National Repository of Grey Literature 257 records found  beginprevious245 - 254next  jump to record: Search took 0.01 seconds. 
The Analysis of Security and Anonymity in Cryptocurrency Payments
Maňák, Michal ; Šebesta, Michal (advisor) ; Bruckner, Tomáš (referee)
Bitcoin and other cryptocurrencies are getting into common usage more and more frequently. Unfortunately this spread is connected with attempts to misuse their principles for personal benefit. The goal of this thesis is to explain the main principles of using bitcoin in relation to the internet identity. This connection is represented by two sources in the thesis: the first is a bitcoin blockchain, the second is the sum of various user profiles used in discussion forums and similar websites. The aim is to create and explain the process how to, by using the combination of this two sources, reveal the identity of a human using cryptocurrencies for payment (from a private person point of view). First, methods used for extraction of correct and useful data from the blockchain and internet profiles must be developed to be able to mine data from the joint database, merging into a full user profile containing personal data. Results of this investigation are extended by the rules of preserving anonymity on the internet, containing both technological and behavioural measures avoiding a share of personal data. The end of this thesis explains possible attack vectors that might be used for compromising cryptocurrencies. The methods of searching of the internet identity are a useful tool for facing these attacks.
Analysis of digital currency Bitcoin
Huřťák, Petr ; Brixí, Radim (advisor) ; Kalina, Jaroslav (referee)
Bachelor's thesis is focused on digital currency Bitcoin, mainly on Bitcoin transactions and their attributes like speed, fees and safety. Main goals of this thesis are three, analysis of bitcoin buying possibilities in Czech Republic, comparison of Bitcoin transactions with common payment methods like bank transfers, credit card payment or PayPal, and analysis of number of merchants accepting bitcoin in time and discovery of trend from these data. This thesis is divided into theoretical and practical part. In theoretical part there are described basics of cryptography, which are necessary for understanding Bitcoin, and in depth description how Bitcoin works. Practical part is focused on fulfilment of described goals, besides that thesis is also addressing Bitcoin clients and comparison between most popular ones. Contribution of this bachelor's thesis is analysis of bitcoin buying possibilities in Czech Republic, comparing Bitcoin transactions with transactions of standard payment methods in terms of fees and time, and analysis of trend in number of merchants accepting bitcoin as one of the payment method.
Web applications and the influence of an encryption on their responses
Podavka, Jan ; Veber, Jaromír (advisor) ; Klíma, Tomáš (referee)
This bachelor thesis deals with how the size of the database and response of the system is influenced by an encryption of the data on the websites. This issue is solved by means of testing of encryption methods on the Raspberry Pi. Theoretical part of the thesis describes the encryption algorithms. It also describes how to secure the website and where to use the encryption on the web and what kind of encryption to use. The practical part focuses on the impact of the encryption on the system. As a result, the speed of the algorithms in different situations is evaluated, and also the size of the database with cypher text and plain text is compared.
Bitcoin
Herzán, Jiří ; Klíma, Tomáš (advisor) ; Veber, Jaromír (referee)
Bachelor's thesis is focused on crypto currency bitcoin. The thesis is divided into three parts. First chapter is focused on cryptography, which is used for bitcoin security. Next chapter describes basic bitcoin principles and bitcoin mining. In last chapter there are practically described two methods of bitcoin mining. The aim of this thesis is to bring coherent view on given themes, especially bitcoin mining. The main goal of this thesis is trying bitcoin mining using ASIC miner and Cloud mining method. The result is a statement about mining profitability.
Galoisova tělesa
Horák, Martin
Horák, M. Galois fields. Brno: Mendel University, 2014. This bachelor thesis deals with creating the application for explaining how Galois fields work. It describes the principal of generating elements of the field and how mathematical operations between these elements work. It also deals with using of these fields for cryptography.
Analysis and implementation of application for digital currency Bitcoin
DRDÁK, František
The thesis is focused on the topic of virtual cryptocurrency Bitcoin. The theoretical part is divided into several chapters. First of all, there is a chapter containing basic information about the currency's history, its development to the present, as well as principles of operation of this currency. Because it is a currency based on cryptographic principles next chapter summarizing cryptographic techniques, which is necessary to know for subsequent analysis of this currency. In other parts is elaborated a detailed analysis of the principles of Bitcoin. The main point of this analysis is a system of transactions, decentralized history, then joining the transactions into blocks and in the end creating blockchain. It also explains the principle of P2P networks. The practical part of this work focuses on the analysis and design of payment applications for mobile devices. There used open-source libraries such BitcoinJ. The application is developed in Java programming language with plugin for portable devices, which work under the operating system Android. For the purposes of analysis and design of graphical user interface is used UML diagrams. The specification of the UML diagrams was utilized by freely available graphics software and the result is also included in this work.
Credit cards on the internet
Kolář, Jiří ; Matuštík, Ondřej (advisor) ; Kalina, Jaroslav (referee)
Using credit cards to buy goods and services is becoming more and more popular and this trend can be observed even when paying by card over the Internet. From a customer perspective is indeed a comfortable and quick way of paying. Merchants realize this and so in their online stores card payment allows. The content of this work illustrates the issue of security of payment cards on the Internet, encryption and secure communication, as a basis for describing 3D Secure standard. The aim is to analyze the security features of payment cards issued by banks and credit institutions operating on the Czech market from the perspective of the owner of the credit card. At the same time to estimate future developments in this sector based on facts and trends.
Online Password Manager
Ort, Štěpán ; Buchalcevová, Alena (advisor) ; Mészáros, Jan (referee)
The objective of this thesis is to show on which principles a modern password manager works. The introductory theoretical part describes cryptographic algorithms and evaluates whether they are suitable for use in current applications. At the same time it presents methods how to create a password which is strong and also easily remembered. The second part explains the key characteristics of a password manager. The last chapter illustrates the architecture of online password storage and the way of communicating with the password manager. Measures that have to be taken in order to make such storage secure are also described here.
.NET & Cryptology
PSÍK, Tomáš
The point of this work is to show how to solve certain cryptographic problems in Microsoft .Net Framework 3.5. The work is divided into three parts. The first is an overview of basic classes and methods which can be used to solve particular cryptographic tasks. This part shows how to use these classes and also is an overview of the most common cryptological terminology also used in this work. The second part shows how to use abstract classes prepared in the framework for implementing an application interface, which unifies usage of all cryptographic transformations under .net. The third part is about deciding on quality of certain implemented cryptographic algorithm. Implementing speed testing application for block ciphers and hash function and it also contains references of basic attacks. Implementations of speed testing program, two block ciphers (Rijndael and Skipjack), all in c#, are listed in Appendix.

National Repository of Grey Literature : 257 records found   beginprevious245 - 254next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.