National Repository of Grey Literature 33 records found  beginprevious24 - 33  jump to record: Search took 0.01 seconds. 
Security and usability of standard has hfunctions, in particular MD-5, SHA-1 and SHA-2
Galaczová, Barbora ; Tůma, Jiří (advisor) ; Joščák, Daniel (referee)
Title: Security and usability of standard hash functions, in particular MD-5, SHA-1 and SHA-2 Author: Galaczová Barbora Department: Department of Algebra Supervisor: Doc. RNDr. Tůma Jiří, DrSc., Department of Algebra Consultant: Ing. Budiš Petr, Ph.D. Abstract: In the present work we try to digestedly describe standard hash functions, in particular MD-5, SHA-1 and SHA-2. We describe resume of existing attacks on these hash functions. We closely focused on MD-5 collision attacks, because the other hash function collision attacks result from these. Next we describe posibilities of practical usage of hash function collisions, in particular into the qualified certificates area and possible threats. At the end to the present work we describe new hash functions, which could replace current hash functions. This work also contains software to calculate MD-5 hash and search it`s collisions. The software is based on method invented by Czech cryptoanalytist Vlastimil Klíma. Keywords: hash function, collision, qualified certificate, security.
Game 128kB Using OpenGL
Kačur, Vladimír ; Kučiš, Michal (referee) ; Milet, Tomáš (advisor)
Bachelor thesis deal with creation of the game with limited memory space. It describes methods for reducing the size of the final application. Main part of the thesis describes methods for generating graphic content, as well as movement and interactions within it. It also deals with making of textures and terrain.
Retrospective Arcade Game
Trčka, Martin ; Jaroš, Jiří (referee) ; Pospíchal, Petr (advisor)
This bachelor's thesis describes the evolution of computer, which is inspired of historical game called Arkanoid. The first part of the thesis describes history of computer games and conputer graphics. Next section details the graphics libraries as DirectX and OpenGL.The second part of the thesis describes the plan of the game and collisional system. Then the thesis includes description of implementation, where are used object oriented design, library OpenGL and library SDL in C++. The end of thesis is devoted to testing of game.
Retrospective Space Game for Two Players
Kimer, Tomáš ; Kaštil, Jan (referee) ; Pospíchal, Petr (advisor)
This bachelor's thesis describes the development of a computer game inspired by one of the first computer games ever - Spacewar!. The first part describes computer games and associated history, current status, their genres and retrospective games. The second part deals with hardware-accelerated computer graphics, focused on its history and discusses the graphics libraries, especially OpenGL. Next part is devoted to design of the developed game, addressing the movement of objects, collisions between them, effects using particle systems, controls for two players on one computer and a basic graphics user interface. Next chapter covers implementation in C++ language using OpenGL and SDL libraries and object oriented design. The final section is devoted to testing the resulting application, including analysis of user ratings.
Application for Demonstration of Hash Algorithms SHA-1 and SHA-2
Siska, Josef ; Petrlík, Jiří (referee) ; Novotňák, Jiří (advisor)
In this thesis, the theory related to the hash algorithms SHA-1 and SHA-2 is presented, along with a description of possible implementation of an application that demonstrates how these algorithms work. The first part of this thesis describes the principles of construction of hash functions, their use and history of selected hash functions. The two following chapters present conventions and algorithms of the SHA-1 and SHA-2. The next chapter describes the general concepts related to the attacks on the hash functions and selected attacks are presented in more detail. The last two chapters outline the design and implementation of an application that was created as part of this work. In the end the evaluation of results of this thesis and proposals for its possible continuation are presented.
Physical Simulation in Graphics Scene
Javorka, Marián ; Herout, Adam (referee) ; Pečiva, Jan (advisor)
This master's thesis deals with physical simulation of cars. Program is implemented in C++ using OpenSceneGraph and Bullet libraries, which are shortly introduced. The application is implemented as simple racing game for one or two players. Using a simple menu, the user can select a car and the weather, which dramatically affects the handling characteristics of vehicles. Setting weather to random is one of the options leading to a dynamic weather changes during the game. The application takes into account collisions among cars and collisions with the terrain and bars on a racing circuit.
Anti-Collision System Based on GPS
Varga, Marek ; Drahanský, Martin (referee) ; Orság, Filip (advisor)
Aircraft industry is constantly facing the need to increase security not only in the case of large machines, but also in the small aircraft. Many systems were established in order to inform the pilot of the impending hazard, where appropriate, about the location of the other aircraft. The main objective is to establish a facility which uses global position system for determining the position and imparts coordinates using wireless networks for subsequent determination of collision. The functions of satellites and GPS receivers, sending wireless data and collision calculation and synchronization of individual modules is described in detail.
Graphics Intro 64kB Using OpenGL
Milet, Tomáš ; Havel, Jiří (referee) ; Herout, Adam (advisor)
This thesis deals with the creation of the intro with limited size. This work describes methods for reducing the size of the final application. The main part describes methods for generating graphic content and methods for its animation. It deals with creation of textures and geometry. Another part is aimed on the physical simulation of particle and elastic systems.
Hash functions - characteristics, implementation and collisions
Karásek, Jan ; Sobotka, Jiří (referee) ; Lambertová, Petra (advisor)
Hash functions belong to elements of modern cryptography. Their task is to transfer the data expected on the entry into a unique bite sequence. Hash functions are used in many application areas, such as message integrity verification, information authentication, and are used in cryptographic protocols, to compare data and other applications. The goal of the master’s thesis is to characterize hash functions to describe their basic characteristics and use. Next task was to focus on one hash function, in particular MD5, and describe it properly. That means, to describe its construction, safety and possible attacks on this function. The last task was to implement this function and collisions. The introductory chapters describe the basic definition of hash function, the properties of the function. The chapters mention the methods preventing collisions and the areas were the hash functions are used. Further chapters are focused on the characteristics of various types of hash functions. These types include basic hash functions built on basic bit operations, perfect hash functions and cryptographic hash functions. After concluding the characteristics of hash functions, I devoted to practical matters. The thesis describes the basic appearance and control of the program and its individual functions which are explained theoretically. The following text describes the function MD5, its construction, safety risks and implementation. The last chapter refers to attacks on hash functions and describes the hash function tunneling method, brute force attack and dictionary attack.
Cryptographic hash function
Čejka, Petr ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
The goal of this thesis is to create overview about cryptographic hash fiction. In the first part is explained what general hash function is with its use. Follows specification of cryptographic hash function with a description of the most common construction. The next chapter is focused on application of cryptographic hash function in practice with emphasis to digital signature. After this chapter is attention paid to security. At the end are presented the most popular and the most important representatives of cryptographic hash function.

National Repository of Grey Literature : 33 records found   beginprevious24 - 33  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.