Národní úložiště šedé literatury Nalezeno 3 záznamů.  Hledání trvalo 0.00 vteřin. 
Modular network communication using post-quantum cryptography
Kopecký, Samuel ; Malina, Lukáš (oponent) ; Smékal, David (vedoucí práce)
Current cryptography primitives, which are described at the begging of this thesis will be broken by future quantum computers. How they will be broken is described by this thesis along with a very basic description of quantum mechanics which are key to functional quantum computers. Available solutions like post-quantum cryptography are also introduced. More specifically code-based, hash-based and lattice-based cryptography. Lattice-based cryptography is described in most detail and specific NIST standardized algorithms are introduced – Kyber and Dilithium. Along with the theoretical description, an implementation is provided for both of the algorithms and a comparison to existing implementations in the programing language Go. Practical utilization of these algorithms is realized with a modular quantum-resistant communication application. It can send arbitrary data through a quantum-resistant secured channel and is well adjusted to the UNIX universal text interface. Notably it is able to exchange files between two users and also create a Terminal User Interface with which the users can communicate. The underlying protocol that is responsible for creating the secure channel is well defined in the latter chapters of this thesis. The modularity of the applications also allows users to remove or/and add any Key Exchange Mechanism or Digital signature which are responsible for the creation of the secure channel with very few code changes and good integration to the existing components of the application.
Web Server Security Analyzation Tool
Kopecký, Samuel
Nowadays it is common practice to have a securely hosted web server. To have a secureweb server it is required to ensure that CIA (Confidentiality, Integrity, Availability) triad is in place.CIA triad is fulfilled by using different mechanisms like symmetric cryptography and public keyinfrastructure. These mechanisms on the other side use a set of algorithms and parameters. Thispaper focuses on the automation of analyzing the security of these algorithms, parameters and alsovulnerability testing.
Automatic tool for checking the level security of a web server
Kopecký, Samuel ; Martinásek, Zdeněk (oponent) ; Smékal, David (vedoucí práce)
Nowadays it is common practice to have a securely hosted web server. To have a secure web server it is required to have the CIA (Confidentiality, Integrity, Availability) triad is in place. CIA triad is fulfilled by using mechanisms like symmetric cryptography and public key infrastructure. Protocol TLS (Transport layer security) enables the provision of the CIA triad and its function is described in the first part of this thesis along with the basics of cryptography. In the second part a tool written in the programming language Python is presented, which enables automation of security analysis of algorithms and parameters used by TLS. The tool is also capable of analyzing supported versions of the TLS protocol by a web server. Another feature of the tool is scanning a specific web server implementation. It can also analyze a few chosen vulnerabilities which are also described in the second part. At the end of the thesis the testing environment which was created to test the tool is described.

Viz též: podobná jména autorů
1 Kopecký, Šimon
2 Kopecký, Štěpán
Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.