National Repository of Grey Literature 152 records found  beginprevious21 - 30nextend  jump to record: Search took 0.00 seconds. 
Modern trends in Wi-Fi IEEE 802.11 networks security
Lieskovan, Tomáš ; Škorpil, Vladislav (referee) ; Endrle, Pavel (advisor)
This work treats the matters of wireless networks, Wi-Fi. The paper describes the various principles of coding, such as WEP, WPA and WPA2. At first the WEP security method is analyzed with the view of the fact that it doesn´t meet contemporary safety requirements, further its successor WPA, namely TKIP and AES authentication methods, and last but not least WPA2 which nowadays serve as a safety standard. The work assesses the safety risks of individual security methods and makes several recommendations to achieve maximum security for wireless networks. In the work a commercially available hardware and for free dissemination available software (Open Source) are used.
Instant Messenging System
Fiedor, Jan ; Kašpárek, Tomáš (referee) ; Ráb, Jaroslav (advisor)
Nowadays many instant messenging clients exist. However, it is true, that many of them do not solve the security issues connected with communication, often deal with file transfer problems and are linked with specific protocol. This thesis is trying to find out the best solution of those problems and use it to develop secure and reliable client independent of concrete protocol.
Hardware accelerated data transfer using TLS protocol
Zugárek, Adam ; Pokorný, Jiří (referee) ; Smékal, David (advisor)
This paper describes implementation of the whole cryptographic protocol TLS including control logic and used cryptographic systems. The goal is to implement an application in the FPGA technology, so it could be used in hardware accelerated network card. The reason for this is new supported higher transmission speeds that Ethernet is able to operate on, and the absence of implementation of this protocol on FPGA. In the first half of this paper is described theory of cryptography followed by description of TLS protocol, its development, structure and operating workflow. The second half describes the implementation on the chosen technology that is also described here. It is used already existing solutions of given cryptographic systems for the implementation, or at least their parts that are modified if needed for TLS. It was implemented just several parts of whole protocol, such are RSA, Diffie-Hellman, SHA and part of AES. Based on these implementations and continuing studying in this matter it was made conclusion, that FPGA technology is inappropriate for implementation of TLS protocol and its control logic. Recommendation was also made to use FPGA only for making calculations of given cryptographic systems that are controlled by control logic from software implemented on standard processors.
HiFi DA Converter with Integrated Headphone Amplifier
Doležal, Pavel ; Jaroš, Jiří (referee) ; Šimek, Václav (advisor)
This thesis is dealing with a design and fabrication of D/A coverter and headphone amplifier for stereo reproduction in Hi-Fi class. In opening chapter, overall problematics of digital audio signal distribution is discussed. Following chapters are dedicated to converter design, communication protocols, component selection, converter production, circuitry design and firmware programming. The final chapter is dealing with expansion options such as HDMI inputs and surround sound.
Wireless Network Security
Sedlák, Břetislav ; Krajsa, Ondřej (referee) ; Lambertová, Petra (advisor)
Master thesis focuses on wireless network security. The thesis is divided in two parts. First part describes today’s used standards and their components, topology and security methods as stealth SSID, MAC addresses filtration, WEP, WPA and WPA2. The last three methods are described in detail. In second part there are realized attacks on above described methods of security. There are described attacks on WEP as KoreK chopchop attack, fragment attack, attack FMS, KoreK and attack PTW. Then is described the dictionary attack on passphrase by WPA/WPA2 with PreShared Key authentication obtaining, precomputed hash tables for faster passphrase finding and for using more core procesors during dictionary browsing. The last attack describes obtaining of keystream used for encrypting of frames by WPATKIP and then sending custom data to client. It is described how to carry out each attack and how to protect against them.
Rhodium in the environment
Ondreášová, Klára ; Nevrlá, Jana (referee) ; Komendová, Renata (advisor)
This bachelor thesis focuses on the characteristic of rhodium, its use in the automotive industry, the occurrence in environmental compartments (air, soil, vegetation, water), accumulation and transformations. In this thesis there are also described methods of sampling for determination, the types of sample preparation, separation and preconcentration techniques necessary prior to instrumental analysis. The work also focuses on the most commonly used analytical methods of rhodium determination, which are spectrophotometric methods, AAS, ICP-AES and ICP-MS.
FITkit - PC Crypted Communication
Kouřil, Miroslav ; Strnadel, Josef (referee) ; Růžička, Richard (advisor)
This thesis deals with the issue of concealing confidential data being transmitted in between two systems. The coding standard AES as a block symmetric cipher has been selected. In practise, the connection between the FITkit platform and a PC was set via serial communication. The FITkit is programmed in language C and the PC in language C++ . There has been designed a simple protocol for setting up the connection and for the information exchange about encoding. Due to the difficulties with serial communication on the kit side there have been created two applications. The first application reads encoded kit data and translates them with the assistance of  preset values. The second one communicates with the kit emulator on the other computer and works at full range, what means - establishing the connection, generating keys modes  and number of encoding rounds, safe key exchange and the possibility of data reading and writing to the kit.
Study of catalytic decomposition of silica
Štubian, Martin ; Kolíbal, Miroslav (referee) ; Bábor, Petr (advisor)
This thesis deals with catalytic decomposition of silica using electron microscopy and Auger spectroscopy. The thesis is primarily focused on the Au-Si phase, which is created during in the reaction. In the theoretical part, the principle of used methods is described and recherche on the catalytic decomposition of silica is presented. The practical part contains the results of the measurements and their interpretation.
Countermeasures of power analysis
Gerlich, Tomáš ; Malina, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
Side channels affect a security of the cryptographic systems, due to it is necessary to focus on implementation of the algorithm. There are mention basic classification of side channels in the beginning of the work. The following chapter describes types of countermeasures against side channel attack, which the most emphasis on masking, because of possible implementations on existing cryptosystems. Masking techniques are introduces in the following chapter, where is a description of their method of masking, treatment of cipher and their resistance against attack. The practical part describes the measurements that are trying to record the power consumption of the microcontroller. Measurement was designed to examine primarily on information leakage through power side channel.
Securing narrowband wireless communication in licensed band
Kolaja, David ; Brychta, Josef (referee) ; Fujdiak, Radek (advisor)
Contemporary demand for mobile devices and development of devices in the Internet of Things is constantly increasing. This reality also raises concerns about security and privacy of ongoing communication. This is no exception for expanding scale of Low Powered Wide Area Network (LPWAN) devices which communicate over Narrowband IoT and the customer of such devices who has to rely on security of provider’s network to secure customer’s data. This security is effective only in operator’s network while there is no end-to-end encryption enabled. Therefore, this thesis deals with the analysis of NB-IoT communication and its possible end-to-end security proposal, which also provides elements of post-quantum algorithms. Last but not least, this thesis deals with application of this proposal on constrained device and evaluation of its effectivness of time, energy and memory demands.

National Repository of Grey Literature : 152 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.