National Repository of Grey Literature 48 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Digital certificates and certificate authorities
Lepa, Ondřej ; Hajný, Jan (referee) ; Člupek, Vlastimil (advisor)
This diploma thesis deals with certification and certification authorities, certification path PKI and principles of its validation and security. Also deals with structure of certificate itself and possible misuse of included information. Moreover, possibility of misues of third party certificates and proclamation of untrusted certificate to client's system.
Password Recovery of RAR, BZIP, and GZIP Archives Using GPU
Mikuš, Dávid ; Holkovič, Martin (referee) ; Hranický, Radek (advisor)
This thesis describes cryptographic protection and the implementation of file password of RAR, GZIP, BZIP formats. For password recovery multi platform Wrathion tool is used, the tool can obtain a password from an encrypted file by using its modules and password generators. The module provides parsing of input file and storing data, which are later used for password validation. To accelerate calculations, graphics card and OpenCL framework is used. The core of thesis is the implementation of Wrathion's modules for password recovery of the formats denoted above and measuring the speed and comparision with competeting tools.
Security design for system of remote quality measurement of electric power
Jakubíček, Michal ; Koutný, Martin (referee) ; Mlýnek, Petr (advisor)
Bachelor thesis in the first chapter deals with the concept of quality of electric power and its parameters. The next chapter is focused on systems that used remote data collection and the current direction of evolution of these systems. The third of the thesis discusses the symmetric and asymmetric cryptographic systéme and their main representatives. The asymmetric system is described by the principle of calculating RSA and Diffie–Hellman. The next part deals with selected libraries that can count large numbers. Through the establishment of key using the Diffie–Hellman with these libraries. The evaluation of the used library in terms of speed, number of elementary cycles and memory consumption is inculded in the chapter 5. The last chapter explains the optimization focused on Ultra-Low Power MCU and shown Montgomery multiplication and squaring. It describes in detail the procedure of calculation and described why is his calculation faster than conventional modular multiplication and exponentiation. The appendix include installation instructions for the libraries BigDigits, GMP and OpenSSL in Visual Studio 2010.
Online DNSSEC Records Validation
Bachtík, Martin ; Čejka, Rudolf (referee) ; Lampa, Petr (advisor)
Master's Thesis is studying an extension that secures the domain name system by introducing the verifiability of authenticity of data, known as DNSSEC. Productive output is proposal of application and its subsequent implementation that at each stage of browse the namespace to the selected domain name checks the appropriatenesses of this extension and in detail reports the trusted chain.
Cluster Solution for HA OpenVPN
Dokoupil, Jiří ; Kašpárek, Tomáš (referee) ; Halfar, Patrik (advisor)
The aim of this bachelor's thesis is to analyze the possibilities for running the OpenVPN daemon in a cluster and to implement such a solution. At first, the thesis analyzes current technologies and possible approaches to this matter. Next there's one possible solution described more and implemented. In the end there are results being analyzed, mostly by describing the tests, that took place with the implemented solution.
Software library of basic symmetric and asymmetric primitives of modern cryptography on embedded platforms
Miška, Matěj ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
This master thesis deals with a search of cryptographic primitives for embedded systems, which are tested on Raspberry Pi platforms and the results compared in the subsequent practical part. The content of the research is an explanation of the use of cryptography in information systems, an example of a protocol using cryptography in the energy sector, the selection of cryptographic primitives based on recommendations from security institutions, a description of Raspberry Pi embedded platforms and an introduction of cryptographic libraries providing tools to perform cryptographic operations. The theoretical part of the thesis results in an overview of the information needed to create a test tool. The subsequent practical part deals with the theoretical design of the required tool, the determination of the functions that the tool must have and the way of performing the testing. This is followed by a description of the choice of the programming language and development environment suitable for this work, together with a description of the internal structure of the developed application. The testing parameters are mainly the computational, memory and time requirements of the cryptographic primitives on the system. The paper concludes with methods of running and controlling the application, possible presentation of the measured results, the actual results of testing the selected embedded platforms and a discussion of these results.
Design of security infrastructure for electronic archive
Doležel, Radek ; Lattenberg, Ivo (referee) ; Zeman, Václav (advisor)
This master's thesis deals with design of security infrastructure for electronic archive. In theoretical part is disscus about technical resources which are based on security services and protocols and methods which are used for protection. On basics of theoretical part is designed model of security infrastructure and it is built in laboratory. Model of security infrastructure is based on Open Source Software and as safety storages for private user authentication data are used cryptographic USB tokens. This master's thesis includes design and construction of real infrastructure of secured electronic archive. In each part of master's thesis is put main emphases on security and clear explanation from the beginning of desing of model of security infrastructure for electronic archive to finish of construction.
Cryptography Acceleration Using GPU
Potěšil, Josef ; Čejka, Rudolf (referee) ; Lampa, Petr (advisor)
The reader will be familiar with selected concepts of cryptography consited in this work. AES algorithm was selected in conjunction with the description of architecture and software for programming graphic cards (CUDA, OpenCL), in order to create its GPU-accelerated version. This thesis tries to map APIs for communication with crypto-coprocessors, which exist in kernels of Linux/BSD operating systems (CryptoAPI, OCF). It examines this support in the cross-platform OpenSSL library. Subsequently, the work discusses the implementation details, achieved results and integration with OpenSSL library. The conclusion suggests how the developed application could be used and briefly suggests its usage directly by the operating system kernel.
Comparison of Cryptographic Libraries in Linux Environment
Bartoš, Milan ; Malinka, Kamil (referee) ; Barabas, Maroš (advisor)
Bachelor's thesis deals with the comparison of the three cryptographic libraries used in the Linux environment. These are GnuTLS/nettle, NSS and OpenSSL. These are compared in terms of support for basic cryptographic functionality (symmetric and asymmetric ciphers, hash algorithms, SSL/TLS), working with hardware tokens and SSL/TLS. Libraries are also compared in terms of API design with a focus on stability and work with certificates and the possibility of more independent use of the library in a single process.
Intercept of the Modern Cryptographic Protocols
Halinár, Petr ; Košař, Vlastimil (referee) ; Kaštil, Jan (advisor)
This paper discusses the security-set used in communication networks. It contains a brief overview of the protocols and architecture description of public keys. Deals in detail with a description of certificates, their backgrounds and SSL protocols. It also represents a number of security shortcomings of these protocols and application design for the interception of HTTPS. Also the results of experiments with this application are stated.

National Repository of Grey Literature : 48 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.