National Repository of Grey Literature 204 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
Hash functions and their usage in user authentication
Piller, Igor ; Stančík, Peter (referee) ; Hajný, Jan (advisor)
This thesis concerns with hash functions and their usage in authentication. It presents basics of hash functions theory and construction elements. In particular the thesis focuses on LMHash, MD4, MD5 and SHA family hash functions, which are compared from the security point of view. The thesis describes in general the most frequently used hash function attacks, points out the weaknesses of current construction and mentions the future perspective of hash functions. Furthermore the thesis outlines the area authentication and describes usage of hash functions in the area. Practical part of the thesis contains an implements of a general authentication framework implemented in programming language C#. The result is client and server applications, in which two selected authentication methods were successfully tested. The result implementation is flexible with respect to the possible future use of other authentication methods.
Honeypot: a tool for fighting malware
Karger, David ; Lieskovan, Tomáš (referee) ; Hajný, Jan (advisor)
This bachelor thesis is focused on deploying a honeypot to fight malware. The aim was to study the issue of honeypots and their use in detection and analysis of malware. The first part is dedicated to malware, its history and individual types. The so-called botnet is described in the next part. The last part is devoted on the honeypot itself and its distribution. The practical realization is done through honeypots Cowrie and Mailoney.
Cyberattack generator
Gajdušek, Ondřej ; Jeřábek, Jan (referee) ; Hajný, Jan (advisor)
This work deals with the enhancement of software which generates cyberattacks. These enhancements are focused on application layer of ISO/OSI model. The firsh part of the work contains general description of cyberattacks. Concrete attacks which this work is dealing with are described more concretely. Next part deals with describing generator software and its enhancement. The last part is describing testing of newly implemented cyberattacks.
Cryptography on Computationally Limited Devices
Hampl, Dalibor ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
The thesis focuses on cryptographic algorithms of low performance devices, and mutual authentication of authentication server and user using smart cards. In the first part of this thesis the cryptography, cryptographic primitives, cryptographic goals, security models and cryptographic algorithms of low performance devices are presented. The second part focuses on low performance devices as RFID tags, NFC technology, microcontrollers and smart cards (.NET cards, java cards, MIFARE cards). The practical part deals with the comparison of chosen low performance devices and measure the time required for encryption and decryption using different cryptographic algorithms on Gemalto .NET Smart Card V2+. This thesis describes and explains the three authentication schemes for mutual authentication of remote server and user using smart cards. The new authentication scheme, which is based on the second related scheme, attempts to eliminate possible security attacks and keeps efficiency. For all four authentication schemes the application is implemented to test required time for authentication of server and user using smart cards.
Cryptography on constrained devices
Hlinka, Jan ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
This thesis describes the implementation of a verifier, revocation authority and issuer side of an attribute authentication algorithm, using device with limited performance capabilities. Chosen scheme, RKVAC, functions as an attribute authentication protocol. Which are a protocols designed to protect private user data. RKVAC Scheme complies with Privacy by Design and Privacy by Default principles, which are a part of regulations such as GDPR (General Data Protection Regulation) and eIDAS (Electronic Identification and Trust Services).
Modern cyber attacks
Hodes, Vojtěch ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This bachelor's thesis deals with contemporary cyber attacks with an emphasis on denial of service attacks. In the theoretical part the thesis focuses on an analysis and description of the cyber attacks. It monitors trends in cyber attacks and also describes generators of denial of service attacks based on software and hardware platform. The practical part uses the information from the theoretical one to design tests of network devices against cyber attacks, their practical realization and a comparison between used cyber attacks. At the very end the thesis offers possible countermeasures against them.
Cyber exercises on the OpenStack platform
Fišarová, Veronika ; Hajný, Jan (referee) ; Lieskovan, Tomáš (advisor)
The goal of this bachelor thesis is to get acquainted with the platforms that are used to create the cyber ranges. The main part of thesis is focused on the cloud platform named OpenStack and its possibilites in creation of cyber ranges. The OpenStack installation options are compared and the selection of the instalation that is suitable for the KYPO project is made. The last part is devoted to the analysis of the KYPO project and the actual installation of OpenStack to the virtual station followed by the deployment of the KYPO platform on the modified OpenStack cloud and the commissioning of a training scenario.
Secure access to web interface
Kazik, Milan ; Hajný, Jan (referee) ; Rášo, Ondřej (advisor)
This document contains basic principles and processes regarding secure access to web information system. It consists of theoretic and applied part. These are mainly written together in thesis’s chapters. Theoretic informations were tested on simple web application created in PHP computer language on Apache web server using MySQL database. In the beginning, there is an analysis of used programming environment, especially it’s advantages and disadvantages. The main part of this document is simple characterization of many security problems which can be found on many websites all around the world. In the first place it’s a handling problem of inputs and outputs in the web applications. Password disputableness is solving separatelly. Theory of a problem is analysed first of all. Then a couple of solving methods are suggested and the one which is practically realized is described in detail. There is a notification system created which is used to inform user about errors appeared in web application. In the last section there is a client and server certificates described. This document contains fully characterization of used scripts and connection between them. They are supplemented with many pictures and screenshots which are used to better understanding the disputableness of web security.
Analysis and Detection of RAT Malware
Sidor, Samuel ; Frolka, Jakub (referee) ; Hajný, Jan (advisor)
Goal of this bachelor’s thesis is studying problematics of various types of malware with specific focus on RAT (Remote Access Trojan) category. This thesis will also acquaint reader with static and dynamic binary analysis and terms like reverse engineering, sandboxing, decompilation, etc. Then chosen malware families will be analysed and for these families detection rules in YARA language will be created. Except this, reader will be acquainted also with protection against RAT malware and finally data acquired from detail analysis will be evaluated.
Zero knowledge authentication
Bošeľa, Jaroslav ; Hajný, Jan (referee) ; Dzurenda, Petr (advisor)
This thesis looks to authentication, principle and basic divison. Another part of thesis looks to Zero–Knowledge protocols, which protocols with zero information, their analysis and base elements, also thesis presents technology Bluetooth Low Energy, specification of this technology in transmission simple data between computer Raspberry Pi 2 and mobile phone. The practical part of thesis works on experiment of sending simple data between Raspberry 2 and Android phone.

National Repository of Grey Literature : 204 records found   previous11 - 20nextend  jump to record:
See also: similar author names
7 Hajny, Jan
1 Hajný, Jakub
4 Hajný, Jiří
Interested in being notified about new results for this query?
Subscribe to the RSS feed.