National Repository of Grey Literature 37 records found  beginprevious28 - 37  jump to record: Search took 0.01 seconds. 
Security of Electronic Documentation in Medical Environment
Hauserová, Markéta ; Malinka, Kamil (referee) ; Barabas, Maroš (advisor)
Thesis is analyzing czech laws which are related to medical documentation. Describes the points  which are mandatory for information system, so the medical documentation can be stored electronically. Includes various algorithms for implementation of certain electronic signature and for  identification of person. This thesis deals with asymmetric cryptography, specifically RSA, DSA, and ECDSA. Describes the hash functions and their functions and their characteristics. Describes the principle of the certificate, ways of its obtaining, invalidation and their formats. Analyzes medical information system and suggests ways to create a program for signing medical records. Then based on that analysis, the program is implemented. At the conclusion of the work is discussed, if created program meets the criteria.
Modern Token-based and Knowledge-based Authentication
Ševčík, Michal ; Pust, Radim (referee) ; Malina, Lukáš (advisor)
This bacherol thesis deals with a modern authentization using an object and knowledge. It mostly focuses on authentization by means of USB token, Smart Java Cards, Smart .NET Cards and NFC technology and their subsequent use in the authentization in a local network.
SMS Encryption for Mobile Communication
Lisoněk, David ; Bouška, Petr (referee) ; Drahanský, Martin (advisor)
This thesis deals with encryption of short text message (SMS) in mobile communication. Introduction is dedicated to overview of the parts of GSM radiotelephone nets and SMS messages transfer . Next chapter is reserved for description of cryptographic methods especially symetric and asymetric encryptografic aproaches. A design of a SMS messages encryption and decryption techniques is in next. For SMS encryption and sign, there is used the asymetric cypher RSA. Encryption use OAEP padding schema. The public key is saved in certificate. The Symbian OS has been choosen as a suitable platform for programming of mobile devices.
Cryptographic methods of data security
Miloš, Jiří ; Koutný, Martin (referee) ; Lambertová, Petra (advisor)
Bachelor‘s thesis on theme Cryptographic methods of data security consists of three parts. In first part are itemized general theoretical principles, which employs in these sphere. There are also mentioned not only contemporaneous but historical cryptographic standards or algorithms. The second part of these bachelor‘s thesis refer to a possibility of breaking these standards. There are described most applied cryptoanalytics principes and their practical using, especially in the sphere of computer networks and their services. The final part contains a description of the development of simple computer application, which demonstrates the use cryptographic methods in the security packages in personal computer.
Electronic geocaching
Pavel, Lukáš ; Babnič, Patrik (referee) ; Burda, Karel (advisor)
The goal is to design and implement a concept of electronic geocaching with contactless smart card and cell phone with NFC interface. In the first chapter I describe geocaching and try to familiarize the reader with this game. The second chapter deals with the issue of smart cards, I describe here the contact and contactless cards and their security. In the third chapter, I describe use and security of radio communication interface NFC. In the fourth chapter, I describe the principles of symmetric and asymmetric cryptography and selected cryptographic techniques. In the fifth chapter is description of proposed solution for electronic geocaching with digital signature. The last chapter describes all created applications.
Digital certificates and certificate authorities
Lepa, Ondřej ; Hajný, Jan (referee) ; Člupek, Vlastimil (advisor)
This diploma thesis deals with certification and certification authorities, certification path PKI and principles of its validation and security. Also deals with structure of certificate itself and possible misuse of included information. Moreover, possibility of misues of third party certificates and proclamation of untrusted certificate to client's system.
Modern Asymmetric Cryptosystems
Walek, Vladislav ; Sobotka, Jiří (referee) ; Malina, Lukáš (advisor)
Asymmetric cryptography uses two keys for encryption public key and for decryption private key. The asymmetric cryptosystems include RSA, ElGamal, Elliptic Curves and others. Generally, asymmetric cryptography is mainly used for secure short messages and transmission encryption key for symmetric cryptography. The thesis deals with these systems and implements selected systems (RSA, ElGamal, McEliece, elliptic curves and NTRU) into the application. The application can test the features of chosen cryptosystems. These systems and their performance are compared and evaluated with the measured values. These results can predict the future usage of these systems in modern informatics systems.
Portal for the support of cryptography instruction
Forman, Tomáš ; Doležel, Radek (referee) ; Zeman, Václav (advisor)
The main goal of this master's thesis is building of web portal for presentation basic cryptography algorithms. Those algorithms would be explained in the theoretical page in the first place. After that, they would be demonstrated by scripts. One part of this project is designing simplified theoretical element for basic impletion portal of information. Next part is creating web portal by one of the free available CMS´s systems. Programming language JAVA would be used as an instrument for creating demonstration scripts. For creating animations will be used the Flash animation tool. Target of formed web portal is creating community of expert public. It would make new articles, scripts and knowledge. This way, the portal would be kept current. The section which would include failure the most widely used algorithms and instructions how to eliminate it will be part of portal.
Quantum computers and their impact on public-key cryptography
Lushnikova, Marina ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
The aim of this thesis is to study quantum computers and their impact on public-key cryptography. Crucial part of the work is dedicated to theoretical basis and definitions necessary for understanding the basic principles of quantum computers. The further chapters describe Shor's algorithm, explain the part of integer factoring problem in the security of current public key cryptographic algorithms, and show how to break the most widely used assymetric algorithm RSA by means of effective factoring. Last chapter provides comparison of classical factoring algorithms with Shors algorithm, mentions cryptography resistant to quantum computer attacks and discusses the current state of development in the field of qunatum computing. The conclusion summarizes both potential and real impact of quantum computers on public-key cryptography.
Electronic signature for emails subscribing
Rychetský, Filip ; Toman, Prokop (advisor) ; Brechlerová, Dagmar (referee)
Práce se zabývá využitím elektronického podpisu k podepisování emailových zpráv a to přehlednou a jasnou formou s praktickými příklady. Zahrnuje obecnou charakteristiku elektronického podpisu jako takového, věnuje se kryptografickým základům, aby čtenář věděl, jakými metodami a principy je podpis zajištěn, a konkrétními možnostmi podepisování s důrazem na jednu variantu. Tato podrobněji popsaná varianta je konfrontována s dalšími možnostmi, zejména v oblasti výhod a nedostatků.

National Repository of Grey Literature : 37 records found   beginprevious28 - 37  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.