National Repository of Grey Literature 26 records found  beginprevious17 - 26  jump to record: Search took 0.00 seconds. 
Effectivity of strategies for data backup
Šindler, Martin ; Ležák, Petr (referee) ; Burda, Karel (advisor)
This bachelor´s project is focused on efficiency of backups using mathematical models, which calculates overall capacity needed for backup and capacity required for complete recovery, it also compares availability of rotation schemes. Models are based on propability of data change in certain time interval specified as backup cycle. Models are implemented to the application, which can be used for choosing the best rotation scheme.
Visualisation of asymetric cryptography
Kužela, Jan ; Rosenberg, Martin (referee) ; Ležák, Petr (advisor)
Bachelor thesis is considered in cryptographic protocols, especially asymetrical. The purpose of the thesis is to create an aplication for visualisation of mathematical operations in asymetrical cryptosystems. The emphasis is put on the asymetrical cryptosystems Diffie-Hellman, DSA and RSA. There is a summary of history of cryptography in the theoretical part as well as modern cryphographical systems used for protection of digital data. Practical part shows the design and creation of the application and implementation in the programming language Java and JavaFX. The output is the application, which visualizes protocols DH, DSA and RSA. Systems are visualized with the input data from the user or with randomly generated data. Application shows the calculations made by protocols step by step.
Implementation of cryptographic primitives
Jégrová, Eliška ; Fujdiak, Radek (referee) ; Ležák, Petr (advisor)
This semestral thesis is focused on cryptographic methods. Part of it deals with block ciphers, where are described algorithms of Blowfish and 3DES. It also deals with hash functions of which are analysed algorithms of SHA-3 and Tiger in detail.
Authentication of web service users
Plašil, Matouš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
In this bachelor thesis are presented methods for Single Sign-On from perspective of client application. It takes a closer look at protocols OpenID and OAuth and explains the main differencies. Next part of the thesis is focused on registration of application and communication between server and client application. This is realized by OAuth protocol. In the practical part is described a created web application and used methods are explained.
Digital Transducer Array Loudspeakers System
Ležák, Petr ; Káňa, Ladislav (referee) ; Schimmel, Jiří (advisor)
This thesis discusses loudspeakers with a direct D/A conversion, possibilities of their technical solution and construction. It analyses classic conversion of digital signal to analog with D/A converters, amplifiers and loudspeakers and possibilities of its replacement by loudspeakers with a direct D/A conversion. The main part of thesis is devoted to design of a loudspeaker with a direct D/A conversion and a proper exciter for it. The exciter is designed from a block diagram to a specific electric circuit and printed circuit boards. The loudspeaker system is designed as well and the results of its simulations are included in this thesis. The device was constructed and tested. The program which generates digital harmonic signal on parallel port was written and electric and acoustic properties of the device was measured and discussed.
Portal of the universal access control protocol
Čepelák, Tomáš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
The paper focuses on the issue of access control. It presents an universal bilateral protocol of access control of ACP. The paper describes the messages and its sequences that AC portals uses for communication. It describes the functions and features of the modules from which the portal is composed. The paper suggests the concept of a modular AC portal solutions including the design of basic modules. It also outlines possible test scenarios. Under this proposal is generated functional AC portal on the .NET Framework platform using the C\# programming language. The portal provides access to local assets or to the assets on other computers in the local network. Created application is tested according to the scenarios proposed in both the network version and the local version of the AC portal. Test results are objectively evaluated and commented.
System for anonymous transmit of messages
Kislinger, Jan ; Rosenberg, Martin (referee) ; Ležák, Petr (advisor)
Diploma thesis deals with an anonymous transmit of messages using protocol for anonymous authentication. In first part, we introduce theoretical familiarization to the issues and description protocol for anonymous authentication. Further, it describes the suggestion of the communication between the client and the server. Finally, contains a description of the created system for anonymous transmit of messages, which consists of the server and clients, who can leave challenges on the server for other users and they obtains challenges from the server. The thesis explains how to start and control program. There are also discussed methods of computing verification values, encryption keys and messages and authentication of receivers.
Random number generator
Križan, Viliam ; Burda, Karel (referee) ; Ležák, Petr (advisor)
This master thesis deals with a generation of random numbers and Fortuna generator implementation in Java language. In the first part the theoretical familiarization to the issues is introduced. Various entropy sources like mouse movement, keyboard typing, microphone and web camera noise are described and analysed. The analysis focuses on randomness, usability and volume of gathered data. Also the Fortuna random number generator is described from the theoretical view. Object analysis and implementation details are described in the last chapter of the document.
Collection of laboratory works for demonstration of computer attacks
Plašil, Matouš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
Diploma thesis describes published attacks on computers and computer networks. Principles of footprinting such as availability check, OS detection, port scanning were described. Next part explains attacks on confidentiality, integrity and availability. In the practical part were created four laboratory tasks and a virtual environment which allowed testing of ARP spoofing, DNS spoofing, SSL strip, Cross-site scripting, SQL injection, flooding attacks (TCP, ICMP, UDP), TCP reset and attack on operating system using backdoor with Metasploit framework. In practical part were also created video samples with attacks and documentation for teachers.
Test implementation of the ACP protocol
Ležák, Petr ; Strašil, Ivo (referee) ; Burda, Karel (advisor)
In general this master’s thesis deals with access control methods and their individual modules and in particular with authentication of supplicants. There are listed authentication methods useful in the implementation of the ACP protocol. ACP protocol is also discussed including possibilities and uses. ACP message format is described in detail with AVP format and types. The transaction mechanism is also mentioned here. The main part of the thesis is focused on software design for protocol testing. Possibilities of the testing are discussed and test scenarios are suggested. Consequently, requirements for test software are listed and its implementation is designed. Furthermore, there is technical documentation of the program. The main ideas used in the program are explained in it. The purpose of each part of the program is written including links between them. Finally, there is a manual for the program. It also contains an illustrative example describing how to make and test a simple scenario of the authentication.

National Repository of Grey Literature : 26 records found   beginprevious17 - 26  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.