programming language C. The third part provides the concept of laboratory tasks that includes introductory meditation, discussion on assigned elements, content and structure of laboratory task. Finally, the fourth part contains the documentation of lab experiments with KeeLoq system, whereby students work out laboratory task.
Keeloq System Experiments
Kočíř, Michal ; Hajný, Jan (referee) ; Strašil, Ivo (advisor)
The bachelor thesis deals with security issues in wireless control. On this basis the laboratory task for experiments with Keeloq system is designed. The concept of laboratory task is justified and supplemented by processed documentation. In the first part of this thesis the principles of security and transfer of information for wireless technology are described. In the second part KeeLoq system is analysed. There are the principles of encoding and decoding of transmission of KeeLoq system telegrams described. KeeLoq 3 Development Kit of Microchip company is used for description of encoding and decoding. The next section deals with an attack on KeeLoq system by "brutal force", which is also demonstrated by generated code in programming language C. The third part provides the concept of laboratory tasks that includes introductory meditation, discussion on assigned elements, content and structure of laboratory task. Finally, the fourth part contains the documentation of lab experiments with KeeLoq system, whereby students work out laboratory task.
Lab exercise of the hidden camera and intercept.
Kočíř, Michal ; Pust, Radim (referee) ; Burda, Karel (advisor)
This thesis deals with design and build lab exercise of the hidden camera and intercept. The thesis describes the history of emission of safety, types of intelligence, intercept, camera and build their own laboratory experiments. The first chapter describes the history of the issue of safety. In the next chapter intelligence activities are focused on different types of intelligence. In Chapter interception mentioned the location, description and utilization, protection against eavesdropping and acoustic equipment GSM. Then the chapter describes the various camera parameters, location and detection. In other kapitel describes the concept of laboratory tasks. In the next chapter describes the design and build their own laboratory experiments. Then in the next chapter describes the design and build their own lab exercise. In this work are designed and assembled two lab exercise. The role of the laboratory deals with acoustical interception. The second deals with the role of the laboratory system of hidden cameras. The laboratory is the role of acoustic interception device used in radio memory analyzer MRA-3, with which you can find radio frequencies in the laboratory. In this lab exercise is also attached table of the laboratory spectrum. In the table are recorded audible radio frequencies to find in the lab. The table also recorded two intercept devices that we have attached the lab exercise. In the second lab exercise used hidden cameras are analogue devices video receiver, camera and video scanner XCS-99X. This role is focus tested the camera with attached zoom tools, which are accompanied by lab exercise. This target is gradually record in video receiver. The laboratory tested the role of distance function and image transmission between the camera and analog video receiver. Then tested the functionality of short smart noise generator SNG.
The use of smart-cards in modern cryptography
Kočíř, Michal ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This thesis discusses the general use of smart cards in MULTOS in cryptographic applications. At first is described two types of authentication - the authentication by the subject with focusing on authenticators and the authentication by the knowledge. Furthermore there is the description of the anonymous authentication and attribute authentization. This is followed by a description of smart cards with a focus on MULTOS cards. There is also performed analysis of programmable smart cards .NET, JavaCard and MULTOS. Practical part is focused on the implementation of an authentication scheme, which is being developed at FEEC. The communication of authentication protocol is between the MULTOS card and reader connected to a PC. The protocol is composed of cryptographic functions such as random number generation, hash function, modular exponentiation, modular multiplication and difference of large numbers. It was also implemented the measurement of specific applications.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.