National Repository of Grey Literature 26 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
System for Loging Changes in Operating System
Pečeňa, Jan ; Smrčka, Aleš (referee) ; Peringer, Petr (advisor)
Bachelor's thesis describes the design and implementation of applications for the detection of changes in the operating system. Window´s registry, registry key, subkey and value are explained in introductory part. Hash function needed to identify the changed files is explained too. The created application is fully functional and works with 32 and 64 bit versions of Windows. Actual state is saved in the first run. Changes in operating system are detected in the second run. Operating system is installed in a VMWare virtual machine.
Hash functions and their usage in user authentication
Piller, Igor ; Stančík, Peter (referee) ; Hajný, Jan (advisor)
This thesis concerns with hash functions and their usage in authentication. It presents basics of hash functions theory and construction elements. In particular the thesis focuses on LMHash, MD4, MD5 and SHA family hash functions, which are compared from the security point of view. The thesis describes in general the most frequently used hash function attacks, points out the weaknesses of current construction and mentions the future perspective of hash functions. Furthermore the thesis outlines the area authentication and describes usage of hash functions in the area. Practical part of the thesis contains an implements of a general authentication framework implemented in programming language C#. The result is client and server applications, in which two selected authentication methods were successfully tested. The result implementation is flexible with respect to the possible future use of other authentication methods.
Online DNSSEC Records Validation
Bachtík, Martin ; Čejka, Rudolf (referee) ; Lampa, Petr (advisor)
Master's Thesis is studying an extension that secures the domain name system by introducing the verifiability of authenticity of data, known as DNSSEC. Productive output is proposal of application and its subsequent implementation that at each stage of browse the namespace to the selected domain name checks the appropriatenesses of this extension and in detail reports the trusted chain.
GPGPU parallel computing
Pacura, Dávid ; Horák, Karel (referee) ; Petyovský, Petr (advisor)
The aim of this trim’s thesis is to reveal possibilities and demonstrate parallelization of computation on graphics processors. The paper presents descriptions of available development tools, and then one of them is selected to implement MD5 encryption algorithm and neural network for optical character recognition. Its performance is then compared to its parallel equivalent for conventional processors. In conclusion, problems encountered during development are described, and ways of avoiding them are discussed.
Security of real time multimedia data transmission
Otoupalík, Petr ; Koutný, Martin (referee) ; Hošek, Jiří (advisor)
This thesis deals with technology and security of real-time multimedia data transmission. The possibilities of the security of a multimedia data transfer and the mechanisms defined for the security of the signaling protocols SIP and H.323 are described with the view of security. The possible attacks on the real-time transfers are also mentioned. The basic requirements on the safe and reliable data transfer are specified. The main part of this thesis is focused on the security analysis of the data transmission of the selected communication clients, which use different security methods. The last part of the thesis deals with realization of simple attacks on multimedia data transmission and also on the SIP protocol.
Cryptography on an embedded platform
Korenčiak, Peter ; Hynčica, Ondřej (referee) ; Fiedler, Petr (advisor)
This bachelor thesis deals with adjusting parts of the public domain cryptographic library LibTomCrypt so that it can be used on an embedded platform Rabbit 3000. The hash functions MD5, SHA-1 and RIPEMD-128, the Blowfish cipher and CBC block cipher mode have been successfully ported to this platform. These algorithms have been analysed by measuring of the exectution time for the computational power requirements, especially with regard to the length of the input data. The abovementioned hash functions showed non-linear relationship between the execution time and the length of input, the graph of which is like that of a step function. The non-existence of the relationship to the data values was confirmed. The measurements with Blowfish cipher in CBC block cipher mode showed that inicialization of cipher is time consuming (it lasted almost one second on the hardware used) and that it does not depend on the keysize or length of input. The encryption and decryption itself showed a linear relationship to input data length. In the scope of this thesis there was also verification of correct function of SSL/TLS library from the producer of Rabbit microprocessor by creating a HTTPS server and verifying that secure connection with the web browser has been established. The library worked correctly according to manual without any significant problems.
Hash Algorithms in FPGA
Novotňák, Jiří ; Vašíček, Zdeněk (referee) ; Šimek, Václav (advisor)
This work is dealing with the implementation of MD5 hash algorithm in programmable FPGA circuit on FITkit education platform. Practical results of our effort primarily include two entities - one of them is responsible for a quick computation of MD5 algorithm while the other one handles the communication tasks between FITkit and host enviroment via RS232 link and SLIP-like protocol. The demonstration of the capabilities consists of a simple application, which transfers the given file to FITkit and displays the result of MD5 computation in the application window on PC. Brief evaluation and number of ideas for future improvements are given in the conclusion.
Design of user authentication for small and medium networks
Hajný, Jan ; Pust, Radim (referee) ; Burda, Karel (advisor)
The main focus of this Master’s thesis is user authentication and access control in a computer network. I analyze the TCP/IP model in connection with security and describe main stepping stones of authentication protocols (mainly hash functions). The authentication protocol analysis follows. I begin with LANMAN protocol analysis for the reason of a security comparison. The NTLM, Kerberos and Radius follows. The focus is on the Kerberos which is chosen as a main authentication protocol. This is also a reason why the modification used in MS domains is described. The implementation and functional verification is placed in the second part which is more practical. The virtualization technology is used for an easier manipulation. The result is a computer network model requiring user authentication and minimizing the possibility of an attack by unauthorized clients.
Electronic Mail Room of the BUT
Beran, Martin ; Křena, Bohuslav (referee) ; Marušinec, Jaromír (advisor)
This dissertation thesis attends to problems of electronic registry for VUT. It deals with the principal of electronic registry functioning, electronic signature and it compares offer of the commercial registries. It goes in for the proposal and implementation of the electronic registry for VUT. Since the using of the e- registry on all public service Office was legalized the people can avoid long queues and the employees are avoided from the stress before dead lines. By the communication through the electronic registry is very important the electronical signature. It is almost a full-valued and lawful alternative to the physical signature. For its safety and utility this system employes asymmetric codes and hash algorithm. Presently in many states, where the electronical signature is legalized it is used together with standard X 509 which defines the format of certificates, organization and action of certification authorities. The certification autority ensures safe connection of the person and general key for using of the electronical signature.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.

National Repository of Grey Literature : 26 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.