National Repository of Grey Literature 18 records found  previous11 - 18  jump to record: Search took 0.00 seconds. 
Selected encyption methods
MILICHOVSKÁ, Eva
The aim of this thesis is introduction into issues of classical cryptology from its beginnings in the antiquity to the half of the 20th century. Further, the division of basic ciphers on substitutional and transpositional ones is stated. Only the most important ciphers were chosen from the large number and demonstrations of decipherment were stated here, too. Then, the way of decipherment of Vigen?r´s "indecipherable" cipher is showed here.
Possibilities of usage of electronic signature
Tomo, Milan ; Stejskal, Jaroslav (referee) ; Smejkal, Vladimír (advisor)
The bachelor thesis „Possibilities of usage of electronic signature“ proposes to give complete information about technology, laws and possibilities of usage of electronic signature. It clarifies principles of digital signature like symmetric, asymmetric cryptography, HASH function. It explains used terminology like certificate, certification authority, etc. It compares laws concerning electronic signature in Czech republic and in Slovakia. It provides guide to acquisition certificate and its installation. At the end shows possibilities of usage of electronic signature in practice.
Security of data stored on the hard disk
Polášková, Markéta ; Hajný, Jan (referee) ; Martinásek, Zdeněk (advisor)
This work is dedicated to the security of data stored on the hard drive of your computer and using encryption. The first part explains the basic concepts of cryptography and describes her in history. In other chapters, this work is dedicated to a description of the side channels and attacks on these channels. How can the attacker obtain information from a cryptographic module. The following section describes the types of encryption they use nowadays and what are their weaknesses. Bachelor thesis continues with examples of individual encryption programs and device ICZ Protect Boot. The last part deals with resistance testing on equipment ICZ Protect Boot. Testing of resistance to flow analysis using a side channel. Finally, bachelor thesis deals with the analysis of communication between the computer and ICZ Protect Boot.
Cryptography protocol with public key
Fujdiak, Radek ; Rášo, Ondřej (referee) ; Mlýnek, Petr (advisor)
The Master thesis is an introduction to cryptology. The Thesis describe cryptosystems and selects one ideal cypher for low-power microcontroler. In thesis provides manual for instal development program COde Composer Studio, basic implementation of selected cryptosystem with small numbers and suggestion for implementation selected cyptosystem with big numbers.
Design of hardware cipher module
Bayer, Tomáš ; Stančík, Peter (referee) ; Sobotka, Jiří (advisor)
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and practical implementation are analysed. In the first chapter basic cryptographic terms, symmetric and asymetric cryptographic algorithms and are mentioned. Also usage and reliability are analysed. Following chapters mention substitution, transposition, block and stream ciphers, which are elementary for most cryptographic algorithms. There are also mentioned the modes, which the ciphers work in. In the fourth chapter are described the principles of some chosen cryptographic algorithms. The objective is to make clear the essence of the algorithms’ behavior. When describing some more difficult algorithms the block scheme is added. At the end of each algorithm’s description the example of practical usage is written. The chapter no. five discusses the hardware implementation. Hardware and software implementation is compared from the practical point of view. Several design instruments are described and different hardware design programming languages with their progress, advantages and disadvantages are mentioned. Chapter six discourses the hardware implementation design of chosen ciphers. Concretely the design of stream cipher with pseudo-random sequence generator is designed in VHDL and also in Matlab. As the second design was chosen the block cipher GOST, which was designed in VHDL too. Both designs were tested and verified and then the results were summarized.
New approaches in a field of cryptology: using a biological material
Jeřábková, Kamila ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
Biological cryptology, a new branch of cryptology combines computer science and chemistry together. It uses biological molecules, such as DNA, RNA, PNA or proteins, or it is inspired by biological principles happening in living cells. Biological cryptology is still in the development stage, so the goal of my Master thesis is to describe existing biological cryptologic methods and to draw interest in this new field. Thus the first chapter states advantages of biological cryptology. Then three big chapters follow afterwards, describing chemical background, DNA computing and the most importantly a field of DNA cryptology. In the last chapter I summarized drawbacks which turned up while I was studying those methods and which need to be handled before biological cryptology moves from labs into our normal lives.
.NET & Cryptology
PSÍK, Tomáš
The point of this work is to show how to solve certain cryptographic problems in Microsoft .Net Framework 3.5. The work is divided into three parts. The first is an overview of basic classes and methods which can be used to solve particular cryptographic tasks. This part shows how to use these classes and also is an overview of the most common cryptological terminology also used in this work. The second part shows how to use abstract classes prepared in the framework for implementing an application interface, which unifies usage of all cryptographic transformations under .net. The third part is about deciding on quality of certain implemented cryptographic algorithm. Implementing speed testing application for block ciphers and hash function and it also contains references of basic attacks. Implementations of speed testing program, two block ciphers (Rijndael and Skipjack), all in c#, are listed in Appendix.
Electronic signature and První certifikační autorita
Suková, Lenka ; Toman, Prokop (advisor) ; Štědroň, Bohumír (referee)
This bachelor thesis deals with electronic signature and První certifikační autorita. The theoretical part is aimed at the definition of electronic signature, refers to its advantages and drawbacks and the principles of symmetric and asymmetric cryptology, on which electronic signature is based. It also describes the development of legislation governing electronic signature and provides definitions of selected concepts - certification authority and certificate. The second part deals with the companyPrvní certifikační autorita, one of the only three accredited providers of certification services in the Czech Republic. It contains an introduction of the company, its services, statistics of the Czech certificate market and statistics of the company's issued certificates. Next chapter describes the acquisition process of qualified certificate at První certifikační autorita, an assessment of the service and proposals for its improvement.

National Repository of Grey Literature : 18 records found   previous11 - 18  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.