National Repository of Grey Literature 178 records found  beginprevious168 - 177next  jump to record: Search took 0.00 seconds. 
Software support for cryptography education
Stančík, Peter ; Vyoral, Josef (referee) ; Burda, Karel (advisor)
The main aim of this thesis was to study, choose and decribe techniques eligible for cryptography education. A pedagogically appropriate presentation for the selected techniques' principles was to be chosen. Another goal was to create an integrated modular web interface containing a calculator focused on cryptographic operations. The eligibility of techniques was assessed accordingly to the computing processes implied by these techniques and also accordingly to the ability of being presented in an illustrative way. A program simplifying calculations used in symetric and asymetric cryptography was designed and implemented. It disposes of a web interface and one of its parts is focused on steganographic techniques. On the other hand, any pedagogically appropriate presentation interconnecting this program with theoretical findings from this field was not found.
Security in hybrid cloud computing
Koudelka, Ondřej ; Karkošková, Soňa (advisor) ; Šperková, Lucie (referee)
This bachelor thesis deals with the area of hybrid cloud computing, specifically with its security. The major aim of the thesis is to analyze and compare the chosen hybrid cloud providers. For the minor aim this thesis compares the security challenges of hybrid cloud as opponent to other deployment models. In order to accomplish said aims, this thesis defines the terms cloud computing and hybrid cloud computing in its theoretical part. Furthermore the security challenges for cloud computing are defined and specified for hybrid cloud. The comparison of specific hybrid cloud providers is provided in the practical part along with the comparison of hybrid cloud security challenges.
RSA Algorithm and Its Use in Electronic Communication with State Authorities
FROULA, Stanislav
This bachelor thesis focuses on the RSA algorithm and it's use in electronic communication. The RSA algorithm is curently one of the most widely used asymmetric encryption algorithms. It was first publicly described in 1977 by the mathematicians Ron Rivest, Adi Shamir, and Leonard Adleman. It's the first algorithm that is suitable for both electronic signature and public key encryption. The theoretical part explains all related concepts of cryptography. The basic operating principle of the algorithm is described in specific simplified example. It also includes a description of public key encryption and a list of institutions, which use digital signature to verify authenticity of the sender. The practical part focuses on a questionnaire survey, which investigates the awareness level of internet banking users in term of security of using internet banking and following the security policy recommended by banks. The results are analysed and evaluated at the end of the thesis.
Web applications and the influence of an encryption on their responses
Podavka, Jan ; Veber, Jaromír (advisor) ; Klíma, Tomáš (referee)
This bachelor thesis deals with how the size of the database and response of the system is influenced by an encryption of the data on the websites. This issue is solved by means of testing of encryption methods on the Raspberry Pi. Theoretical part of the thesis describes the encryption algorithms. It also describes how to secure the website and where to use the encryption on the web and what kind of encryption to use. The practical part focuses on the impact of the encryption on the system. As a result, the speed of the algorithms in different situations is evaluated, and also the size of the database with cypher text and plain text is compared.
iOS platform security
Nidl, Michal ; Veber, Jaromír (advisor) ; Luc, Ladislav (referee)
This bachelor's thesis is focused on security of operating system iOS from Apple. The thesis is divided into six chapters. The first chapter describes iOS and Apple company. The second chapter deals with iOS security architecture in terms of security model and security mechanisms. The third chapter deals with the security of iOS applications and options of their testing. The fourth chapter describes software attacks against iOS in the form of malware and exploitation. The fifth chapter describes the system interferences and methods for their detection. The sixth chapter deals with comparison of iOS security and Android and Windows Phone platform security. In this chapter is introduced the security of competitive platforms in terms of security model, system security, application security and interferences. This comparison includes the table with evaluation of security. Objective of this thesis is to introduce ways of security in one of the most widely used mobile platform. Moreover the aim is to compare iOS security with security of two competitive platforms. The result is an analysis of iOS security and it's comparison with Android and Windows Phone security.
Analysis and implementation of application for digital currency Bitcoin
DRDÁK, František
The thesis is focused on the topic of virtual cryptocurrency Bitcoin. The theoretical part is divided into several chapters. First of all, there is a chapter containing basic information about the currency's history, its development to the present, as well as principles of operation of this currency. Because it is a currency based on cryptographic principles next chapter summarizing cryptographic techniques, which is necessary to know for subsequent analysis of this currency. In other parts is elaborated a detailed analysis of the principles of Bitcoin. The main point of this analysis is a system of transactions, decentralized history, then joining the transactions into blocks and in the end creating blockchain. It also explains the principle of P2P networks. The practical part of this work focuses on the analysis and design of payment applications for mobile devices. There used open-source libraries such BitcoinJ. The application is developed in Java programming language with plugin for portable devices, which work under the operating system Android. For the purposes of analysis and design of graphical user interface is used UML diagrams. The specification of the UML diagrams was utilized by freely available graphics software and the result is also included in this work.
Wardriving
Belák, Peter ; Pavlíček, Luboš (advisor) ; Beneš, Jiří (referee)
The Bachelor Thesis introduces the term Wardriving. It describes in detail the necessary hardware, including the parameters that it needs to meet for this work. Further, it describes in detail the software, its setting and necessary features. The work presents the elementary particulars which have to be complied with for the best results of the survey. Part of this work is a survey of selected areas of settlement Řepy 1, analysis of the data and their comparison.
Password management systems
Karády, Gabriel ; Pavlíček, Luboš (advisor) ; Gála, Libor (referee)
The purpose of this thesis is to describe and compare password managers for users and small teams on different software and hardware platforms. It deals with the problem area of passwords in general, user habits, and comfort and password quality. It further introduces and categorizes password managers and compares a few of them by several criteria, from security -- used encryption and its cryptanalysis, user protection from malware -- through usability -- the abilities and ease of use of the tool, its integration with applications and the operating system -- up to teamwork enhancements -- synchronization abilities and sharing of both single passwords and password databases.
One-Time Pad Implementation
KOPECKÝ, Petr
The text is oriented to generation of random numbers of cryptographic quality and to performing statistical methods such as Diehard test to verify them. The data obtained this way are used in implementation of one-time pad for maximizing security of message encryption. The problems that may occur and need to be dealt with are also noted. The final part of the text includes suggestions for future one-time pad implementations and the final results that author came to.
Internal Certification Authority
Kolb, Jiří ; Pavlíček, Luboš (advisor) ; Bumbala, Jan (referee)
With the rising number of internet users emerged the need for mutual authentication and secure communication. In the open environment of the Internet, this service is provided by a trusted third party using asymetric cryptography. This trusted third party - called Certification Authority - provides identification of the communication partners and the security of their communication through certificates it issues. Many large companies use certification authorities today. The goal of my thesis is the design and implementation of a CA for a small company, along with an evaluation of the benefits of introducing this new technology.

National Repository of Grey Literature : 178 records found   beginprevious168 - 177next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.