National Repository of Grey Literature 20 records found  previous11 - 20  jump to record: Search took 0.00 seconds. 
Historical development of cryptography during the World Wars era
Vaverka, Ondřej ; Ivánek, Jiří (advisor) ; Souček, Martin (referee)
This bachelor thesis deals with the description of cryptographic and cryptanalytic methods during the First and Second World Wars and related historical circumstances. The introduction briefly describes the development of cryptology prior to WWI. The first major chapter examines the application of cryptology during WWI. The next chapter concisely bridges the interwar period, and then focuses on WWII cryptology. The Ultra programme and the problem of Enigma machine is analyzed here in detail. The final chapter is a dedicated to the aftermath of WWII cryptographic efforts in the form of papers by Claude E. Shannon.
Selected encyption methods
MILICHOVSKÁ, Eva
The aim of this thesis is introduction into issues of classical cryptology from its beginnings in the antiquity to the half of the 20th century. Further, the division of basic ciphers on substitutional and transpositional ones is stated. Only the most important ciphers were chosen from the large number and demonstrations of decipherment were stated here, too. Then, the way of decipherment of Vigen?r´s "indecipherable" cipher is showed here.
Use of electronic signature in business communication
Bauer, Oldřich ; Konečný,, Vladimír (referee) ; Dvořák, Jiří (advisor)
Bachelors work is concerned with the electronic signature and it´s use at the most modern level and it is specialized on data security in the world of the eletronic documents. It describes the electronic signature and the electronic registry in technical and legislative way with the use in practice and concrete firm. It also includes information about digital libraries, protection of author rights and personal data, electronic registry and business communication. This work gives comprehensive formulation about the problems of actual state of the legislative and the use in practice.
Security of data stored on the hard disk
Polášková, Markéta ; Hajný, Jan (referee) ; Martinásek, Zdeněk (advisor)
This work is dedicated to the security of data stored on the hard drive of your computer and using encryption. The first part explains the basic concepts of cryptography and describes her in history. In other chapters, this work is dedicated to a description of the side channels and attacks on these channels. How can the attacker obtain information from a cryptographic module. The following section describes the types of encryption they use nowadays and what are their weaknesses. Bachelor thesis continues with examples of individual encryption programs and device ICZ Protect Boot. The last part deals with resistance testing on equipment ICZ Protect Boot. Testing of resistance to flow analysis using a side channel. Finally, bachelor thesis deals with the analysis of communication between the computer and ICZ Protect Boot.
The Security Risks of E-commerce
Bauer, Oldřich ; Konečný, Vladimír (referee) ; Dvořák, Jiří (advisor)
This thesis is concerned with the security risks in company and it is oriented to risks connected with electronic commerce. It describes these technologies a gives comprehensive view to security risks, designed for concrete firm in practice.
Cryptography protocol with public key
Fujdiak, Radek ; Rášo, Ondřej (referee) ; Mlýnek, Petr (advisor)
The Master thesis is an introduction to cryptology. The Thesis describe cryptosystems and selects one ideal cypher for low-power microcontroler. In thesis provides manual for instal development program COde Composer Studio, basic implementation of selected cryptosystem with small numbers and suggestion for implementation selected cyptosystem with big numbers.
Design of hardware cipher module
Bayer, Tomáš ; Stančík, Peter (referee) ; Sobotka, Jiří (advisor)
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and practical implementation are analysed. In the first chapter basic cryptographic terms, symmetric and asymetric cryptographic algorithms and are mentioned. Also usage and reliability are analysed. Following chapters mention substitution, transposition, block and stream ciphers, which are elementary for most cryptographic algorithms. There are also mentioned the modes, which the ciphers work in. In the fourth chapter are described the principles of some chosen cryptographic algorithms. The objective is to make clear the essence of the algorithms’ behavior. When describing some more difficult algorithms the block scheme is added. At the end of each algorithm’s description the example of practical usage is written. The chapter no. five discusses the hardware implementation. Hardware and software implementation is compared from the practical point of view. Several design instruments are described and different hardware design programming languages with their progress, advantages and disadvantages are mentioned. Chapter six discourses the hardware implementation design of chosen ciphers. Concretely the design of stream cipher with pseudo-random sequence generator is designed in VHDL and also in Matlab. As the second design was chosen the block cipher GOST, which was designed in VHDL too. Both designs were tested and verified and then the results were summarized.
New approaches in a field of cryptology: using a biological material
Jeřábková, Kamila ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
Biological cryptology, a new branch of cryptology combines computer science and chemistry together. It uses biological molecules, such as DNA, RNA, PNA or proteins, or it is inspired by biological principles happening in living cells. Biological cryptology is still in the development stage, so the goal of my Master thesis is to describe existing biological cryptologic methods and to draw interest in this new field. Thus the first chapter states advantages of biological cryptology. Then three big chapters follow afterwards, describing chemical background, DNA computing and the most importantly a field of DNA cryptology. In the last chapter I summarized drawbacks which turned up while I was studying those methods and which need to be handled before biological cryptology moves from labs into our normal lives.
.NET & Cryptology
PSÍK, Tomáš
The point of this work is to show how to solve certain cryptographic problems in Microsoft .Net Framework 3.5. The work is divided into three parts. The first is an overview of basic classes and methods which can be used to solve particular cryptographic tasks. This part shows how to use these classes and also is an overview of the most common cryptological terminology also used in this work. The second part shows how to use abstract classes prepared in the framework for implementing an application interface, which unifies usage of all cryptographic transformations under .net. The third part is about deciding on quality of certain implemented cryptographic algorithm. Implementing speed testing application for block ciphers and hash function and it also contains references of basic attacks. Implementations of speed testing program, two block ciphers (Rijndael and Skipjack), all in c#, are listed in Appendix.
Electronic signature and První certifikační autorita
Suková, Lenka ; Toman, Prokop (advisor) ; Štědroň, Bohumír (referee)
This bachelor thesis deals with electronic signature and První certifikační autorita. The theoretical part is aimed at the definition of electronic signature, refers to its advantages and drawbacks and the principles of symmetric and asymmetric cryptology, on which electronic signature is based. It also describes the development of legislation governing electronic signature and provides definitions of selected concepts - certification authority and certificate. The second part deals with the companyPrvní certifikační autorita, one of the only three accredited providers of certification services in the Czech Republic. It contains an introduction of the company, its services, statistics of the Czech certificate market and statistics of the company's issued certificates. Next chapter describes the acquisition process of qualified certificate at První certifikační autorita, an assessment of the service and proposals for its improvement.

National Repository of Grey Literature : 20 records found   previous11 - 20  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.