National Repository of Grey Literature 8 records found  Search took 0.01 seconds. 
Cryptographic protocols in practice
Truneček, Petr ; Hajný, Jan (referee) ; Pelka, Tomáš (advisor)
The purpose of this work was first to describe the requirements for cryptographic protocols. Furthermore, the classification of these protocols should have been made with specific examples given. The aim of the next part of the work was to describe the methods which are suitable for description and modeling of cryptographic protocols. This work also addressed the analysis of cryptographic protocols by appropriate analytical means. The CSP method for modeling of the cryptographic protocols was applied in the practical part. The Yahalom protocol was selected as a protocol suitable for modeling. Two analysis was made. The first analysis concerned the standard version of the Yahalom protocol, which was tested to the requirements of cryptographic properties of the secrecy and authenticity. The second analysis was based on the possibility of disclosure of the key, including counterexamples and traces given by FDR. The first analysis did not reveal any weakening, in terms of two cryptographic properties. To demonstrate the possibility of FDR, Yahalom protocol was modified in order to cause the situation when the disclosure of keys appears. FDR then finds the exact procedure that an intruder must make to get the possession of the key.
Radar antenna diagnostic module
Pacner, Petr ; Urbanec, Tomáš (referee) ; Kubíček, Michal (advisor)
Faults like open and short circuit in electrical wirings pose a significant threat on functionality of the whole application. This thesis describes conceptual design of a fault identification module for coaxial cables between transmitter and antenna in radar systems, and focuses on faults localization. The main goal is to select from existing a suitable method for such faults analysis and create a demonstration module serving as a basis for further development. This contains theory regarding basic classification of wiring faults and principles of frequently used detection methods including some of their prameters, advantages and disadvantages which altogether build a foundation for method selection. The chosen method is analyzed by simulations and further on laboratory equipment controlled by a set of computer applications. In the end the chosen method is implemented on a development kit, which is then used for measurements of wire sample.
Methods for properties analysis of transmission lines
Žůrek, Dalibor ; Kočiš, Luboš (referee) ; Hadinec, Michal (advisor)
This work focuses on a search of available literature on the theory of transmission lines and verify the possibility of simulation processes on these lines using a suitable simulation program. Initially, for the introduction to the parameters and the phenomenon that characterize the line and are important for understanding the issue. These parameters are then measured and compared with traces from the simulation in program PSpice. In another part of the work, the reader is familiar with the basics of reflectometry and fault detection capabilities on transmission lines with the basic reflectometry methods TDR and FDR, as well as with other methods of OTDR, MSR, and PD-FDR. For the TDR, FDR and MSR methods were made experimental measurements with a view to determining the position of the various types of faults on the tested leadership.
Radar antenna diagnostic module
Pacner, Petr ; Urbanec, Tomáš (referee) ; Kubíček, Michal (advisor)
Faults like open and short circuit in electrical wirings pose a significant threat on functionality of the whole application. This thesis describes conceptual design of a fault identification module for coaxial cables between transmitter and antenna in radar systems, and focuses on faults localization. The main goal is to select from existing a suitable method for such faults analysis and create a demonstration module serving as a basis for further development. This contains theory regarding basic classification of wiring faults and principles of frequently used detection methods including some of their prameters, advantages and disadvantages which altogether build a foundation for method selection. The chosen method is analyzed by simulations and further on laboratory equipment controlled by a set of computer applications. In the end the chosen method is implemented on a development kit, which is then used for measurements of wire sample.
The Effects of the New Deal on the social status of Afro-Americans in selected sectors of the US economy
Schwammenhöfer, Tomáš ; Tajovský, Ladislav (advisor) ; Johnson, Zdenka (referee)
This bachelor thesis deals with the effects of the New Deal legislation on Afro-Americans in the 1930s. Specifically, the thesis analytically focuses on the influence of various politician of this program on their social environment within the US economy. For the ease of understanding of whole issue is needed to know the situation of Afro-Americans in the previous decade as well as in the Great Depression. That is the content of the first two chapters. Subsequently there is the outline of the situation leading to the election of F. D. Roosevelt, US President. The last and as well the most important chapter of the whole thesis is devoted to analysis of individual programs and their impact on Afro-Americans. It concludes that the New Deal had both positive and negative influence on this minority, depending on the economic sector and the relevant administration. New Deal generally meant a huge progress in their economic and political affairs.
Analysis of Selected Payment Protocols
Kučerová, Petra ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
The aim of the master's thesis "Analysis of Selected Payment Protocols" is overview of used payment. The first part is concentrated on data security, the second is dedicated to payment protocols, their characteristics, used technology and security elements. The third part is dedicated to verification and simulation tools. Comparison of particular payment protocols and of particular verification tools is part of this work too. Experimental part of the thesis is focused on formalization and verification of the payment protocol Visa 3-D Secure, of the protocol NetBill and on formalization of two subprotocols of SET.
Methods for properties analysis of transmission lines
Žůrek, Dalibor ; Kočiš, Luboš (referee) ; Hadinec, Michal (advisor)
This work focuses on a search of available literature on the theory of transmission lines and verify the possibility of simulation processes on these lines using a suitable simulation program. Initially, for the introduction to the parameters and the phenomenon that characterize the line and are important for understanding the issue. These parameters are then measured and compared with traces from the simulation in program PSpice. In another part of the work, the reader is familiar with the basics of reflectometry and fault detection capabilities on transmission lines with the basic reflectometry methods TDR and FDR, as well as with other methods of OTDR, MSR, and PD-FDR. For the TDR, FDR and MSR methods were made experimental measurements with a view to determining the position of the various types of faults on the tested leadership.
Cryptographic protocols in practice
Truneček, Petr ; Hajný, Jan (referee) ; Pelka, Tomáš (advisor)
The purpose of this work was first to describe the requirements for cryptographic protocols. Furthermore, the classification of these protocols should have been made with specific examples given. The aim of the next part of the work was to describe the methods which are suitable for description and modeling of cryptographic protocols. This work also addressed the analysis of cryptographic protocols by appropriate analytical means. The CSP method for modeling of the cryptographic protocols was applied in the practical part. The Yahalom protocol was selected as a protocol suitable for modeling. Two analysis was made. The first analysis concerned the standard version of the Yahalom protocol, which was tested to the requirements of cryptographic properties of the secrecy and authenticity. The second analysis was based on the possibility of disclosure of the key, including counterexamples and traces given by FDR. The first analysis did not reveal any weakening, in terms of two cryptographic properties. To demonstrate the possibility of FDR, Yahalom protocol was modified in order to cause the situation when the disclosure of keys appears. FDR then finds the exact procedure that an intruder must make to get the possession of the key.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.