National Repository of Grey Literature 259 records found  previous11 - 20nextend  jump to record: Search took 0.02 seconds. 
Security design for system of remote quality measurement of electric power
Jakubíček, Michal ; Koutný, Martin (referee) ; Mlýnek, Petr (advisor)
Bachelor thesis in the first chapter deals with the concept of quality of electric power and its parameters. The next chapter is focused on systems that used remote data collection and the current direction of evolution of these systems. The third of the thesis discusses the symmetric and asymmetric cryptographic systems and their main representatives. The asymmetric system is described by the principle of calculating RSA and Diffie–Hellman. The next part deals with selected libraries that can count large numbers. Through the establishment of key using the Diffie–Hellman with these libraries and the subsequent measurement should be proved whether optimized library is faster than the other libraries. The evaluation of the used library in terms of speed and memory consumption is inculded in the final chapter. The appendix include installation instructions for the libraries BigDigits, GMP and OpenSSL in Visual Studio 2010.
Attribute based authentication
Chwastková, Šárka ; Hajný, Jan (referee) ; Dzurenda, Petr (advisor)
This thesis deals with attribute based credentials. It describes attribute systems, their entities and properties generally. The work concentrates specifically on the attribute system Identity Mixer. The process of communication of the attribute system Identity Mixer is implemented in the language of JavaScript. Application is the web visualization, which describes protocols, entities and generally computes protocols of Identity Mixer with inputs of small numbers or predefined large numbers.
Electromagnetic analysis
Kolofík, Josef ; Reichert, Pavel (referee) ; Martinásek, Zdeněk (advisor)
This thesis deals with electromagnetic analysis and applications of electromagnetic side channel. The first and second part describes the basics of cryptography, function of cryptographic module and side-channel attacks. The third part discusses the electromagnetic analysis, construction of probe, a description of the laboratory workplace, the electromagnetic emission of PIC16F84A, AES and preparation for laboratory measurements. The fourth part describes specific laboratory measurements and extracting the useful signal. In the fifth part of the thesis presents the results of processing the measured values, the outputs generated by scripts and found the link between measured curves and AES encryption key. In the sixth part of the thesis are analyzed the basics of defense against side channel attack.
The use of artificial intelligence in cryptography
Lavický, Vojtěch ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
Goal of this thesis is to get familiar with problematics of neural networks and commonly used security protocols in cryptography. Theoretical part of the thesis is about neural networks theory and chooses best suitable type of neural network to use in cryptographic model. In practical part, a new type of security protocol is created, using chosen neural network.
User Authentication and Autorization for New Generation Networks
Přibyl, Radek ; Cvrček, Daniel (referee) ; Matoušek, Petr (advisor)
This document describes methods of user authentication and authorisation via a trusted server. There is analysis of the system Kerberos, which is used as an inspiration for desing of a new authentication scheme. There are analysed programming layers and interfaces for specific applications ensuring user authentication and authorisation. The document contains a design and detailed description of a new authentication scheme. This scheme is implemented into the communication between email client and imap server.
Platform Independent Storge of Sensitive Data
Klemens, Jakub ; Herout, Adam (referee) ; Španěl, Michal (advisor)
This thesis addresses the issues when securing sensitive data for Windows, iOS and MacOS, with the target being to create the ideal key-value data storage library. A C++ library has been designed and implemented based on a given facts. The library offers a simple application programming interface for storing data and structuring them into modules. A base functionality is verified by set of unit tests.
Network attacks by Cain & Abel
Smékal, Lukáš ; Stančík, Peter (referee) ; Sobotka, Jiří (advisor)
This Master’s thesis is dealt in the local area network security, cryptographic algorithms, particular attacks on computer networks a practical application these attacks in local area networks. To application particular attacks is used the Cain & Abel program. The detailed manual for this program is created from the results of these attacks. This manual contains the exhibits of usage particular program tools and the attack application exhibits. This manual considers consequences of particular attacks and summarises achieved results during work with tools too. Master thesis closely deals with one of the program tools called RSA SecureID Token Calculator. Authentication via hardware tokens is contained in this Master thesis. Thesis contains the way of authentication using RSA SecureID Token Calculator without physical owning of the hardware token. Cain & Abel program shows and interprets why cashed passwords in operation system are dangerous and it shows methods how attacker can reveal this passwords from the operation system memory. This Master thesis is focused on sniffing credentials and passwords in local area networks and it is focused on cryptographic algorithms cracking for username and passwords revealing.
Security design for system of remote quality measurement of electric power
Jakubíček, Michal ; Koutný, Martin (referee) ; Mlýnek, Petr (advisor)
Bachelor thesis in the first chapter deals with the concept of quality of electric power and its parameters. The next chapter is focused on systems that used remote data collection and the current direction of evolution of these systems. The third of the thesis discusses the symmetric and asymmetric cryptographic systéme and their main representatives. The asymmetric system is described by the principle of calculating RSA and Diffie–Hellman. The next part deals with selected libraries that can count large numbers. Through the establishment of key using the Diffie–Hellman with these libraries. The evaluation of the used library in terms of speed, number of elementary cycles and memory consumption is inculded in the chapter 5. The last chapter explains the optimization focused on Ultra-Low Power MCU and shown Montgomery multiplication and squaring. It describes in detail the procedure of calculation and described why is his calculation faster than conventional modular multiplication and exponentiation. The appendix include installation instructions for the libraries BigDigits, GMP and OpenSSL in Visual Studio 2010.
Modern Asymmetric Cryptosystems
Walek, Vladislav ; Sobotka, Jiří (referee) ; Malina, Lukáš (advisor)
Asymmetric cryptography uses two keys for encryption public key and for decryption private key. The asymmetric cryptosystems include RSA, ElGamal, Elliptic Curves and others. Generally, asymmetric cryptography is mainly used for secure short messages and transmission encryption key for symmetric cryptography. The thesis deals with these systems and implements selected systems (RSA, ElGamal, McEliece, elliptic curves and NTRU) into the application. The application can test the features of chosen cryptosystems. These systems and their performance are compared and evaluated with the measured values. These results can predict the future usage of these systems in modern informatics systems.
Microsoft Office Password Recovery Using GPU
Zobal, Lukáš ; Veselý, Vladimír (referee) ; Hranický, Radek (advisor)
This thesis describes the password recovery of Microsoft Office documents by expanding an existing tool Wrathion. The thesis explains the issue of digital document protection, modern encryption and hashing algorithms and rudiments of OpenCL standard. Next, the analysis of structure of MS Word, MS Excel and MS PowerPoint documents is performed, including all the versions since 1997. Using this knowledge, we create a draft and an implementation of improved DOC module for newer versions of the encryption, as well as a draft and an implementation of brand new modules for XLS and PPT formats and their newer variants DOCX, XLSX and PPTX. After that, we measure performance of the new modules and compare it with other competing password recovery tools.

National Repository of Grey Literature : 259 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.