National Repository of Grey Literature 252 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Software support of education in cryptography area based on elliptic curves
Szturc, Jakub ; Sobotka, Jiří (referee) ; Burda, Karel (advisor)
The master‘s thesis is focusing on cryptography based on elliptical curves consists of four main parts. The first part provides an overview of the basic cryptographic and mathematical concepts. A key element of this work is the second part which are described in detail the mechanisms of counting two points on elliptic curve and counting point to themselves over the various fields. On this mechanism is based almost the entire issue. In the third section provides the best-known algorithms and protocols for key exchange, encryption and digital signature. The goal of this paper is to devise software to support teaching. This material is created as a web presentation, which described the theoretical foundations and the main characteristics of cryptosystems based on elliptical curves. The whole issue is supported by practical examples of calculations examples, there are also examples for independent work. Additionally, java applets are prepared that allow an interactive opportunity to try the basic parameters of curves, or verify the calculations.
Lab exercise of electronic burglar alarm system with communication over Ethernet network
Harth, Petr ; Pust, Radim (referee) ; Burda, Karel (advisor)
This bachelor thesis deals with electronic burglar alarm systems that communicate over Ethernet network. On this basis, the lab exercise is designed for an integrated security system Xtralis 3000 to ensure access control and camera surveillance. The concept of lab exercise is justified, and prepared documentation for it. Subsequently, a brief analysis of the Xtralis 3000 system security is also made. The first part describes the development of electronic burglar alarm systems. The history as well as current state of the art of electronic burglar alarm systems are outlined. Also camera surveillance systems and access systems, which are nowadays combined with electronic burglar alarm systems, are briefly mentioned. The thesis goes on by describing the current trend of integrating various security systems into one system that communicates over Ethernet network. In the second part of this thesis the integrated security system Xtralis 3000 is being analyzed. First of all its general characteristics are described and then it goes on by explaining the distribution of the three subsystems, namely the access system S3000, the camera surveillance system V3000 and management software M3000. Subsequently, these systems are being described along with their features. After that, selected network protocols, which integrated security system Xtralis 3000 uses to communicate between its components, are being briefly discussed. In the third part a brief analysis of security integrated security system Xtralis 3000 is carried out. This system is divided into six parts in terms of threats of attacks. The fourth section it is devoted to the concept of lab exercise, which includes introductory balance sheet, the debate over the assigned elements, content and structure of the lab exercise. In the fifth part, is the thesis offers documentation to the lab exercise of integrated security system Xtralis 3000 communicating over Ethernet network, according to which students may perform this lab exercise. And finally, in the sixth part are the instructions for teachers, which describe how to introduce the lab exercise in teaching, with the associated problems and their solutions.
A guide to designing optimal method of backup for big volumes of data
Bartoňová, Veronika ; Vychodil, Petr (referee) ; Burda, Karel (advisor)
This diploma thesis deals with backup for big volumes of data. Data backup is a overlooked area of information technology and the data can be lost by trivial user error or breakdown on any components. In this thesis is discussed theory of backup - archive bit and his behavior based on various type of backup (full, incremental, differential or combination thereof), duration and frequency of backups or the point of ultimate recovery. In addition there are mentioned rotation schemes Round-Robin, GFS and Tower of Hanoi, where are described their principles and graphic diagram of rotation. In chapter Strategy of backup describes the backup strategy via choosing the right choice, taking into technical and economic parameters. Impact analysis, which is explained also in this chapter, describes the important moments in data recovery. For select the optimal strategy is necessary to consider not only the whole capacity of the backup data, but also the size of the backup window for data storage or storage location. In chapter Media storage you can acquainted with all backup media and their technical parameters that are available on the market and can be used for data backup. In section Guide methodology of large volumes of data backup is designed a backup plan with the necessary inputs for the actual implementation of the backup. The design methodology puts emphasis on regular backups and check their location. On practical demonstration is shown that the rotation scheme Tower of Hanoi are among the smallest need for backup media. A part of this thesis is also design of methodology for backup small amounts of data.
Portal of the universal access control protocol
Čepelák, Tomáš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
The paper focuses on the issue of access control. It presents an universal bilateral protocol of access control of ACP. The paper describes the messages and its sequences that AC portals uses for communication. It describes the functions and features of the modules from which the portal is composed. The paper suggests the concept of a modular AC portal solutions including the design of basic modules. It also outlines possible test scenarios. Under this proposal is generated functional AC portal on the .NET Framework platform using the C\# programming language. The portal provides access to local assets or to the assets on other computers in the local network. Created application is tested according to the scenarios proposed in both the network version and the local version of the AC portal. Test results are objectively evaluated and commented.
Lab exercise of the hidden camera and intercept.
