National Repository of Grey Literature 178 records found  beginprevious174 - 178  jump to record: Search took 0.02 seconds. 
Wardriving
Belák, Peter ; Pavlíček, Luboš (advisor) ; Beneš, Jiří (referee)
The Bachelor Thesis introduces the term Wardriving. It describes in detail the necessary hardware, including the parameters that it needs to meet for this work. Further, it describes in detail the software, its setting and necessary features. The work presents the elementary particulars which have to be complied with for the best results of the survey. Part of this work is a survey of selected areas of settlement Řepy 1, analysis of the data and their comparison.
Password management systems
Karády, Gabriel ; Pavlíček, Luboš (advisor) ; Gála, Libor (referee)
The purpose of this thesis is to describe and compare password managers for users and small teams on different software and hardware platforms. It deals with the problem area of passwords in general, user habits, and comfort and password quality. It further introduces and categorizes password managers and compares a few of them by several criteria, from security -- used encryption and its cryptanalysis, user protection from malware -- through usability -- the abilities and ease of use of the tool, its integration with applications and the operating system -- up to teamwork enhancements -- synchronization abilities and sharing of both single passwords and password databases.
One-Time Pad Implementation
KOPECKÝ, Petr
The text is oriented to generation of random numbers of cryptographic quality and to performing statistical methods such as Diehard test to verify them. The data obtained this way are used in implementation of one-time pad for maximizing security of message encryption. The problems that may occur and need to be dealt with are also noted. The final part of the text includes suggestions for future one-time pad implementations and the final results that author came to.
Internal Certification Authority
Kolb, Jiří ; Pavlíček, Luboš (advisor) ; Bumbala, Jan (referee)
With the rising number of internet users emerged the need for mutual authentication and secure communication. In the open environment of the Internet, this service is provided by a trusted third party using asymetric cryptography. This trusted third party - called Certification Authority - provides identification of the communication partners and the security of their communication through certificates it issues. Many large companies use certification authorities today. The goal of my thesis is the design and implementation of a CA for a small company, along with an evaluation of the benefits of introducing this new technology.
Latest trends in public-key cryptography
Tvaroh, Tomáš ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
The goal of this thesis is to describe principles of public-key cryptography, introduce and compare latest algorithms for asymmetric encryption and point out their advantages over the most popular cryptosystem - RSA. At the beginning, this thesis describes the evolution of public-key cryptography, its differences compared to symmetric-key cryptography and possibilities of using it for data encryption and digital signature. Mathematical background as well as principles of RSA are described afterwards. At the end, this thesis focuses on the latest algorithms on the basis of eliptic curves and their advantages over the most common algorithms are pointed out. The comparison is then summarized and a recommendation for the best cryptosystem is offered.

National Repository of Grey Literature : 178 records found   beginprevious174 - 178  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.