National Repository of Grey Literature 49 records found  beginprevious31 - 40next  jump to record: Search took 0.01 seconds. 
Electronic money
Gescheidt, Daniel ; Komosný, Dan (referee) ; Zeman, Václav (advisor)
In this bachelor thesis are described electronic money systems, which uses cryptography techniques such as symmetric and asymmetric ciphers, digital sign and hash function. Describing those techniques is crucial for understanding how electronic money systems works. Then three electronic money systems from Czech republic are briefly described.
Visualisation of asymetric cryptography
Kužela, Jan ; Rosenberg, Martin (referee) ; Ležák, Petr (advisor)
Bachelor thesis is considered in cryptographic protocols, especially asymetrical. The purpose of the thesis is to create an aplication for visualisation of mathematical operations in asymetrical cryptosystems. The emphasis is put on the asymetrical cryptosystems Diffie-Hellman, DSA and RSA. There is a summary of history of cryptography in the theoretical part as well as modern cryphographical systems used for protection of digital data. Practical part shows the design and creation of the application and implementation in the programming language Java and JavaFX. The output is the application, which visualizes protocols DH, DSA and RSA. Systems are visualized with the input data from the user or with randomly generated data. Application shows the calculations made by protocols step by step.
Secure access to information panel
Procházka, Jaroslav ; Malina, Lukáš (referee) ; Sobotka, Jiří (advisor)
My Thesis deals with secure access to the information panel, which deals with methods of communication of information panels with control unit. There are described the communication interface. The Thesis is focused mainly on communication protocols and security methods of transmission of information. The Thesis deals with the Diffie-Hellman Protocol, which is detailed discussed. There is explained the nature of the attack, the „Man in the middle“ on the Diffie-Hellman Protocol. A method of defense against attack by the „Man in the middle“ by using a digital signature in the Diffie-Hellman Protocol over an unsecured communication channel. In conclusion, the concept is designed for secure communications between the display panel and the control Terminal. There are described in detail the three proposed simulation in the programme.
Electronic Registry for Local Authority
Stránský, Karel ; Burget, Radek (referee) ; Rychlý, Marek (advisor)
Bachelor thesis "Electronic registry for local authority" is focused on usage of electronic registries for electronic communication between citizens and public authority. The first part describes the legislative page incidental with e-registries, principles of their functionality, and important requierements which are set on e-registiries. Furthermore elementary electronic signature's informations are included, along with creation and verification, and informations about certificates and certification authorities. The usage of digital signature at communication with electronic registry is also described. The second part is used to present particular concept of implemented sample electronic registry's system, and the solution of picked problems.
Elliptic curves in cryptography
Geyer, Lukáš ; Burda, Karel (referee) ; Lambertová, Petra (advisor)
The objective of this bachelor thesis is to decribe the role of the elliptic curves in modern cryptosystems, explain the mathematical fundamentals upon which the elliptic curves are based along with their advantages and disadvantages, followed by application in the digital signature. The project is concluded by a software solution demonstrating the use of elliptic curves in digital signature scheme ECDSA
Alternative methods in cryptology
Hampl, Dalibor ; Doležel, Radek (referee) ; Hajný, Jan (advisor)
In the first part of this thesis explains, what is generally cryptography, generally analyze the problem of the current encryption methods. These include asymmetric, symmetric and hybrid encryption methods. The second part focuses on the theory of lattices and their main mathematical problems, then the shortest vector problem, the closest vector problem, the approximate shortest vector problem and the approximate closest vector problem. Mathematically difficult problems of lattice are used in an encryption method GGH for asymmetrically encrypted communications method and GGH for digital signatures. It explains mathematical methods, which use these encryption methods. Another part of this thesis deals with the encryption method and the establishment of XTR on Diffie-Hellman protocol, thus XTR-DH. It explains mathematical methods, which use methods XTR, XTR-DH and Diffie-Hellman protocol. There are shown the main mathematical problems for this part of thesis DHP (Diffie-Hellman problem) and DLP (discrete logarithm problem). The fourth part focuses on a program designed to demonstrate the GGH encryption method for asymmetrically encrypted communications. Describes the structure, functionality, graphical part of the program and shows to a user interface. Students can test how the GGH encryption method behave when entering different input values. During the work with the program, the user should obtain sufficient information to understand the principles of this encryption method.
Elliptic curve based cryptosystems
Křivka, Petr ; Hajný, Jan (referee) ; Stančík, Peter (advisor)
In this bachelor thesis is examined problems elliptic curve cryptosystems. It is described mathematical underground, which use these systems. In more details is analyzed arithmetic finite fields. An important part of this work is the analysis of elliptical curves in cryptography. Among analyzed algorithms include e.g. ECDH or ECDSA. In conclusion is designed software solution, which helps in the study cryptosystems based elliptic curves. It allows basic operations over prime field.
Electronic geocaching
Pavel, Lukáš ; Babnič, Patrik (referee) ; Burda, Karel (advisor)
The goal is to design and implement a concept of electronic geocaching with contactless smart card and cell phone with NFC interface. In the first chapter I describe geocaching and try to familiarize the reader with this game. The second chapter deals with the issue of smart cards, I describe here the contact and contactless cards and their security. In the third chapter, I describe use and security of radio communication interface NFC. In the fourth chapter, I describe the principles of symmetric and asymmetric cryptography and selected cryptographic techniques. In the fifth chapter is description of proposed solution for electronic geocaching with digital signature. The last chapter describes all created applications.
Digital certificates and certificate authorities
Lepa, Ondřej ; Hajný, Jan (referee) ; Člupek, Vlastimil (advisor)
This diploma thesis deals with certification and certification authorities, certification path PKI and principles of its validation and security. Also deals with structure of certificate itself and possible misuse of included information. Moreover, possibility of misues of third party certificates and proclamation of untrusted certificate to client's system.
Digital signature
Vaverka, Aleš ; Lambertová, Petra (referee) ; Zeman, Václav (advisor)
Digital signature, the subject of this semester paper, is nowadays very up-to-date. The still rising capabilities of the internet and the vision of lowering the amounts of paper documentation made it necessary to develop a way of signing documents which are transferred through the internet. This is supposed to be equally safe and unassailable as the handwritten signature. This method is called the digital signature. The paper focuses on the explanation of the essential terms connected to digital signature, such as certificate, certification authority, authentication, but in particular on the elementary cryption algorithms, further on applications that make use of digital signature, e.g. post services and electronic banking. In the final chapter, the positive and negative aspects of the electronic signature are discussed.

National Repository of Grey Literature : 49 records found   beginprevious31 - 40next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.