Kočíř, Michal ; Pust, Radim (referee) ; Burda, Karel (advisor)
This thesis deals with design and build lab exercise of the hidden camera and intercept. The thesis describes the history of emission of safety, types of intelligence, intercept, camera and build their own laboratory experiments. The first chapter describes the history of the issue of safety. In the next chapter intelligence activities are focused on different types of intelligence. In Chapter interception mentioned the location, description and utilization, protection against eavesdropping and acoustic equipment GSM. Then the chapter describes the various camera parameters, location and detection. In other kapitel describes the concept of laboratory tasks. In the next chapter describes the design and build their own laboratory experiments. Then in the next chapter describes the design and build their own lab exercise. In this work are designed and assembled two lab exercise. The role of the laboratory deals with acoustical interception. The second deals with the role of the laboratory system of hidden cameras. The laboratory is the role of acoustic interception device used in radio memory analyzer MRA-3, with which you can find radio frequencies in the laboratory. In this lab exercise is also attached table of the laboratory spectrum. In the table are recorded audible radio frequencies to find in the lab. The table also recorded two intercept devices that we have attached the lab exercise. In the second lab exercise used hidden cameras are analogue devices video receiver, camera and video scanner XCS-99X. This role is focus tested the camera with attached zoom tools, which are accompanied by lab exercise. This target is gradually record in video receiver. The laboratory tested the role of distance function and image transmission between the camera and analog video receiver. Then tested the functionality of short smart noise generator SNG.
Data transmition security with Reed-Müller codes
Hrouza, Ondřej ; Burda, Karel (referee) ; Němec, Karel (advisor)
The aim of this work is to propose a Reed-Muller code that secure data transfer to t = 4 independent errors, the information rate R ? 0,5 and for this code to produce a detailed proposal for implementation of the codec. In order to implement this proposal, it is necessary to familiarize themselves with the basic properties Reed-Muller codes. To understand the function of codec Reed-Muller code is in this thesis analyzed the process of encoding and decoding, which is based on a method of using the majority logic. For the design of codec, which consists of encoder and decoder, are used programmable logic circuits FPGA. These circuits are programmed in VHDL language, when for the design source codes is used Xilinx ISE 10.1. In thesis is examined in detail the structure and function of the encoder and decoder chosen Reed-Muller code and there are presented parts of the proposed source codes. Verify the functional ability of the codec is achieved by simulation in program ModelSim SE 5.7f. The simulation results together with the another proposal realization are output of this work.
Authentication of web service users
Plašil, Matouš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
In this bachelor thesis are presented methods for Single Sign-On from perspective of client application. It takes a closer look at protocols OpenID and OAuth and explains the main differencies. Next part of the thesis is focused on registration of application and communication between server and client application. This is realized by OAuth protocol. In the practical part is described a created web application and used methods are explained.
Low-level data reading from computer data storages
Šalko, Jaroslav ; Ležák, Petr (referee) ; Burda, Karel (advisor)
The following work is topically focusing on data restore of selected memory devices. It could be divided into two theoretical parts and one practical. The first part consist explanation of these memory media’s structure, the mechanism of their storage and also how operating system approaches these data. This relates also to a file system, which is among with its most commonly used types described there as well. In the second theoretical part the study focuses on the storage damage problematics. Various types of damage are shown and I examine how we could approach them. The work concentrates on possibilities which owners of the damaged storage media have with an emphasis on specialized companies. Therefore the study contains brief information of four selected domestic companies which are offering data restore on the Czech market. The complete list of services, which these companies offer to their customers, is shown in the chart found by the end of chapter. The second option in order of solving media damage problems are freeware programmes. On the basis of an internet poll dealing with the topic „best programmes for data restore“, I have chosen three programmes to be examined. The examination consisted of uploading certain files on the media storage which was formated by high level method afterwards. Through these three programmes I tried to restore the lost data. The results are included in a chart found by the end of each sub-chapter. The practical part of my work deals with linux program for data restore DDrescue. My effort consists of developing and creating an user friendly interface with intuitive manipulation of this helpful tool. My goal is thus spreading this program into the public and providing them simple tool for efficient low-level data restore.
Software support for cryptography education
Stančík, Peter ; Vyoral, Josef (referee) ; Burda, Karel (advisor)
The main aim of this thesis was to study, choose and decribe techniques eligible for cryptography education. A pedagogically appropriate presentation for the selected techniques' principles was to be chosen. Another goal was to create an integrated modular web interface containing a calculator focused on cryptographic operations. The eligibility of techniques was assessed accordingly to the computing processes implied by these techniques and also accordingly to the ability of being presented in an illustrative way. A program simplifying calculations used in symetric and asymetric cryptography was designed and implemented. It disposes of a web interface and one of its parts is focused on steganographic techniques. On the other hand, any pedagogically appropriate presentation interconnecting this program with theoretical findings from this field was not found.
Strong Cryptography on Smart Cards
Konečný, Jakub ; Burda, Karel (referee) ; Malina, Lukáš (advisor)
The diploma thesis is focused on cryptography with smart cards. It describes smart cards from hardware and software side. The thesis compares well known operating systems used on smart cards. Specified operating systems are widely analyzed. There is introduction to password authenticated key establishment protocols. PACE protocol is described in details together with implementation proposal. The implementation on the Basic card platform follows. In the end there is the time analysis of the implementation and further improvements are suggested.

National Repository of Grey Literature : 252 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.