National Repository of Grey Literature 44 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Comparing Groups of Public-Key Ciphers
Lukáš, Martin ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
In this thesis, I introduce several groups of public-key algorithms, the groups being factori-zation problem, discrete logarithm problem, and other problems. I choose one representa-tive algorithm from each group and describe it in-depth, also mentioning certain aspects used in real world implementations and most important attacks. other problems. The objec-tives of this thesis are to compare these groups as well as algorithms in them according to their operational speed, key lengths and resistance against quantum cryptanalysis.
Lightweight Cryptography
Šalda, Jakub ; Palovský, Radomír (advisor) ; Ivánek, Jiří (referee)
In the bachelor thesis Lightweight cryptography I describe the basics of light cryptography, analyze and compare selected lightweight symmetric ciphers. Lightweight is about trade-off between low-cost, security and performace. There are many lightweight ciphers designes, therefore I chose nad explored some of those from the point of view of their features, hardware implementation, performance and security. Analyzed ciphers are in total of fifteen and include E0, A5/1, GRAIN, Trivium, LED, SKINNY, RECTANGLE, SPARX, mCrypton, PRESENT, SIMON and SPECK, XTEA, SEA, LBlock and CLEFIA. I have come to the conclusion that the stream cipher GRAIN is very fast and safe. Block ciphers LED and SKINNY are well secured and SIMON and PRESENT hardware-efficient. With the increased use of constrained devices, it is also necessary to keep up with security, so lightweight cryptography could have a great future ahead.
Security features of Android operating system and custom ROMs.
David, Adam ; Palovský, Radomír (advisor) ; Pavlíček, Luboš (referee)
Primary goal of this work is to analyze the Android operation system and its security. Thesis is divided in three parts: in the first one I will briefly describe the operation system and its development, in the second part I will analyze Androids security model and last part focuses on features of alternative ROMs, repositories and applications with emphasis on security and privacy. Despite Androids availability for plethora of various devices this thesis will focus on mobile phones.
On possible approaches to detecting robotic activity of botnets
Prajer, Richard ; Palovský, Radomír (advisor) ; Pavlíček, Luboš (referee)
This thesis explores possible approaches to detecting robotic activity of botnets on network. Initially, the detection based on full packet analysis in consideration of DNS, HTTP and IRC communication, is described. However, this detection is found inapplicable for technical and ethical reasons. Then it focuses on the analysis based on network flow metadata, compiling them to be processable in machine learning. It creates detection models using different machine learning methods, to compare them with each other. Bayes net method is found to be acceptable for detecting robotic activity of botnets. The Bayesian model is only able to identify the botnet that already executes the commands sent by its C&C server. "Sleeping" botnets are not reliably detectable by this model.
Socio-technical attacks
Urbanová, Anna ; Pavlíček, Luboš (advisor) ; Palovský, Radomír (referee)
The main objective of this work is to identify how students from the University of Economics, in Prague, looks at their results in two different socio-technical surveys. First, survey no. 1, focuses on the security of password and the second survey, no. 2, looks at how phishing e-mails are detected. In both cases to obtain the results of the surveys, questionnaires were used. After the surveys were completed, we promised that we would inform the students of their results from their questionnaires. The whole thesis is divided into six chapters. The first four chapters are based on theoretical information about social engineering. The last two chapters contain the practical part of the thesis, survey no. 1 and 2. The main benefits of this thesis are the results from the two surveys, which focused on the way that social engineering is attacked. Each survey was completed with the help of questionnaires and highlight the potential risks that social engineering poses to society.
Quantum computers and their impact on public-key cryptography
Lushnikova, Marina ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
The aim of this thesis is to study quantum computers and their impact on public-key cryptography. Crucial part of the work is dedicated to theoretical basis and definitions necessary for understanding the basic principles of quantum computers. The further chapters describe Shor's algorithm, explain the part of integer factoring problem in the security of current public key cryptographic algorithms, and show how to break the most widely used assymetric algorithm RSA by means of effective factoring. Last chapter provides comparison of classical factoring algorithms with Shors algorithm, mentions cryptography resistant to quantum computer attacks and discusses the current state of development in the field of qunatum computing. The conclusion summarizes both potential and real impact of quantum computers on public-key cryptography.
Uplatnění fraktálů v kompresi dat
Dušák, Petr ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
The mission of the Technology Transfer Programme Office is to increase impact on a society by transferring technologies developed by the European Space Agency. Method and Apparatus for compressing time series is a patented compression algorithm designed to be efficient as its purpose is to run on deep space probes or satellites. The algorithm is inspired by a method for fractal terrain generation, namely the midpoint displacement algorithm. This work introduces fractals, their application and modifying the patented algorithm, in order to achieve greater compression. The modification lies in modifying the displacement mechanism. The modified algorithm is capable of reducing data up to 25 %, compared to the patented algorithm. The modification made the algorithm less efficient. In large-scale test, performed on Rosetta spacecraft telemetry, the modified algorithm achieved around 5 % higher compression.
Platform independent application interface based on REST architecture.
Herma, Tomáš ; Palovský, Radomír (advisor) ; David, Petr (referee)
This Diploma thesis deals with creation of web application, REST API, SDK for Android and iPhone platform and example application for these two platforms. The first part of work analyses the current application interfaces. The second part describes the selected technologies and implementation.
Biometric systems - possibilities and dangers
Petržilka, Jakub ; Sklenák, Vilém (advisor) ; Palovský, Radomír (referee)
This bachelor thesis is focused on biometric methods, particularly on fingerprint recognition. First part of thesis places biometric into other methods of people's identification. Identification by token and by knowledge. It also describes the beginning and evolution of biometric. The theoretical part also closely clarify working with data and different view on the biometric systems. The following part of the thesis defines the basic principles of using biometric systems, counting FAR and FRR indicators and weaknesses of biometric. Practical part is divided into two sections. First part contains process how to fool biometric systems, which are based on fingerprint scanning. The main objectives were to find out level of trust in biometric systems and research of the biometric market. Objectives were achieved through a self-questionnaire survey. Final part predicts probable future biometric development.
Building and use of small computer networks
Fišer, Marek ; Pinkas, Otakar (advisor) ; Palovský, Radomír (referee)
The main objective of the thesis is description of the intermediation of internet services by the use of microwave transmission technology. The thesis is divided in three parts. The first part is dedicated to a theoretical description of metallic and wireless networks. The second part focuses on the problematic of microwave transmission. The third, the main part, is dedicated to the description of a specific solution. In this part is metioned the pratical experience, which was gained by the implementation of the solution in to the practice.

National Repository of Grey Literature : 44 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.