National Repository of Grey Literature 17 records found  previous11 - 17  jump to record: Search took 0.00 seconds. 
Post-quantum cryptography on constrained devices
Matula, Lukáš ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In recent years, there has been a lot of technological development, which among other things, brings the designs and implementation of quantum computing. Using Shor’s algorithm for quantum computing, it is highly likely that the mathematical problems, which underlie the cryptographic systems, will be computed in polynomial time. Therefore, it is necessary to pay attention to the development of post-quantum cryptography, which is able to secure systems against quantum attacks. This work includes the summary and the comparison of different types of post-quantum cryptography, followed by measuring and analysing its levels of difficulty in order to implement them into limited devices, such as smart cards. The measured values on the PC are used to determine the most suitable implementation on the circuit card and then the verification method itself is implemented on it.
Wireless Network
Šumaj, Boris ; Janováč, Dušan (referee) ; Koch, Miloš (advisor)
The content of this thesis is to illuminate the basic issues of wireless networks. It gives an overview of IEEE 802.11 standards. I´ll analyze these standards with special emphasis on their security and architecture. The next step will be the subsequent creation of a secure corporate network according to the established facts of a particular company.
Wireless Network Aspects
Pluhař, Ondřej ; Ponížil, Michal (referee) ; Koch, Miloš (advisor)
The bachelor’s thesis is about wireless communication, concretely wireless fidelity networks. It deals about IEEE 802.11 standard and also about its modulations. History, development, kinds and properties of wireless network and security is also mentioned. Current situation of one particular company is viewed in further part of the thesis. Some innovations in internet access and security of wireless communication in company network is suggested.
Logging onto OS UNIX Using Mifare Smart Cards
Krempa, Peter ; Nagy, Jan (referee) ; Hanáček, Petr (advisor)
This thessis discusses the use of contactless smart card technology for authentication in an Linux desktop environment. It summarizes the advantages and imperfections of the technology and suggests its other possible uses. The paper describes the methods of authentication, and software designed for logging in and session locking, using Mifare smart cards.
Modern Token-based and Knowledge-based Authentication
Ševčík, Michal ; Pust, Radim (referee) ; Malina, Lukáš (advisor)
This bacherol thesis deals with a modern authentization using an object and knowledge. It mostly focuses on authentization by means of USB token, Smart Java Cards, Smart .NET Cards and NFC technology and their subsequent use in the authentization in a local network.
Current security trends in mobile networks
Jirkovská, Šárka ; Sobotka, Jiří (referee) ; Doležel, Radek (advisor)
This master's thesis deals with the issue of the security of GSM and UMTS mobile communication systems. In the thesis the principles of the authentication and encryption of both the mobile systems are described. Further, the constituent algorithms used for identity verification, key generation and encryption are mentioned. The commonly used algorithms are described along with their weaknesses. In the following part of this thesis, well-known attacks on GSM system are mentioned. In the part where UMTS system is dealt with one can find the algorithms used in this system to increase the security of transmitted data and authentication in comparison with GSM system. Therefore the whole process of authentication and encryption is described separately. In the last part the creation of programming models of authentication and encryption in GSM and encryption in UMTS is described. These models are created in the environment of Matlab version 2009b.
Methods of users autentization in IS
Nazaryan, Armen ; Balada, Jakub (advisor) ; Buchalcevová, Alena (referee)
The Objectives were it to inform the work of outsider Even Slightly hip readers of information technology to the Characteristics of authentication technologies, Their Advantages and disadvantages of a Retrospective Comparison of Methods of logging. Paper outlines the Implementation Process and describes its examples. The Practical Part of the Imperfection of Technology Shows Some errors and biometric security Methods. The structure of work is Divided Into 4 Basic Headings, ergot, authentication methods, Basic Characteristics of names and passwords, and Their proper use, and the Implementation Process and Practical part, the two WHERE Attempts to break the biometric security. Both Attempts were also we Contribution on Methods of authentication. The experience I gained Valuable during Their Performance In the future I definitely has more efforts to keep sensitive data and Forms of Access, The Greatest caution.

National Repository of Grey Literature : 17 records found   previous11 - 17  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.