National Repository of Grey Literature 9 records found  Search took 0.00 seconds. 
Generating Structured Test Data
Olšák, Ondřej ; Holík, Lukáš (referee) ; Smrčka, Aleš (advisor)
The goal of the bachelor's thesis is to create a tool for generating files with structure data content. The purpose of these files is to be used as test data conforming to testing of program input space. This thesis focuses on tree-structured data. The tool integrates tools implemented previously within Testos framework for generating test data in order to satisfy user-defined coverage criterion. The tool is able to generate a set of files in JSON or XML format containing test data satisfying ECC, BCC, or PWC coverage criterion.
Modern access control system
Vomáčka, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
The thesis describes the design of scheme for access system with user authentication via smart cards. The first chapter explains various types of identification items used for authentication of users and different types of readers and terminals, followed by chapter 2 with a deeper insight on smart cards with focus on their types, what internal structure and principle of communication with card readers are used, etc. with primary focus on Java cards. The third chapter describes Java Card cryptography - especially elliptic curve cryptography used on this platform. The fourth part focuses on PACE protocol with subsections dedicated to the individual parts of the protocol and its applicability to smart cards environment. Chapter 5 explains the proposed design of the authentication scheme elaborated in the thesis, including a detailed description of specific parts, their funcionality and exemplary usage in the created applications.
Authentication in the IoT
Drápela, Roman ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
Bachelor thesis focuses on authentication in the IoT. Some of the authentication protocols from the area of IoT are introduced at the beginning of the thesis. Next part of the thesis describes the NFC and BLE technologies, which can be applied in the IoT. Multi-device protocol is implemented using different devices (PC, mobile phone, SmartWatch). This protocol enables autentication based on the processes above the elliptic curves. Two sets of measurements (simulated and practical) are provided. In the final part of the thesis all the results are assessed.
Token based authentication
Loviška, Martin ; Šťastný, Ladislav (referee) ; Franek, Lešek (advisor)
Thesis is dealing with possibilities of user authentication using a security token to Linux console and web applications. Theoretical part of this work is devoted to cryptography basics, particularly asymmetric cryptography algorithms . Thesis generally describes aut- hentication methods and includes a brief categorization of smart card devices. The practi- cal part deals with SmartCard - HSM device setup for a client and creating own certificate authority using this device. Finally, it presents a demonstration deploying smart card login to Linux and web applications using tokens.
Generating Structured Test Data
Olšák, Ondřej ; Holík, Lukáš (referee) ; Smrčka, Aleš (advisor)
The goal of the bachelor's thesis is to create a tool for generating files with structure data content. The purpose of these files is to be used as test data conforming to testing of program input space. This thesis focuses on tree-structured data. The tool integrates tools implemented previously within Testos framework for generating test data in order to satisfy user-defined coverage criterion. The tool is able to generate a set of files in JSON or XML format containing test data satisfying ECC, BCC, or PWC coverage criterion.
Authentication in the IoT
Drápela, Roman ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
Bachelor thesis focuses on authentication in the IoT. Some of the authentication protocols from the area of IoT are introduced at the beginning of the thesis. Next part of the thesis describes the NFC and BLE technologies, which can be applied in the IoT. Multi-device protocol is implemented using different devices (PC, mobile phone, SmartWatch). This protocol enables autentication based on the processes above the elliptic curves. Two sets of measurements (simulated and practical) are provided. In the final part of the thesis all the results are assessed.
Token based authentication
Loviška, Martin ; Šťastný, Ladislav (referee) ; Franek, Lešek (advisor)
Thesis is dealing with possibilities of user authentication using a security token to Linux console and web applications. Theoretical part of this work is devoted to cryptography basics, particularly asymmetric cryptography algorithms . Thesis generally describes aut- hentication methods and includes a brief categorization of smart card devices. The practi- cal part deals with SmartCard - HSM device setup for a client and creating own certificate authority using this device. Finally, it presents a demonstration deploying smart card login to Linux and web applications using tokens.
Modern access control system
Vomáčka, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
The thesis describes the design of scheme for access system with user authentication via smart cards. The first chapter explains various types of identification items used for authentication of users and different types of readers and terminals, followed by chapter 2 with a deeper insight on smart cards with focus on their types, what internal structure and principle of communication with card readers are used, etc. with primary focus on Java cards. The third chapter describes Java Card cryptography - especially elliptic curve cryptography used on this platform. The fourth part focuses on PACE protocol with subsections dedicated to the individual parts of the protocol and its applicability to smart cards environment. Chapter 5 explains the proposed design of the authentication scheme elaborated in the thesis, including a detailed description of specific parts, their funcionality and exemplary usage in the created applications.
Analysis of attacks on asymmetric cryptosystems
Tvaroh, Tomáš ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
This thesis analyzes various attacks on underlying computational problem of asymmetric cryptosystems. First part introduces two of the most used problems asymmetric cryptography is based on, which are integer factorization and computation of discrete logarithm. Algorithms for solving these problems are described and for each of them there is a discussion about when the use of this particular algorithm is appropriate and when it isn't. In the next part computational problems are related to algorithms RSA and ECC and it is shown, how solving the underlying problem enables us to crack the cypher. As a part of this thesis an application was developed that measures the efficiency of described attacks and by providing easy-to-understand enumeration of algorithm's steps it can be used to demonstrate how the attack works. Based on the results of performed analysis, most secure asymmetric cryptosystem is selected along with some recommendations regarding key pair generation.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.