National Repository of Grey Literature 99 records found  beginprevious90 - 99  jump to record: Search took 0.01 seconds. 
Attack on Encrypted Disk Volumes Using GPU
Sedlo, Ondřej ; Holkovič, Martin (referee) ; Hranický, Radek (advisor)
The aim of this thesis is to create an extension of the Fitcrack tool, which will recover passwords from disk volumes encrypted by TrueCrypt. The introduction part describes the Fitcrack tool which is used for password recovery and supports many different formats of files, and OpenCL framework which is used for computation acceleration. The thesis also deals with the TrueCrypt tool, and its possibilities of use, encrypted disk volumes analysis and cryptographic algorithms used by TrueCrypt to encrypt disk volumes. Furthermore, the work includes a concept and implementation of the Fitcrack module which will be used to recover passwords from disk volumes encrypted by TrueCrypt. At the end of the work we can see results of our experiments that compare speeds of CPU and GPU.
Rule-Based Password Generation
Jiránek, Karel ; Matoušek, Petr (referee) ; Hranický, Radek (advisor)
The thesis describes password generation based on rules and parallel generation of passwords on GPU with OpenCL framework. The thesis addresses the design of a password generator for Fitcrack tool. Module for generation of passwords uses machine learning with real passwords to reduce time to find a correct password.
Attack On OpenDocument Encryption Using GPU
Jakubík, Samuel ; Čejka, Rudolf (referee) ; Hranický, Radek (advisor)
The aim of this work is to extend Fitcrack with a module that allows the recovery of passwords from Open Document Format documents using either CPU or GPU to accelerate the process. The thesis further analyses the structure of the Open Document Format. Subsequently, it describes the functions and algorithms used to encrypt Open Document Format files. The GPU module is implemented with the use of the OpenCL framework. Both the time needed to recover the password and the acceleration of the process using the graphics card were measured. The work also contains a comparison between an existing tool that supports decryption of this format and the newly implemented module.
Microsoft Office Password Recovery Using GPU
Zobal, Lukáš ; Veselý, Vladimír (referee) ; Hranický, Radek (advisor)
This thesis describes the password recovery of Microsoft Office documents by expanding an existing tool Wrathion. The thesis explains the issue of digital document protection, modern encryption and hashing algorithms and rudiments of OpenCL standard. Next, the analysis of structure of MS Word, MS Excel and MS PowerPoint documents is performed, including all the versions since 1997. Using this knowledge, we create a draft and an implementation of improved DOC module for newer versions of the encryption, as well as a draft and an implementation of brand new modules for XLS and PPT formats and their newer variants DOCX, XLSX and PPTX. After that, we measure performance of the new modules and compare it with other competing password recovery tools.
Use of Heuristics for Password Recovery with GPU Acceleration
Gazdík, Peter ; Holkovič, Martin (referee) ; Hranický, Radek (advisor)
This thesis discusses various techniques to enhance the password recovery process with GPU acceleration. The first part introduces a Markov model and simple regular expressions. These techniques dramatically reduce the password space to be searched. This is based on observations of users and their use of letters in passwords. We propose the design of a parallel algorithm that combines both techniques. Last part of the thesis contains the results of experiments to prove benefits of Markov model.
Password Recovery of ZIP Archives Using GPU
Večeřa, Vojtěch ; Veselý, Vladimír (referee) ; Hranický, Radek (advisor)
The main goal of this thesis was to expand tool Wrathion by adding yet unsupported encryption methods of .ZIP format and by adding support for .7z format. This thesis contains the description of used technologies, detailed analysis of formats denoted above, as well as the description of module designs and implementations. All functionalities were tested on real devices. The measurement results contain information about time needed for password recovery, performance and acceleration of the password recovery. The thesis also covers comparison with other known tools.
Password Recovery of RAR, BZIP, and GZIP Archives Using GPU
Mikuš, Dávid ; Holkovič, Martin (referee) ; Hranický, Radek (advisor)
This thesis describes cryptographic protection and the implementation of file password of RAR, GZIP, BZIP formats. For password recovery multi platform Wrathion tool is used, the tool can obtain a password from an encrypted file by using its modules and password generators. The module provides parsing of input file and storing data, which are later used for password validation. To accelerate calculations, graphics card and OpenCL framework is used. The core of thesis is the implementation of Wrathion's modules for password recovery of the formats denoted above and measuring the speed and comparision with competeting tools.
Password Recovery in Distributed Environment
Kos, Ondřej ; Veselý, Vladimír (referee) ; Hranický, Radek (advisor)
The goal of this thesis is to design and implement a framework allowing password recovery in a distributed environment. The research is therefore focused on analyzing the security of passwords, techniques used for attacks on them and also presents methods preventing attacks on passwords. Described is the Wrathion tool which is allowing password recovery using acceleration on graphic cards through the integration of OpenCL framework. Conducted is also an analysis of available environments providing means to run computing tasks on multiple devices, based on which the OpenMPI platform is chosen for extending Wrathion. Disclosed are various modifications and added components, and the entire system is also subjected to experiments aiming at the measuring of scalability and network traffic performance. The financial side of the use of Wrathion tool is also discussed in terms of its usability in cloud based distributed environment.
Fake Data in Computer Networks
Hranický, Radek ; Veselý, Vladimír (referee) ; Polčák, Libor (advisor)
This thesis describes basic principles of lawful interception systems in computer networks and it contains an analysis of various methods of their deception. It also contains a description and implementation of two software tools. The first one is designed to demonstrate an attack on the lawful interception system. The goal is to deceive the system by hiding a transmitted message in a noise, in order to make the law enforcement agency interpret a fake message as the real one. The purpose of the second tool is to obtain the original message from data captured by the interception system.
Additions to Lawful Interception System
Hranický, Radek ; Ryšavý, Ondřej (referee) ; Polčák, Libor (advisor)
As a part of the Modern Tools for Detection and Mitigation of Cyber Criminality on the New Generation Internet project, a Lawful Interception System was developed. This thesis describes additions to the system, which provide a capability to intercept application protocols (eg. an e-mail communication) directly in a network of an Internet service provider. This new functionality enables automatic detection and filtering of a related TCP transfer. It is also able to handle situations, in which the identity (an IP address) of a target user is not known yet, or when it is difficult to detect it (NAT is in progress, user is at an Internet café, behind the firewall, etc.). One of the most important requirements for the developed prototype is the ability of a fast packet proccessing with maximum throughput and minimal packet loss. Therefore, this thesis also consists of a performance profiling, an identification of critical points and their optimalization.

National Repository of Grey Literature : 99 records found   beginprevious90 - 99  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.