National Repository of Grey Literature 134 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
Web visualization and demonstrator of anonymous credentials
Chwastková, Šárka ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
This thesis deals with the topic of attribute based credentials with revocable anonymous credentials. The main focus of this work is the implementation of this scheme through a web application. The web application serves primarily as a visualization, which shows the functionality of this scheme through animations, and also as a practical demonstrator. Data and cryptographic calculations for individual system protocols are provided by the given cryptographic C application that communicates with the created application. The web application is also able to communicate with the connected smart card reader and the MultOS smart card and thus create the transmission of APDU commands and responses between the smart card and provided C application.
System of anonymous data collection
Troják, David ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
This thesis deals with contemporary approaches that provide higher protection of privacy of users. It focuses mainly on a group signature. In the practical part of this thesis I designed and implemented PS that is enable to gather information with the help of signal of a mobile device. The application was designed in accordance with fundamental cryptographic requirements such as the authenticity and the integrity of transmitted data. The anonymity of users is guaranteed through an application layer (the group signature) as well as through a network layer (Tor).
Zero knowledge authentication
Bošeľa, Jaroslav ; Hajný, Jan (referee) ; Dzurenda, Petr (advisor)
This thesis looks to authentication, principle and basic divison. Another part of thesis looks to Zero–Knowledge protocols, which protocols with zero information, their analysis and base elements, also thesis presents technology Bluetooth Low Energy, specification of this technology in transmission simple data between computer Raspberry Pi 2 and mobile phone. The practical part of thesis works on experiment of sending simple data between Raspberry 2 and Android phone.
Web applications for user authentication
Vybíral, Petr ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
The thesis deals with the problems of user authentication. The first chapter analyzes the problem of authentication, its methods and its utilization. The second chapter presents the different security options for communication. The chapter describes security, communication and authentication protocols. There is the 2D barcode QR Code described at the end of the chapter. The third chapter is devoted to ASP.NET technology, its development and possibilities of utilization. Attention is focused on web form and server controls. There is an analysis of elements of cookies and possibilities of their use. The last chapter consists of a practical part, which describes the development of a web application. There is a description of the parts of application, such as the database, the Web navigation, master pages and etc. in the following chapter. The cardinal part of the chapter consists of an analysis and implementation of forms authentication, the attribute authentication and authentication with QR code. Finally, there is a description of way how to secure the communication by using a certificate.
Implementation of cryptographic protocols on smart cards
Moravanský, Michal ; Hajný, Jan (referee) ; Dzurenda, Petr (advisor)
The bachelor thesis is focused on cryptographic schemes using Attribute-Based Credentials, which try to minimize the negative impact on the protection of a user's privacy when using authentication systems. The aim of the bachelor's thesis was the implementation of two specified schemes on smart cards as a device with limited performance. Schemes differ only in the ability to revoke user. The practical part of this paper contains the analysis and selection of smart card platform and cryptographic libraries depending on performance. The work also describes the architecture of both schemes and individual protocols, including ongoing communication. The implementation of the Attribute-Based Credentials scheme was performed on a programmable smart card Multos (user side) and Raspberry Pi 2 (issuer and verifier side). The time complexity of the selected algorithms was also compared. In the end, the dependencies affecting the resulting efficiency and speed of the protocol were formulated.
Copyright protection of electronic documents
Zachoval, Tadeáš ; Dzurenda, Petr (referee) ; Člupek, Vlastimil (advisor)
The bachelor thesis is focused on the copyright protection of electronic documents. The thesis consists of a theoretical part and a practical part. The theoretical part describes the electronic document and various types of files that can be encountered while working on a computer and consider them as electronic documents. The fundamental part of the theoretical part is the analysis of various copyright protection methods for electronic documents. In the practical part was created a Python application based on mentioned analysis. The application implements selected methods of copyright protection.
Web-based visualization of anonymous credential scheme
Sohr, Jakub ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
This thesis explores attribute based credential schemes and the cryptographic preliminaries that are the building blocks of such schemes. The main focus of this thesis is the RKVAC scheme, which is implemented and visualized. This thesis also describes the entities and protocols of the RKVAC scheme and their roles within it. The implemented web application is designed to introduce the RKVAC scheme to the public.
Advanced Filtering of Digital Evidence
Chudáček, Ondřej ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
This thesis focuses on the implementation of advanced filtering of digital evidence stored on an open source cloud storage NextCloud. The contents of the thesis are law analysis regarding the storage of digital evidence in NextCloud, design of NextCloud, homomorphic encryption and its possible usages, attribute based searchable encryption and its usages and implementation of a simple stand-alone filtration client. Experts on digital evidence were asked about the choice of filtration criteria as a part of the thesis. The key feature of the thesis is a description of implementation of filtration inside NextCloud which has been extended to contain five new filtration criteria. The result has been submitted to performance and functional tests.
Security of authentication protocols
Tran, Minh ; Člupek, Vlastimil (referee) ; Dzurenda, Petr (advisor)
This thesis deals with the security of authentication protocols. The aim of the thesis is to analyze current security threats and attacks on current card systems mainly JavaCard and Mifare. And then to create a mobile application using Android platform with NFC and HCE functions, which realises the founded attacks. These attacks are relay attack and card cloning. Mobile side of the application is written in Kotlin programming language and server side in JavaScript, EJS and CSS. In the end attacks on EMV and access system of an unnamed university are demonstrated.
Hiding and obfuscation of malware to avoid antivirus detection
Rybár, Matej ; Dzurenda, Petr (referee) ; Casanova-Marqués, Raúl (advisor)
Počas hodnotenia bezpečnosti je pomerne nezvyčajné, aby bol niekto presvedčený, že antivírusový softvér neposkytuje úplnú bezpečnosť. Keď penetračný tester narazí na antivírusový softvér, sú chvíle, kedy musí konať rýchlo. Z týchto a iných dôvodov boli vyvinuté rôzne spôsoby obchádzania antivírusového softvéru. Niektoré z týchto prístupov obsfukácie majú za cieľ uniknúť statickej analýze úpravou a manipuláciou s formátom Portable Executable, čo je štandardizovaný formát spustiteľného súboru Windows. Niekoľko typov malvéru mení formát súboru PE, aby sa zabránilo statickej detekcii antivírusu. Táto práca sa zaoberá formátom súborov PE, detekciou malvéru a statickou detekciou obfukačných techník. Výsledkom tejto práce je scantime crypter Persesutor, ktorý zašifruje vstupný súbor a následne po spustení zašifrovaný súbor dešifruje a načítá v pamäti.

National Repository of Grey Literature : 134 records found   previous11 - 20nextend  jump to record:
See also: similar author names
1 Dzurenda, P.
Interested in being notified about new results for this query?
Subscribe to the RSS feed.