| |
|
Multicast Data Tunneling
Stodůlka, Stanislav ; Skořepa, Michal (referee) ; Šimek, Milan (advisor)
This document contains introducion of terms in routing multicast data and their tunneling in network. As well developing aplication in Java to test sending unicast and multicast data through network. Aplication are based on client/server. Document describe Linux daemon mrouted and alternativ daemons with similar function of routing multicast data.
|
|
Optimization method based on TRUST for image registration
Pernicová, Lenka ; Mézl, Martin (referee) ; Harabiš, Vratislav (advisor)
The aim of the thesis is optimization for a medical images registration. The basis is to acquaint with the images registration and to peruse component global optimization methods, especially an optimization method TRUST. After theoretic knowledge it is possible to proceed to a suggestion of an optimization method based on the TRUST method and to realize in the program setting MATLAB. Created algorithms has been tested on test data and compared with other optimization methods as Simulated annealing.
|
|
Hash functions - characteristics, implementation and collisions
Karásek, Jan ; Sobotka, Jiří (referee) ; Lambertová, Petra (advisor)
Hash functions belong to elements of modern cryptography. Their task is to transfer the data expected on the entry into a unique bite sequence. Hash functions are used in many application areas, such as message integrity verification, information authentication, and are used in cryptographic protocols, to compare data and other applications. The goal of the master’s thesis is to characterize hash functions to describe their basic characteristics and use. Next task was to focus on one hash function, in particular MD5, and describe it properly. That means, to describe its construction, safety and possible attacks on this function. The last task was to implement this function and collisions. The introductory chapters describe the basic definition of hash function, the properties of the function. The chapters mention the methods preventing collisions and the areas were the hash functions are used. Further chapters are focused on the characteristics of various types of hash functions. These types include basic hash functions built on basic bit operations, perfect hash functions and cryptographic hash functions. After concluding the characteristics of hash functions, I devoted to practical matters. The thesis describes the basic appearance and control of the program and its individual functions which are explained theoretically. The following text describes the function MD5, its construction, safety risks and implementation. The last chapter refers to attacks on hash functions and describes the hash function tunneling method, brute force attack and dictionary attack.
|