National Repository of Grey Literature 45 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
Implementation of certification authority and digital signature
Troják, Martin ; Koutný, Martin (referee) ; Lambertová, Petra (advisor)
This master´s thesis deals with problems of certification authorities and digital signature. There are analyzed principles of digital certificates and certification authorities. It describes the the most widely used cryptosystems and hash functions, which are used in communications with certificates and digital signature. Analysis is focused on Public key infrastructure standard, which describes rules of creating of certification authority and digital signature. There is also described detailed principle of digital signature. Next chapters deals with studying of protocol SSL, principles of functions and usage of SSL. Practical part of this thesis realizes certification authority and information system. There is shown used software and configuration of it. Last part describes procedures during using aplication and her realization.
Cryptographic modules for network protection
Tenora, Lukáš ; Pust, Radim (referee) ; Zeman, Václav (advisor)
This work deals with virtual private network (VPN) and authentication. The first section gives the modern cryptographic methods, the work of dealing with problems of authentication and authentication of objects and the issue of VPN. The second part describes the implementation of its own secure network-based technology company SafeNet.
Electronic identification and trust services in electronic transactions
Hrbotický, Lukáš ; Sikora, Marek (referee) ; Zeman, Václav (advisor)
Bachelors thesis talking about problematics of electronic identification and trust services in electronic transactions. It describes and explains concepts used in the area of electronical communication mentioned in regulation eIDAS. Solutions demonstrating trust services are part of the work. As practical part of this thesis was created laboratory exercise, in which will students try the possibilities offered by certification authority. The goal of this work is explanation and definition of concepts according to eIDAS regulations and realization of system demonstrating these services.
Lab of public key infrastructure
Slavík, Petr ; Lambertová, Petra (referee) ; Burda, Karel (advisor)
The aim of this thesis is to study and describe the theme of Public Key Infrastructure (PKI). Within the scope of minute PKI characterization there is a gradual depiction of particular structural elements, which are above all represented by cryptographic operations (asymetric and symetric cryptography, hash function and digital signature); then, there are also individual PKI subjects that are dealt with, like eg. certification authority, certificates, security protocols, secure heap etc. Last but not least there are a few complete Public Key Infrastructure implementation solutions described (OpenSSL, Microsft CA). The practical part of the thesis, a lab exercise, gives potential students the knowledge of installing OpenSSL system based certification authority. The next task educate students how to secure web server with certificate signed with own CA and also how to secure web server users‘ access control through certificates signed by the previously installed CA.
Electronic Mail Room of the BUT
Beran, Martin ; Křena, Bohuslav (referee) ; Marušinec, Jaromír (advisor)
This dissertation thesis attends to problems of electronic registry for VUT. It deals with the principal of electronic registry functioning, electronic signature and it compares offer of the commercial registries. It goes in for the proposal and implementation of the electronic registry for VUT. Since the using of the e- registry on all public service Office was legalized the people can avoid long queues and the employees are avoided from the stress before dead lines. By the communication through the electronic registry is very important the electronical signature. It is almost a full-valued and lawful alternative to the physical signature. For its safety and utility this system employes asymmetric codes and hash algorithm. Presently in many states, where the electronical signature is legalized it is used together with standard X 509 which defines the format of certificates, organization and action of certification authorities. The certification autority ensures safe connection of the person and general key for using of the electronical signature.
Anonymous communication on the internet
Hořejš, Jan ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
The objective of this master’s thesis was to describe current capabilities of anonymous browsing over the Internet. The theoretical part focuses on three main methods of anonymization with main focus on Tor network. The master‘s thesis describes advantages and disadvantages of different solutions and possible attacks on them. In the next part is demonstrated Tor network, implementation of Hidden service and secured access to the server for clients and possible attacks against this proposal. The work also includes the results of measurements of all three anonymizers and the effects on their speed.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Cyber security of endpoint elements
Fabík, Václav ; Procházka, Rudolf (referee) ; Smékal, Zdeněk (advisor)
This paper describes the design of cyber security for endpoints working on the ARM hardware architecture with the Linux operating system and using the TCP/IP and UDP/IP protocols for network communication. In the introduction, the reader is introduced to the basic concepts of cyber security as well as to the public key infrastructure (PKI) and ways of establishing a secure connection. The reader is introduced to the basic security techniques and the standard regulating security for industrial automation systems. In the practical part, the threat assessment of the presented network infrastructure is elaborated, and security functions that are embedded in NXP i.MX 7 processors and can be used for the cryptographic security of these devices are described.
Electronic signature in practice
Blahušová, Klára ; Sikora, Marek (referee) ; Zeman, Václav (advisor)
The topic of this work is electronic signatures and their use in the European Union, while consideration is also given to nations in the European Free Trade Association (Iceland, Liechtenstein, Norway and Switzerland) and others, such as Great Britain, USA and China. Description is given of legislation governing electronic signatures, the form this takes and differences between the aforementioned countries. Each section contains a list of relevant certificate authorities for the territories discussed therein. The first part defines what an electronic signature is and the theory behind it, whereas the other is devoted to application in said territories. A summary of the information provided herein is available online via a dedicated web app.
Electronic Mail Room of the BUT
Beran, Martin ; Křena, Bohuslav (referee) ; Marušinec, Jaromír (advisor)
This dissertation thesis attends to problems of electronic registry for VUT. It deals with the principal of electronic registry functioning, electronic signature and it compares offer of the commercial registries. It goes in for the proposal and implementation of the electronic registry for VUT. Since the using of the e- registry on all public service Office was legalized the people can avoid long queues and the employees are avoided from the stress before dead lines. By the communication through the electronic registry is very important the electronical signature. It is almost a full-valued and lawful alternative to the physical signature. For its safety and utility this system employes asymmetric codes and hash algorithm. Presently in many states, where the electronical signature is legalized it is used together with standard X 509 which defines the format of certificates, organization and action of certification authorities. The certification autority ensures safe connection of the person and general key for using of the electronical signature.

National Repository of Grey Literature : 45 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.