National Repository of Grey Literature 339 records found  beginprevious327 - 336next  jump to record: Search took 0.01 seconds. 
Web applications and the influence of an encryption on their responses
Podavka, Jan ; Veber, Jaromír (advisor) ; Klíma, Tomáš (referee)
This bachelor thesis deals with how the size of the database and response of the system is influenced by an encryption of the data on the websites. This issue is solved by means of testing of encryption methods on the Raspberry Pi. Theoretical part of the thesis describes the encryption algorithms. It also describes how to secure the website and where to use the encryption on the web and what kind of encryption to use. The practical part focuses on the impact of the encryption on the system. As a result, the speed of the algorithms in different situations is evaluated, and also the size of the database with cypher text and plain text is compared.
Support of cryptographic algorithms in Java libraries
Jírů, Michaela ; Pavlíčková, Jarmila (advisor) ; Kutišová, Magda (referee)
This thesis is focused on encryption with Java libraries. Goal si to compare the libraries in the algorithms they provide, speed of chosen algorithms, licence and documentation. The paper is dividend into two parts, the first describes history and present of cryptography and the second is focused on work with cryptography in Java.
Bitcoin
Herzán, Jiří ; Klíma, Tomáš (advisor) ; Veber, Jaromír (referee)
Bachelor's thesis is focused on crypto currency bitcoin. The thesis is divided into three parts. First chapter is focused on cryptography, which is used for bitcoin security. Next chapter describes basic bitcoin principles and bitcoin mining. In last chapter there are practically described two methods of bitcoin mining. The aim of this thesis is to bring coherent view on given themes, especially bitcoin mining. The main goal of this thesis is trying bitcoin mining using ASIC miner and Cloud mining method. The result is a statement about mining profitability.
Analysis of deal-of-the-day services market from the viewpoint of security
Maskaliunets, Stanislau ; Veber, Jaromír (advisor) ; Luc, Ladislav (referee)
In this bachelor thesis I analyze the market of deal-of-the-day services from the viewpoint of security. First of all, I describe the security of the information systems as a term. I also explain the methods of securing web applications. Web applications run on HTTP protocol, and the more secure web applications use the HTTPS protocol, which contains the TLS/SSL. In this work I describe working principle of HTTP protocol. I also describe the SSL/TLS protocols and methods of their acquiring. In the theoretical part, I also describe the methods of cryptography. In the practical part, I describe the methods of defense against attacks and analyze the deal-of-the-day services. I describe the evolution of both the world and Czech deal-of-the-day services. At the end, I analyze deal-of-the-day websites security and compare the results of this analysis.
Analysis and implementation of application for digital currency Bitcoin
DRDÁK, František
The thesis is focused on the topic of virtual cryptocurrency Bitcoin. The theoretical part is divided into several chapters. First of all, there is a chapter containing basic information about the currency's history, its development to the present, as well as principles of operation of this currency. Because it is a currency based on cryptographic principles next chapter summarizing cryptographic techniques, which is necessary to know for subsequent analysis of this currency. In other parts is elaborated a detailed analysis of the principles of Bitcoin. The main point of this analysis is a system of transactions, decentralized history, then joining the transactions into blocks and in the end creating blockchain. It also explains the principle of P2P networks. The practical part of this work focuses on the analysis and design of payment applications for mobile devices. There used open-source libraries such BitcoinJ. The application is developed in Java programming language with plugin for portable devices, which work under the operating system Android. For the purposes of analysis and design of graphical user interface is used UML diagrams. The specification of the UML diagrams was utilized by freely available graphics software and the result is also included in this work.
Credit cards on the internet
Kolář, Jiří ; Matuštík, Ondřej (advisor) ; Kalina, Jaroslav (referee)
Using credit cards to buy goods and services is becoming more and more popular and this trend can be observed even when paying by card over the Internet. From a customer perspective is indeed a comfortable and quick way of paying. Merchants realize this and so in their online stores card payment allows. The content of this work illustrates the issue of security of payment cards on the Internet, encryption and secure communication, as a basis for describing 3D Secure standard. The aim is to analyze the security features of payment cards issued by banks and credit institutions operating on the Czech market from the perspective of the owner of the credit card. At the same time to estimate future developments in this sector based on facts and trends.
Online Password Manager
Ort, Štěpán ; Buchalcevová, Alena (advisor) ; Mészáros, Jan (referee)
The objective of this thesis is to show on which principles a modern password manager works. The introductory theoretical part describes cryptographic algorithms and evaluates whether they are suitable for use in current applications. At the same time it presents methods how to create a password which is strong and also easily remembered. The second part explains the key characteristics of a password manager. The last chapter illustrates the architecture of online password storage and the way of communicating with the password manager. Measures that have to be taken in order to make such storage secure are also described here.
Electronic Payment Systems in the Eastern Europe
Achatov, Igor ; Mészáros, Jan (advisor) ; Buchalcevová, Alena (referee)
This paper analyzes the electronic payment systems (EPS) market in the Eastern European countries. The main objective is to analyze the important and currently most popular electronic payment systems in Russia, Belarus, Ukraine, Latvia, Lithuania and Estonia, to provide an overview of all the technical, financial and other options that these systems offer, to create comparable characteristics of the analyzed systems and to compile recommendations and helpful instructions for implementing user or merchant solutions. Another objective is to analyze security technologies used by today's EPS, including solutions of related problems and risk reductions, and provide useful recommendations. The paper is divided into three parts: the first attends to analysis of Russian EPS, examines history of development of EPS and the prospects of Russian payment systems market, also provides detailed analysis of currently most popular EPS in Russia; the second section attends to analysis of EPS markets of Ukraine, Belarus, Latvia, Lithuania and Estonia; in the third part all of the analyzed systems are compared in terms of various criteria and characteristics. The final part of the paper also analyses the issues of EPS security and features methods and ways of solving security related problems. The information provided by the paper can be useful to EPS users and customers, merchants intending to conduct business using electronic payment systems in Eastern Europe, developers and web programmers. The outcome and recommendations of the paper may be used for further analytic, statistical and other purposes.
.NET & Cryptology
PSÍK, Tomáš
The point of this work is to show how to solve certain cryptographic problems in Microsoft .Net Framework 3.5. The work is divided into three parts. The first is an overview of basic classes and methods which can be used to solve particular cryptographic tasks. This part shows how to use these classes and also is an overview of the most common cryptological terminology also used in this work. The second part shows how to use abstract classes prepared in the framework for implementing an application interface, which unifies usage of all cryptographic transformations under .net. The third part is about deciding on quality of certain implemented cryptographic algorithm. Implementing speed testing application for block ciphers and hash function and it also contains references of basic attacks. Implementations of speed testing program, two block ciphers (Rijndael and Skipjack), all in c#, are listed in Appendix.
Comparison of the legislation of electronic signature in selected countries
Hautke, Tomáš ; Toman, Prokop (advisor) ; Svatá, Vlasta (referee)
Focus of this thesis is to compare legislation of electronic signature in the Czech Republic and in the USA. In first chapter are explained basic terms, such as cryptography, certificate or certification authority. Next two chapters deal with laws concerning electronic communication. In chapter about Czech legislation they are electronic signature law and electronic transactions and authorized document conversion law. Moreover, Czech Republic has to abide EU directive. Chapter about USA legislation consists of ESIGN act and UETA. Following chapter is dedicated to problems caused by imperfect legislation. Last chapter contains evaluation of described legislation.

National Repository of Grey Literature : 339 records found   beginprevious327 - 336next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.