National Repository of Grey Literature 4 records found  Search took 0.00 seconds. 
NSA Suite-B Cryptography algorithms
Rybka, Štěpán ; Malina, Lukáš (referee) ; Sobotka, Jiří (advisor)
This thesis entitled Algorithms Group SuiteB NSA Cryptography deals with algorithms, which are included in the set SuiteB. They serve to increase data protection and security during their transmission over an unsecured Internet environment. It also contains analysis of these algorithms, the encryption, decryption, creating hashes, key exchange, creating a signature and its verification. The algorithms are compared with others, already obsolete, or still used. The following are protocols using these algorithms. Output from the practical part is a web presentation that can serve as a teaching material.
Simulation scenarios in IT Guru environment for Communication technology course
Rybka, Štěpán ; Hasmanda, Martin (referee) ; Jeřábek, Jan (advisor)
This thesis called Simulation scenarios in an IT Guru enviroment for Communication Technologies deals with the design of laboratory experiments for the above-mentioned subject. The first part is a theoretical introduction to the protocols. The practical part contains the tasks itself. The work includes four laboratory tasks with a detailed description of the work and an illustrative pictures. The first two tasks are focused on the application protocols, with which the user comes into contact with every day. The other two are focused on routing protocols, precisely the internal routing protocol IS-IS and BGP external routing protocol. A free version of simulation software OPNET Modeler and IT Guru enviroment version 9.1.A were used to create the work.
NSA Suite-B Cryptography algorithms
Rybka, Štěpán ; Malina, Lukáš (referee) ; Sobotka, Jiří (advisor)
This thesis entitled Algorithms Group SuiteB NSA Cryptography deals with algorithms, which are included in the set SuiteB. They serve to increase data protection and security during their transmission over an unsecured Internet environment. It also contains analysis of these algorithms, the encryption, decryption, creating hashes, key exchange, creating a signature and its verification. The algorithms are compared with others, already obsolete, or still used. The following are protocols using these algorithms. Output from the practical part is a web presentation that can serve as a teaching material.
Simulation scenarios in IT Guru environment for Communication technology course
Rybka, Štěpán ; Hasmanda, Martin (referee) ; Jeřábek, Jan (advisor)
This thesis called Simulation scenarios in an IT Guru enviroment for Communication Technologies deals with the design of laboratory experiments for the above-mentioned subject. The first part is a theoretical introduction to the protocols. The practical part contains the tasks itself. The work includes four laboratory tasks with a detailed description of the work and an illustrative pictures. The first two tasks are focused on the application protocols, with which the user comes into contact with every day. The other two are focused on routing protocols, precisely the internal routing protocol IS-IS and BGP external routing protocol. A free version of simulation software OPNET Modeler and IT Guru enviroment version 9.1.A were used to create the work.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.