Národní úložiště šedé literatury Nalezeno 41 záznamů.  předchozí11 - 20dalšíkonec  přejít na záznam: Hledání trvalo 0.02 vteřin. 
Application for monitoring of Linux servers
Kačmarčík, Martin ; Ricci, Sara (oponent) ; Komosný, Dan (vedoucí práce)
PlanetLab Server Manager is an application helping users to develop distributed network projects using the PlanetLab network. It gives an ability to search for a server by its geographical position and access these servers. It offers functionality to render servers on world map. This thesis covers details of the PlanetLab network and its infrastructure. It describes PlanetLab Server Manager (also known as plbmng) and identifies its problems in the current version. The thesis aims to address these problems and describes all the improvements made to the application. Finally, it analyzes the overall status of PlanetLab network using the newly developed tools for status monitoring. To help enable the network projects even further, this Master thesis aims to improve the current application by re-writing it fully into Python 3 language. As the current application is implemented in Bash reimplementation requires complete re-design and re-implementation of functions and will allow to fully utilize perks of Python 3 language. Thesis also aims to extend existing functionality by adding support for filtering servers by their operational status and other small improvements. Application source code is available on GitHUB under the MIT license and the application is available in the PyPI repository as well.
Cryptography on Programmable Smart Cards
Wikarská, Dagmar ; Ricci, Sara (oponent) ; Hajný, Jan (vedoucí práce)
This thesis explores the topic of cryptography schemes using anonymous credentials and revocation. It uses smart cards as anonymous authentication devices with blacklist revocation. Final output of this work is an implementation of a revocation scheme CDH16 on MultOS platform. Secure authentication devices used in banking, transportation, or building access, en- hances anonymity of the user. Implemented protocols could be used as such tools, pre- venting verifier from knowing irrelevant private information. Added revocation scheme protects from misuse of revoked cards by using blacklisting. Blacklisted cards are blocked and verification fails. This requires update of all verifiers blacklist each epoch.
Web application for Cybersecurity Job Ads Analysis
Turek, Adam ; Sikora, Marek (oponent) ; Ricci, Sara (vedoucí práce)
The bachelor’s thesis aims to create an interactive global map showing a database of job advertisements in a web application and perform filtering according to various parameters, where machine learning analysis is then performed. The map also shows the number of job advertisements by country. The web application is created using the ReactJS JavaScript library associated with LeafletJS, which provides the main functionality. The machine learning and script change parts are implemented using Python’s programming language. The thesis describes the theoretical part and implementation of individual map functions and deals with the description and successful modification of scripts to perform machine learning.
Amplifying Cyber Threat Intelligence Analysis with Honeypots
Janout, Vladimír ; Gerlich, Tomáš (oponent) ; Ricci, Sara (vedoucí práce)
This thesis aims to research honeypots as a source of data for cyber threat intelligence analysis. To conduct this, a honeypot instance is configured and exposed to the internet in the cloud for a specified period. In the next part, a Python tool for querying three threat intelligence feeds is proposed. This tool serves for indicator enrichment. The utility of the tool is demonstrated in practice by enabling the analysis of indicators observed on the honeypot infrastructure. The last part of the work discusses the results and trends in the attacker’s behaviour based on the collected and processed data. In a case study, the focus is given to a single SSH session of interest and the acquired knowledge from it is mapped to the MITRE ATT&CK framework revealing attackers tactics, techniques and procedures.
Cloud computing
Bräuer, Jonáš ; Dzurenda, Petr (oponent) ; Ricci, Sara (vedoucí práce)
Security and privacy preservation of data stored on public cloud platforms is a widely addressed topic nowadays. In this thesis we explore the possible use of data splitting technique as opposed to more traditional encryption of sensitive data. Goal of this thesis is to implement and compare two already proposed protocols for matrix product computation, that use two different data splitting approaches. In addition, from these two protocols, working in non-colluding scenario, an original variant was proposed, adding colluding scenario compliance. All three protocols have been implemented using Java platform and real public cloud providers, and both performance and storage requirements have been measured.
Web-based application for cryptographic protocols visualization
Ryšavá, Pavla ; Dzurenda, Petr (oponent) ; Ricci, Sara (vedoucí práce)
The thesis deals with the creation of an interactive web application for substitution ciphers and their interactive cryptanalysis. Six ciphers are implemented in the work. Representatives of monoalphabetic ciphers are Caesar’s cipher, Atbash, and Keyword cipher and representatives of polyalphabetic ciphers are Vigenre cipher, Kryptos and Vernam cipher. Frequency analysis, index of coincidence and n-gram statistics as a fitness function are used for interactive cryptanalysis. The result is achieved by using HTML5, CSS and ReactJS scripting language which is a JavaScript library with the ability of variable type-check.
Post-Quantum Ciphers
Novosadová, Tatiana ; Ricci, Sara (oponent) ; Hajný, Jan (vedoucí práce)
The National Institute for Standards and Technology (NIST) has initiated a process to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptography algorithms through a public competition. An objective of this thesis is to study the available post-quantum algorithms for key establishment, that were published in the third round of this competition. After a proper analysis and comparison, one of the studied algorithms was implemented using available libraries for the chosen algorithm, the created program was optimized and documented.
Web application on pairing-based cryptography
Mogrovics, Alexander ; Dzurenda, Petr (oponent) ; Ricci, Sara (vedoucí práce)
The aim of this thesis is to shed some light on elliptic curve cryptography via web application. It follows mathematical and algebraic principles of establishing elliptic curves over finite fields, performing computations over them and establishing bilinear pairings. It also describes the architecture and implementation of the web application, which uses website template with embedded SageMathCell in order to minimize required space. This application allows the user to preform computation of points on elliptic curve over finite field and their plot, plot of an elliptic curve over real numbers, operations over points of elliptic curves, to establish bilinear pairing, to establish 3-way Diffie--Hellman key exchange and to conduct a MOV attack.
Secret Sharing Authentication Key Agreement
Ryšavá, Pavla ; Dzurenda, Petr (oponent) ; Ricci, Sara (vedoucí práce)
This thesis deals with the implementation and creation of a cryptographic library and Graphical User Interface (GUI) for the newly designed "Shamir’s Secret Sharing-based Authenticated Key Agreement" (ShSSAKA) protocol. The protocol is based on the principle of AKA (Authentication and Key Agreement), Schnorr’s signature and extended with Paillier’s scheme to achieve multiple devices deploying signing and authentication. Benchmarks on a personal computer and RaspberryPi are also presented.

Národní úložiště šedé literatury : Nalezeno 41 záznamů.   předchozí11 - 20dalšíkonec  přejít na záznam:
Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.