National Repository of Grey Literature 345 records found  beginprevious327 - 336next  jump to record: Search took 0.01 seconds. 
MHP application
Holík, Tomáš ; Říha, Kamil (referee) ; Číka, Petr (advisor)
This Master Thesis is engaged in designing an interactive application for online betting in the DVB-T environment. The application is determined to running at Multimedia Home Plattform MHP and it allowes digital television viewers to make a bet on a sport match broadcasted on the television. The whole application is written in the Java language. All the information about users and the match are stored in a MySQL database, which is accessible through a php script placed on the server with the database. The applicaton is running in a set-top box and communicates with the script through the set-top box return channel. The channel between the server and the script is unsecure, so the communication has to be encrypted. The encryption process uses a symmetric-key cipher AES, which uses a shared secret key for encryption and decryption. Each application generates its own pseuodorandom and crypthographicaly strong AES key and sends it to the server. To secure the secret key transsmision is used the public-key cipher RSA.
Cryptography and implementation in Notes and Domino
Klusoňová, Eva ; Karakhalil, Mourad (referee) ; Ošmera, Pavel (advisor)
This bachelor's thesis deals with description of cryptography and Public Key Infrastructure in Lotus Notes/Domino. The goal of this thesis is to give a brief overview of cryptographic techniques including their implementation in Lotus Notes/Domino and to propose an appropriate examples for demonstration and education in cryptographic techniques. In order to demonstrate selected algorithms an open-source e-learning software CrypTool is used.
Algorithms for Determining the Order of the Group of Points on an EllipticCurve with Application in Cryptography
Trchalíková, Jana ; Knoflíček, František (referee) ; Kureš, Miroslav (advisor)
Eliptické křivky jsou rovinné křivky, jejíž body vyhovují Weierstrassově rovnici. Jejich hlavní využití je v kryptografii, kde představují důležitý nástroj k tvorbě těžko rozluštitelných kódů bez znalosti klíče, který je v porovnání s ostatními šifrovacími systémy krátký. Díky těmto přednostem jsou hojně využívány. Abychom mohli kódovat a dekódovat zprávy v systému eliptických křivek, musíme znát řád dané eliptické křivky. K jeho získání se mimo jiné používá Shanksův algoritmus a jeho vylepšená varianta, Mestreho algoritmus.
Implementation of AES Algorithm on FPGA
Smékal, D.
This paper presents a VHDL (Very High Speed Integrated Circuit Hardware Description Language) implementation of 128-bit AES (Advanced Encryption Standard) on FPGA card (FieldProgrammable Gate Array) using Virtex-7 FPGA chip manufactured by Xilinx company. In this project our main concern is to implement all modules of this algorithm on hardware.
The Analysis of Security and Anonymity in Cryptocurrency Payments
Maňák, Michal ; Šebesta, Michal (advisor) ; Bruckner, Tomáš (referee)
Bitcoin and other cryptocurrencies are getting into common usage more and more frequently. Unfortunately this spread is connected with attempts to misuse their principles for personal benefit. The goal of this thesis is to explain the main principles of using bitcoin in relation to the internet identity. This connection is represented by two sources in the thesis: the first is a bitcoin blockchain, the second is the sum of various user profiles used in discussion forums and similar websites. The aim is to create and explain the process how to, by using the combination of this two sources, reveal the identity of a human using cryptocurrencies for payment (from a private person point of view). First, methods used for extraction of correct and useful data from the blockchain and internet profiles must be developed to be able to mine data from the joint database, merging into a full user profile containing personal data. Results of this investigation are extended by the rules of preserving anonymity on the internet, containing both technological and behavioural measures avoiding a share of personal data. The end of this thesis explains possible attack vectors that might be used for compromising cryptocurrencies. The methods of searching of the internet identity are a useful tool for facing these attacks.
Analysis of digital currency Bitcoin
Huřťák, Petr ; Brixí, Radim (advisor) ; Kalina, Jaroslav (referee)
Bachelor's thesis is focused on digital currency Bitcoin, mainly on Bitcoin transactions and their attributes like speed, fees and safety. Main goals of this thesis are three, analysis of bitcoin buying possibilities in Czech Republic, comparison of Bitcoin transactions with common payment methods like bank transfers, credit card payment or PayPal, and analysis of number of merchants accepting bitcoin in time and discovery of trend from these data. This thesis is divided into theoretical and practical part. In theoretical part there are described basics of cryptography, which are necessary for understanding Bitcoin, and in depth description how Bitcoin works. Practical part is focused on fulfilment of described goals, besides that thesis is also addressing Bitcoin clients and comparison between most popular ones. Contribution of this bachelor's thesis is analysis of bitcoin buying possibilities in Czech Republic, comparing Bitcoin transactions with transactions of standard payment methods in terms of fees and time, and analysis of trend in number of merchants accepting bitcoin as one of the payment method.
Web applications and the influence of an encryption on their responses
Podavka, Jan ; Veber, Jaromír (advisor) ; Klíma, Tomáš (referee)
This bachelor thesis deals with how the size of the database and response of the system is influenced by an encryption of the data on the websites. This issue is solved by means of testing of encryption methods on the Raspberry Pi. Theoretical part of the thesis describes the encryption algorithms. It also describes how to secure the website and where to use the encryption on the web and what kind of encryption to use. The practical part focuses on the impact of the encryption on the system. As a result, the speed of the algorithms in different situations is evaluated, and also the size of the database with cypher text and plain text is compared.
Support of cryptographic algorithms in Java libraries
Jírů, Michaela ; Pavlíčková, Jarmila (advisor) ; Kutišová, Magda (referee)
This thesis is focused on encryption with Java libraries. Goal si to compare the libraries in the algorithms they provide, speed of chosen algorithms, licence and documentation. The paper is dividend into two parts, the first describes history and present of cryptography and the second is focused on work with cryptography in Java.
Bitcoin
Herzán, Jiří ; Klíma, Tomáš (advisor) ; Veber, Jaromír (referee)
Bachelor's thesis is focused on crypto currency bitcoin. The thesis is divided into three parts. First chapter is focused on cryptography, which is used for bitcoin security. Next chapter describes basic bitcoin principles and bitcoin mining. In last chapter there are practically described two methods of bitcoin mining. The aim of this thesis is to bring coherent view on given themes, especially bitcoin mining. The main goal of this thesis is trying bitcoin mining using ASIC miner and Cloud mining method. The result is a statement about mining profitability.
Analysis of deal-of-the-day services market from the viewpoint of security
Maskaliunets, Stanislau ; Veber, Jaromír (advisor) ; Luc, Ladislav (referee)
In this bachelor thesis I analyze the market of deal-of-the-day services from the viewpoint of security. First of all, I describe the security of the information systems as a term. I also explain the methods of securing web applications. Web applications run on HTTP protocol, and the more secure web applications use the HTTPS protocol, which contains the TLS/SSL. In this work I describe working principle of HTTP protocol. I also describe the SSL/TLS protocols and methods of their acquiring. In the theoretical part, I also describe the methods of cryptography. In the practical part, I describe the methods of defense against attacks and analyze the deal-of-the-day services. I describe the evolution of both the world and Czech deal-of-the-day services. At the end, I analyze deal-of-the-day websites security and compare the results of this analysis.

National Repository of Grey Literature : 345 records found   beginprevious327 - 336next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.