National Repository of Grey Literature 74 records found  beginprevious65 - 74  jump to record: Search took 0.00 seconds. 
Authentication using a device with OS Android
Smíšek, Martin ; Člupek, Vlastimil (referee) ; Dzurenda, Petr (advisor)
This thesis describes the basics of cryptography including symmetric and asymmetric cryptography. It also looks into methods of authentication, using knowledge of some information, having any object and user specific proportions. The thesis engage in description of modern technologies NFC and BLE and shows, how to develop applications, working with them. It deals with the way of storing data used for cryptography, in the safe way. The access system created in the scope of this thesis, which is using Android powered device as an authentication object and communicating over NFC is described. The system can be divided into two parts. The first part works on the device powered by Android. It creates, resets and saves secret data safely and communicate with the other part. The second part is working in a terminal with connected RFID/NFC card reader. The task of this part is to communicate with the part on the Android device, attached to the reader and saving data of users and chambers centrally on the web server. It also creates logs in the form of text files and upload it to the FTP server.
Data security on operation systems
Konečný, Jakub ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
The bachelor thesis is focused on comparing data security options on various desktop operating systems, user authetication and provided cryptography API for developers. The thesis includes a design and realization of an application for secure data storage by using the selective database encryption.
Web visualisation of cryptographic systems
Sikora, Marek ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
This thesis deals with web technologies for interactive visualization of content. It discusses the new HTML5 specification, its animation possibilities using Javascript and their practical application for creating web pages. Furthermore, the work focuses on the development tool Adobe Edge Animate, through which we realize page design. The study also discusses cryptographic systems and protocol HM12. It displays a basic overview of the functionality of this Protocol. In the last part of the thesis describes the actual implementation of these two topics, namely the creation of web visualization – demonstrator of the cryptographic system including a fully operational model.
Monitoring of test station downtime
Šebesta, David ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
This thesis is about the monitoring of testing station downtimes at the DS/ETC (Diesel Systems / Engineering Testing Center) Bosh Diesel s.r.o. department in Jihlava. The goal of the monitoring is to get a record and an immediate warning for each machine downtime. The testing engineers are able to edit downtime reports and to create statistics and the Pareto analysis based on the reports. In the beginning of the thesis there are generally described the ETC department and the SCADA system. The monitoring system is designed and implemented based on the requirements of the ETC department. SMS messages sent via a GSM module what is connected directly to the server are used for immediate downtime warning. The test engineers have the graphic user interface what they can use to edit downtime reports. Statistics are generated individually based on the adjustable data filter. The department can focus primary on the finding out the reasons of the downtimes what leads to the biggest reduction of the test machine downtimes.
Data transmition security with general linear block codes
Dzurenda, Petr ; Tejkal, Vladimír (referee) ; Němec, Karel (advisor)
This work deals with problematic basic characteristic common linear block codes, concretely with creation generating and controlling matrix and individual ways decoding common linear block codes and then are theoretic knowledge used in the next part bachelor’s thesis. Next part this work is bent on the concrete layout of common liner block code satisfactory specifications by submission. In this part it can by find way haw create generating matrix be able to correcting tree single errors then create control matrix for decoding and correct network for correcting errors. Programs are used in this work are explained there. In the end this part is example of coding and decoding. Lastly work is realization codec. In this part is description of coder and decoder realizations. This codec is simulating by program Matlab Simulink in part five. In last part are create boards of printed circuits by program Eagle for coder and decoder.
Web applications for user authentication
Vybíral, Petr ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
The thesis deals with the problems of user authentication. The first chapter analyzes the problem of authentication, its methods and its utilization. The second chapter presents the different security options for communication. The chapter describes security, communication and authentication protocols. There is the 2D barcode QR Code described at the end of the chapter. The third chapter is devoted to ASP.NET technology, its development and possibilities of utilization. Attention is focused on web form and server controls. There is an analysis of elements of cookies and possibilities of their use. The last chapter consists of a practical part, which describes the development of a web application. There is a description of the parts of application, such as the database, the Web navigation, master pages and etc. in the following chapter. The cardinal part of the chapter consists of an analysis and implementation of forms authentication, the attribute authentication and authentication with QR code. Finally, there is a description of way how to secure the communication by using a certificate.
Power analysis attack on masked AES implementation
Jakubíková, Radka ; Dzurenda, Petr (referee) ; Martinásek, Zdeněk (advisor)
The cryptographic algorithms are commonly used as a security item today. In some situations, the special device is used to run the cryptographic algorithm, so the data are protected against the attack from the internet. Naturally, the attack can be loaded on the device as well using the side channel attack. The data are under the great danger, because nowadays plenty of power consumption analyses exist. The side channel attack uses knowledge about the cryptographic algoritm and simple or differential analysis. The diploma thesis focuses on the differential power analysis attack for the data published under the DPA contest. This thesis covers different types of analyss and attacks, and describes the new DPACv4.2 implementation. The correlation analysis is presented for the DPACv4.2 and the possible attack is discussed at the conclusion.
System of anonymous data collection
Troják, David ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
This thesis deals with contemporary approaches that provide higher protection of privacy of users. It focuses mainly on a group signature. In the practical part of this thesis I designed and implemented PS that is enable to gather information with the help of signal of a mobile device. The application was designed in accordance with fundamental cryptographic requirements such as the authenticity and the integrity of transmitted data. The anonymity of users is guaranteed through an application layer (the group signature) as well as through a network layer (Tor).
Group signature schemes
Smrž, Jan ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
Digital signatures are widespread in IT nowadays. In some cases there is emphasized the security of signer identity when signing an electronic message. For this type of signature group digital signatures are suitable. In this thesis basic cryptographic functions are presented which are used for group digital signatures. The principle of group signatures is explained, its advantages and nowadays use. Further are explained electronic election and it dis- and advantages. The practical part is a design and implementation of system suitable for electronic election allowing anonymity of voters using group digital signatures.
The security risks of authentication methods
Dzurenda, Petr ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
Master's thesis deals with the security risks of current authentication methods. There are described methods which are based on user's knowledge and ownership of authentication object and biometric authentication method. The practical part of this Master's thesis deals with a specific design of authentication system based on protocol ACP, when the user proves his identity by smart card on provider assets, which is represented by ACP portal on the user's computer.

National Repository of Grey Literature : 74 records found   beginprevious65 - 74  jump to record:
See also: similar author names
1 Dzurenda, P.