Národní úložiště šedé literatury Nalezeno 33 záznamů.  1 - 10dalšíkonec  přejít na záznam: Hledání trvalo 0.01 vteřin. 
Quantum and Post-quantum Cryptography
Krivulčík, Andrej ; Ricci, Sara (oponent) ; Hajný, Jan (vedoucí práce)
With advances in quantum computing comes the threat of breaking the algorithms that are used in everyday communication. With this, an industry of post-quantum cryptography has emerged that develops algorithms resistant to quantum computers. The aim of this thesis is to study methods for combining and using keys established by quantum and post-quantum algorithms in such a way that if one of the given algorithms is broken the resulting hybrid key will still be secure. The resulting key is then used in encrypting the file using AES--256 which is sent between clients.
Web application on elliptic curve cryptography
Štark, Daniel ; Dzurenda, Petr (oponent) ; Ricci, Sara (vedoucí práce)
Elliptic Curve Cryptography is currently the most used form of public-key cryptography. Theoretical part of this thesis is divided to two chapters. The first chapter describes important topics from algebra and number theory, on which the Elliptic Curve Cryptography is built. This includes groups, finite fields, elliptic curves themselves and the mathematical principles of two well-known and used protocols -- ECDH and ECDSA. The second chapter describes the tools, which were used for implementation of user-friendly web application, capable of simulating fundamental operations on elliptic curves and the aforementioned protocols. Key tools, which are introduced in this chapter, are mathematics software system SageMath and framework Spring, used for implementation of web applications in Java. The third chapter of this thesis describes the way the introduced tools were used, ergo the implementation of the web application itself.
Atributová autentizace na platformě Android
Strakoš, Jan ; Ricci, Sara (oponent) ; Malina, Lukáš (vedoucí práce)
Diplomová práce se zabývá implementací pilotního systému atributové autentizace na platformě Android. Podpora atributové autentizace na platformě Android je co do počtu implementací velmi slabá a je potřeba jí věnovat zvýšenou pozornost. V teoretické části práce je rozebrána kryptografická podpora na platformě Android, využití nástroje Android NDK (Native Development Kit) a služby HCE (Host-Card Emulation). Součástí teoretické části práce je i popis schémat systému atributové autentizace včetně pilotního systému RKVAC. Praktická část popisuje průběh implementace systému RKVAC na platformě Android společně s implementací vlastního kryptografického jádra založeného na nativní kryptografické knihovně MCL. V závěru práce jsou uvedeny výsledky měření časové, paměťové a výpočetní náročnosti vytvořených mobilních aplikací.
Web application demonstrating lattice-based cryptography
Sečkár, Martin ; Jedlička, Petr (oponent) ; Ricci, Sara (vedoucí práce)
The aim of this thesis is to develop and implement a web application demonstrating lattice-based cryptography. The application was developed using mainly the Python programming language and Docker container platform. More specifically, the modules utilize the Bokeh library and custom JavaScript functionality expanding the Bokeh library. The modules are hosted on a Flask server where the background calculations are being computed using numPy library. The application contains three modules describing the closest vector problem, learning with errors problem and the Boyen cryptographic protocol based on the latter problem. Users are able to visualize two dimensional lattices and perform selected computations. The codebase is easily expandable and can serve as a learning platform. The thesis also includes installation and user manual.
Cryptographic Escape Room Game
Nosek, Ondřej ; Jedlička, Petr (oponent) ; Ricci, Sara (vedoucí práce)
The thesis deals with the implementation of the escape room game in the form of a~web application. The topic of each room is cryptography in many forms. Concretely it is modular arithmetic, a system for data encryption, including its particular algorithms, as~Advanced Encryption Standard is, or network security basics. The main goals of the thesis are to get acquainted with the topic of escape games, web applications, and the realization of web applications. The escape game contains a total of~four rooms. The thesis describes the choice of technologies on which the application will be built and the implementation of individual rooms, including the possibility of~solving tasks. In the end, it summarizes the achieved results and goals.
Application for monitoring of Linux servers
Kačmarčík, Martin ; Ricci, Sara (oponent) ; Komosný, Dan (vedoucí práce)
PlanetLab Server Manager is an application helping users to develop distributed network projects using the PlanetLab network. It gives an ability to search for a server by its geographical position and access these servers. It offers functionality to render servers on world map. This thesis covers details of the PlanetLab network and its infrastructure. It describes PlanetLab Server Manager (also known as plbmng) and identifies its problems in the current version. The thesis aims to address these problems and describes all the improvements made to the application. Finally, it analyzes the overall status of PlanetLab network using the newly developed tools for status monitoring. To help enable the network projects even further, this Master thesis aims to improve the current application by re-writing it fully into Python 3 language. As the current application is implemented in Bash reimplementation requires complete re-design and re-implementation of functions and will allow to fully utilize perks of Python 3 language. Thesis also aims to extend existing functionality by adding support for filtering servers by their operational status and other small improvements. Application source code is available on GitHUB under the MIT license and the application is available in the PyPI repository as well.
Cryptography on Programmable Smart Cards
Wikarská, Dagmar ; Ricci, Sara (oponent) ; Hajný, Jan (vedoucí práce)
This thesis explores the topic of cryptography schemes using anonymous credentials and revocation. It uses smart cards as anonymous authentication devices with blacklist revocation. Final output of this work is an implementation of a revocation scheme CDH16 on MultOS platform. Secure authentication devices used in banking, transportation, or building access, en- hances anonymity of the user. Implemented protocols could be used as such tools, pre- venting verifier from knowing irrelevant private information. Added revocation scheme protects from misuse of revoked cards by using blacklisting. Blacklisted cards are blocked and verification fails. This requires update of all verifiers blacklist each epoch.
Web application for Cybersecurity Job Ads Analysis
Turek, Adam ; Sikora, Marek (oponent) ; Ricci, Sara (vedoucí práce)
The bachelor’s thesis aims to create an interactive global map showing a database of job advertisements in a web application and perform filtering according to various parameters, where machine learning analysis is then performed. The map also shows the number of job advertisements by country. The web application is created using the ReactJS JavaScript library associated with LeafletJS, which provides the main functionality. The machine learning and script change parts are implemented using Python’s programming language. The thesis describes the theoretical part and implementation of individual map functions and deals with the description and successful modification of scripts to perform machine learning.
Amplifying Cyber Threat Intelligence Analysis with Honeypots
Janout, Vladimír ; Gerlich, Tomáš (oponent) ; Ricci, Sara (vedoucí práce)
This thesis aims to research honeypots as a source of data for cyber threat intelligence analysis. To conduct this, a honeypot instance is configured and exposed to the internet in the cloud for a specified period. In the next part, a Python tool for querying three threat intelligence feeds is proposed. This tool serves for indicator enrichment. The utility of the tool is demonstrated in practice by enabling the analysis of indicators observed on the honeypot infrastructure. The last part of the work discusses the results and trends in the attacker’s behaviour based on the collected and processed data. In a case study, the focus is given to a single SSH session of interest and the acquired knowledge from it is mapped to the MITRE ATT&CK framework revealing attackers tactics, techniques and procedures.

Národní úložiště šedé literatury : Nalezeno 33 záznamů.   1 - 10dalšíkonec  přejít na záznam:
Viz též: podobná jména autorů
3 Ricci, S.
Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.