National Repository of Grey Literature 60 records found  beginprevious39 - 48nextend  jump to record: Search took 0.00 seconds. 
On DSA
Čadová, Veronika ; Drápal, Aleš (advisor) ; Jedlička, Přemysl (referee)
This thesis deals with problems of comparing the safety and running time of digital signatures DSA and Schnorr. Digital signature is almost full, legally recognized alternative to physical sign, intended for use in a digital environment. Digital signature uses asymmetric codes and hash functions which are easily described, as well as other basic concepts such as discrete logarithm and cyclic groups. The thesis deals with the analysis of possible attacks on DSA and compares DSA and Schnorr algorithm. Digital signature history and its implementation is part of the thesis.
Cryptocurrency
Šelinga, Martin ; Komosný, Dan (referee) ; Zeman, Václav (advisor)
In this bachelor thesis are analyzed elementary cryptographical techniques which are used among others also in cryptocurrencies. In second part is analysis and detail description of most used cryptocurrencies. In last part is description of simple web application which will demonstrate function of cryptocurrencies.
Authentication protocols on restricted devices
Šebesta, David ; Člupek, Vlastimil (referee) ; Malina, Lukáš (advisor)
This thesis deals with authentication methods, especially about authentication based on knowledge. In the thesis, the hash functions such as MD hash function, SHA hash function, Keccak, Blake, Grostl, Jh, Skein are described and shown their compilation on low frequency microcontrollers. Into the microcontroller MSP430F2274 are Keccak, Blake, Grostl, JH, md5, SHA–1, SHA–224, SHA–256 a Skein hashing algorithms implemented and measured. Also simple authentication protocols client–server are designed and their implementation and measuring was done. Protocols are focused on low memory requirement and the smallest number of measured messages during authentication. The first solution is determined for the beginning of the communication from client and the second from server.
Modern access control system
Vomáčka, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
The thesis describes the design of scheme for access system with user authentication via smart cards. The first chapter explains various types of identification items used for authentication of users and different types of readers and terminals, followed by chapter 2 with a deeper insight on smart cards with focus on their types, what internal structure and principle of communication with card readers are used, etc. with primary focus on Java cards. The third chapter describes Java Card cryptography - especially elliptic curve cryptography used on this platform. The fourth part focuses on PACE protocol with subsections dedicated to the individual parts of the protocol and its applicability to smart cards environment. Chapter 5 explains the proposed design of the authentication scheme elaborated in the thesis, including a detailed description of specific parts, their funcionality and exemplary usage in the created applications.
Application for Demonstration of Hash Algorithms SHA-1 and SHA-2
Siska, Josef ; Petrlík, Jiří (referee) ; Novotňák, Jiří (advisor)
In this thesis, the theory related to the hash algorithms SHA-1 and SHA-2 is presented, along with a description of possible implementation of an application that demonstrates how these algorithms work. The first part of this thesis describes the principles of construction of hash functions, their use and history of selected hash functions. The two following chapters present conventions and algorithms of the SHA-1 and SHA-2. The next chapter describes the general concepts related to the attacks on the hash functions and selected attacks are presented in more detail. The last two chapters outline the design and implementation of an application that was created as part of this work. In the end the evaluation of results of this thesis and proposals for its possible continuation are presented.
Secure Transport of NetFlow Data
Ručka, Tomáš ; Halfar, Patrik (referee) ; Grégr, Matěj (advisor)
The aim of my bachalor's thesis is secure transport NetFlow data. Communication in NetFlow is not protected against unauthorized intrusion, in addition works over UDP protocol which is protocol that allows data loss. The aim of this work is to create an encrypted tunnel through which communication will take place between the exporter and collector.
Graphical Presentation of the Chosen Perfect Hash Algorithm
Kubica, Jakub ; Puš, Viktor (referee) ; Kaštil, Jan (advisor)
The main subject of this document is basic application in Java, which presents perfect hash algorithms, in particular algorithm CHM and FCH. Further this works is focused on design od intuitive graphic user interface and clarigying some terms in the field of hashing.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Safe Cryptography Algorithms
Zbránek, Lukáš ; Schäfer, Jiří (referee) ; Chmelař, Petr (advisor)
In this thesis there is description of cryptographic algorithms. Their properties are being compared, weak and strong points and right usage of particular algorithms. The main topics are safeness of algorithms, their bugs and improvements and difficulty of breaching. As a complement to ciphers there are also hash functions taken in consideration. There are also showed the most common methods of cryptanalysis. As a practical application of described algorithms I analyze systems for secure data transfer SSH and SSL/TLS and demonstrate an attack on SSL connection. In conclusion there is recommendation of safe algorithms for further usage and safe parameters of SSH and SSL/TLS connections.
Duplicate Text Identification
Pekař, Tomáš ; Kouřil, Jan (referee) ; Smrž, Pavel (advisor)
The aim of this work is to design and implement a system for duplicate text identification. The application should be able to index documents and also searching documents at index. In our work we deal with preprocessing documents, their fragmentation and indexing. Furthermore we analyze methods for duplicate text identification, that are also linked with strategies for selecting substrings. The thesis includes a description of the basic data structures that can be used to index n-grams.

National Repository of Grey Literature : 60 records found   beginprevious39 - 48nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.