National Repository of Grey Literature 21 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Attacks on Steganographic Systems and Watermarking
Gavornik, Jakub ; Barabas, Maroš (referee) ; Henzl, Martin (advisor)
This thesis focuses on steganalysis, which is detection of steganography, and then on at- tacks on digital watermarking, which aim to invalidate watermarks. The application for stegograms detection is designed and implemented in this thesis. The application focuses on the images, produced by substitution of the least significant bits in QuickStego program. Reliable detection is insured by the designed method, which decodes information embedded in the image, and searches for specific data embedded by the program QuickStego. In the end of the thesis, few experiments are conducted on the sample images, which confirm the ability of detecting stegograms.
Performing a Relay Attack on Mifare Smart Cards
Činčala, Martin ; Henzl, Martin (referee) ; Malčík, Dominik (advisor)
This thesis deals with performing a relay attack on MIFARE smartcards while using off-the-shelf readers only. These readers are not designed for such attacks therefore implementation of the attack that would succeed against every smartcard was not possible. Since various attacks on smartcards have already been implemented, I have focused on the latest and still insufficiently explored card MIFARE Ultralight C. Relay attack has been implemented with simplified emulation of 4-bytes long UID and successfully tested on MIFARE Ultralight C. With the use of other readers it should be possible to perform attack also on other cards like MIFARE Plus, Desfire and SmartMX. For the purpose of cloning MIFARE Classic open-source tools are introduced.
Security of Contactless Smart Card Protocols
Henzl, Martin ; Rosa, Tomáš (referee) ; Staudek, Jan (referee) ; Hanáček, Petr (advisor)
Tato práce analyzuje hrozby pro protokoly využívající bezkontaktní čipové karty a představuje metodu pro poloautomatické hledání zranitelností v takových protokolech pomocí model checkingu. Návrh a implementace bezpečných aplikací jsou obtížné úkoly, i když je použit bezpečný hardware. Specifikace na vysoké úrovni abstrakce může vést k různým implementacím. Je důležité používat čipovou kartu správně, nevhodná implementace protokolu může přinést zranitelnosti, i když je protokol sám o sobě bezpečný. Cílem této práce je poskytnout metodu, která může být využita vývojáři protokolů k vytvoření modelu libovolné čipové karty, se zaměřením na bezkontaktní čipové karty, k vytvoření modelu protokolu a k použití model checkingu pro nalezení útoků v tomto modelu. Útok může být následně proveden a pokud není úspěšný, model je upraven pro další běh model checkingu. Pro formální verifikaci byla použita platforma AVANTSSAR, modely jsou psány v jazyce ASLan++. Jsou poskytnuty příklady pro demonstraci použitelnosti navrhované metody. Tato metoda byla použita k nalezení slabiny bezkontaktní čipové karty Mifare DESFire. Tato práce se dále zabývá hrozbami, které není možné pokrýt navrhovanou metodou, jako jsou útoky relay. 
Tool for Determining Attributions of Online Marketing Activities
Šišák, Ivan ; Henzl, Martin (referee) ; Malinka, Kamil (advisor)
The tool allows distribution of credit for the conversion to various marketing activities. So-called attribution modelling is concerned. The distribution of conversion is described by the models, except those most famous (first interaction model, last interaction model, linear model), that allow to create any distribution of conversion to several marketing activities. The use of this tool may be useful in the surveys of the effectiveness of marketing activities.
Warning System for Cars
Rusnačko, Ivan ; Henzl, Martin (referee) ; Hanáček, Petr (advisor)
This thesis is focused on usability of GPS modul as a warning system. Fitkit was chosen for the implementation of the given system. First part of thesis is focused on theory of GPS technology and NMEA protocol. Then, the Fitkit is analysed and underlying communication with GPS module. Also, there is an desktop application that fills up FitKit with points of interests. The implementation part of thesis is ended up with results of testing. Finally, there is a short proposal of possible extension of this thesis.
Random Number Generators for Cryptography
Matějíček, Jaroslav ; Henzl, Martin (referee) ; Hanáček, Petr (advisor)
The content of this thesis is the design and statistical tests of two di erent hardware random number generators. It also includes an overview of the sources of entropy, algorithms used to correct deviations from the normal distribution and the description of statistical tests.
Cryptographic Protocols for CrypTool
Skowronek, Ondřej ; Zelený, Jan (referee) ; Henzl, Martin (advisor)
This work is focused on cryptographic protocols and their implementation in the CrypTool. Goal of this work is to settle which cryptographics protocols are appropriate to implement and to find the way how to implement them most illustratively and usably for educational purposes.  These protocols were chosen according to the work assigment: Dining Cryptograhpers, Coin Flippin and Zero-Knowledge. As other appropriate protocols were added:  Yao´s Millionaire Problem and Oblivious Transfer. Detailed concept of chosen protocols and their implementation process are described in this work.
Parallelization of Integer Factorization from the View of RSA Breaking
Breitenbacher, Dominik ; Henzl, Martin (referee) ; Homoliak, Ivan (advisor)
This paper follows up the factorization of integers. Factorization is the most popular and used method for RSA cryptoanalysis. The SIQS was chosen as a factorization method that will be used in this paper. Although SIQS is the fastest method (up to 100 digits), it can't be effectively computed at polynomial time, so it's needed to look up for options, how to speed up the method as much as possible. One of the possible ways is paralelization. In this case OpenMP was used. Other possible way is optimalization. The goal of this paper is also to show, how easily is possible to use paralelizion and thanks to detailed analyzation the source codes one can reach relatively large speed up. Used method of iterative optimalization showed itself as a very effective tool. Using this method the implementation of SIQS achieved almost 100 multiplied speed up and at some parts of the code even more.
Security Tool for wifi Network
Hala, Martin ; Henzl, Martin (referee) ; Kačic, Matej (advisor)
The main purpose of this tool is testing wireless networks security level for both personal and commercial use. It is based on latest knowledge about security of wireless networks. Key features are: portability - implemented on live linux distro, simple manipulation - well aranged GUI, testing - rich options of tests selection, security level evaluation - recommendations consequent on NIST standard.
Automatic Kerberos Key Rotation
Kos, Ondřej ; Henzl, Martin (referee) ; Zelený, Jan (advisor)
Práce je zaměřena na autentizační systém Kerberos a jeho správu, převážne v oblasti Keytab souborů. Práce popisuje základní součásti celého systému, které jsou v těchto operacích zapojeny, a jejich hlavní vlastnosti. Částečně je také popsán administrační systém FreeIPA, jenž pro autentizaci uživatelů Kerberos využívá. Hlavním cílem bylo vytvořit aplikaci schopnou automaticky a bez uživatelova přičinění rotovat klíče Kerbera a zvýšit tak úroveň zabezpečení celého systému pro případy odposlechů komunikace.

National Repository of Grey Literature : 21 records found   1 - 10nextend  jump to record:
See also: similar author names
2 Henzl, Marek
Interested in being notified about new results for this query?
Subscribe to the RSS feed.