National Repository of Grey Literature 9 records found  Search took 0.01 seconds. 
Identification of Cryptocurrency Users
Zrnčík, Henrich ; Matoušek, Petr (referee) ; Veselý, Vladimír (advisor)
abstract.en={The 3rd January 2009 is considered to be the beginning of the cryptocurrency era. This work will deal with one of the ways of obtaining information about cryptocurrency users. It will be done by retrieving it from public websites where users often knowingly or unknowingly publish their cryptocurrency's address for different purposes (donation accounts or online payments which include personal data) as a result of which it is possible to link their crypto account with their real identity. The information is obtained through web scrappings. The result is an implemented application capable of automated collecting of data about the identity of cryptocurrency users and its subsequent storage in a structured database.
Secure Transport of NetFlow Data
Ručka, Tomáš ; Halfar, Patrik (referee) ; Grégr, Matěj (advisor)
The aim of my bachalor's thesis is secure transport NetFlow data. Communication in NetFlow is not protected against unauthorized intrusion, in addition works over UDP protocol which is protocol that allows data loss. The aim of this work is to create an encrypted tunnel through which communication will take place between the exporter and collector.
Laboratory exercise of attacks on HTTPS protocol
Šindler, Martin ; Číka, Petr (referee) ; Burda, Karel (advisor)
This thesis describes principles of specific HTTPS attacks and provides realization of attacks using lab environment based on VMware. Elaboration is divided to specific dedicated attacks, each part evaluates risk of vulnerability and describes the way of realization in guides for students and lector´s manuals.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Identification of Cryptocurrency Users
Zrnčík, Henrich ; Matoušek, Petr (referee) ; Veselý, Vladimír (advisor)
abstract.en={The 3rd January 2009 is considered to be the beginning of the cryptocurrency era. This work will deal with one of the ways of obtaining information about cryptocurrency users. It will be done by retrieving it from public websites where users often knowingly or unknowingly publish their cryptocurrency's address for different purposes (donation accounts or online payments which include personal data) as a result of which it is possible to link their crypto account with their real identity. The information is obtained through web scrappings. The result is an implemented application capable of automated collecting of data about the identity of cryptocurrency users and its subsequent storage in a structured database.
Laboratory exercise of attacks on HTTPS protocol
Šindler, Martin ; Číka, Petr (referee) ; Burda, Karel (advisor)
This thesis describes principles of specific HTTPS attacks and provides realization of attacks using lab environment based on VMware. Elaboration is divided to specific dedicated attacks, each part evaluates risk of vulnerability and describes the way of realization in guides for students and lector´s manuals.
Secure Transport of NetFlow Data
Ručka, Tomáš ; Halfar, Patrik (referee) ; Grégr, Matěj (advisor)
The aim of my bachalor's thesis is secure transport NetFlow data. Communication in NetFlow is not protected against unauthorized intrusion, in addition works over UDP protocol which is protocol that allows data loss. The aim of this work is to create an encrypted tunnel through which communication will take place between the exporter and collector.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Comparison of Java and Pascal potentials in finding private keys in assymetric cryptography
Reiter, Tomáš ; Tichý, Vladimír (advisor) ; Svatoš, Oleg (referee)
This document focuses on assymetric cryptography and Java and Pascal potentials in finding private keys in assymetric ciphers. The theoretical part summarizes basics and principles of some of integer factorisation algorithms. The practical part objective is to implement a factorisation algorithm in both Java and Pascal and compare their performance after a month of computing.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.