National Repository of Grey Literature 19 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Hash functions and their usage in user authentication
Piller, Igor ; Stančík, Peter (referee) ; Hajný, Jan (advisor)
This thesis concerns with hash functions and their usage in authentication. It presents basics of hash functions theory and construction elements. In particular the thesis focuses on LMHash, MD4, MD5 and SHA family hash functions, which are compared from the security point of view. The thesis describes in general the most frequently used hash function attacks, points out the weaknesses of current construction and mentions the future perspective of hash functions. Furthermore the thesis outlines the area authentication and describes usage of hash functions in the area. Practical part of the thesis contains an implements of a general authentication framework implemented in programming language C#. The result is client and server applications, in which two selected authentication methods were successfully tested. The result implementation is flexible with respect to the possible future use of other authentication methods.
Web applications for user authentication
Vybíral, Petr ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
The thesis deals with the problems of user authentication. The first chapter analyzes the problem of authentication, its methods and its utilization. The second chapter presents the different security options for communication. The chapter describes security, communication and authentication protocols. There is the 2D barcode QR Code described at the end of the chapter. The third chapter is devoted to ASP.NET technology, its development and possibilities of utilization. Attention is focused on web form and server controls. There is an analysis of elements of cookies and possibilities of their use. The last chapter consists of a practical part, which describes the development of a web application. There is a description of the parts of application, such as the database, the Web navigation, master pages and etc. in the following chapter. The cardinal part of the chapter consists of an analysis and implementation of forms authentication, the attribute authentication and authentication with QR code. Finally, there is a description of way how to secure the communication by using a certificate.
Hardware accelerated data transfer using TLS protocol
Zugárek, Adam ; Pokorný, Jiří (referee) ; Smékal, David (advisor)
This paper describes implementation of the whole cryptographic protocol TLS including control logic and used cryptographic systems. The goal is to implement an application in the FPGA technology, so it could be used in hardware accelerated network card. The reason for this is new supported higher transmission speeds that Ethernet is able to operate on, and the absence of implementation of this protocol on FPGA. In the first half of this paper is described theory of cryptography followed by description of TLS protocol, its development, structure and operating workflow. The second half describes the implementation on the chosen technology that is also described here. It is used already existing solutions of given cryptographic systems for the implementation, or at least their parts that are modified if needed for TLS. It was implemented just several parts of whole protocol, such are RSA, Diffie-Hellman, SHA and part of AES. Based on these implementations and continuing studying in this matter it was made conclusion, that FPGA technology is inappropriate for implementation of TLS protocol and its control logic. Recommendation was also made to use FPGA only for making calculations of given cryptographic systems that are controlled by control logic from software implemented on standard processors.
NSA Suite-B Cryptography algorithms
Rybka, Štěpán ; Malina, Lukáš (referee) ; Sobotka, Jiří (advisor)
This thesis entitled Algorithms Group SuiteB NSA Cryptography deals with algorithms, which are included in the set SuiteB. They serve to increase data protection and security during their transmission over an unsecured Internet environment. It also contains analysis of these algorithms, the encryption, decryption, creating hashes, key exchange, creating a signature and its verification. The algorithms are compared with others, already obsolete, or still used. The following are protocols using these algorithms. Output from the practical part is a web presentation that can serve as a teaching material.
Simulations of impact of security requirements on industrial system performance
Loskot, Michal ; Blažek, Petr (referee) ; Mlýnek, Petr (advisor)
Safety and security is always a hot topic in the world of information security, but only a few solve how much cryptographic algorithms affect the performance of systems. Newer longer-key algorithms may provide more security, but it takes longer to encrypt data, that is, they may contain extra bits, which increases transfer time and uses more memory to store additional information. This bachelor thesis is focused on the analysis of the impact of the security requirements of the ANSI/ISA-62443 standard on the performance of industrial systems. Communication is simulated in which cryptographic algorithms AES and SHA were used. These simulations are carried out in the open source simulation tool TTool, which enables embedded systems, hardware and software modeling, and simple simulations directly from UML and SysML diagrams.
Post-quantum cryptography on constrained devices
Matula, Lukáš ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In recent years, there has been a lot of technological development, which among other things, brings the designs and implementation of quantum computing. Using Shor’s algorithm for quantum computing, it is highly likely that the mathematical problems, which underlie the cryptographic systems, will be computed in polynomial time. Therefore, it is necessary to pay attention to the development of post-quantum cryptography, which is able to secure systems against quantum attacks. This work includes the summary and the comparison of different types of post-quantum cryptography, followed by measuring and analysing its levels of difficulty in order to implement them into limited devices, such as smart cards. The measured values on the PC are used to determine the most suitable implementation on the circuit card and then the verification method itself is implemented on it.
MS-NAP Support for AVG System
Kuchta, Ondřej ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This bachelor thesis deals with design and implementation of Microsoft NAP technology for AVG antivirus from the AVG Technologies Company. First part describes general architecture and deployment options of NAP technology. The next part describes design and implementation of client-side and server-side NAP support for AVG antivirus. The result is a comprehensive document about design and implementation of NAP for third-parties software solutions.
Photos with Timestamp
Mlejnek, Matěj ; Herout, Adam (referee) ; Zemčík, Pavel (advisor)
This thesis describes the design and implementation of a system for creating timestamps for photos in groups. It deals with the ways the group timestamp of multiple photos can be verified all at once. The whole system can be split into four parts. The first part is a mobile application, in which photos are taken by the user. The second part is the server on which photos are backed up and which relays the photos to a server that makes group timestamps. The third part is the server itself that creates the timestamps. The fourth part consists of user tools for retrospectively checking the existence of a valid group timestamp.
Parallel genetic algorithm
Trupl, Jan ; Kobliha, Miloš (referee) ; Jaroš, Jiří (advisor)
The thesis describes design and implementation of various evolutionary algorithms, which were enhanced to use the advantages of parallelism on the multiprocessor systems along with ability to run the computation on different machines in a computer network. The purpose of these algorithms is to find the global extreme of function of $n$ variables. In the thesis, there are demonstrated various optimization problems, and their effective solution with the help of evolutionary algorithms. There are also described interface libraries MPI(Message Passing Interface) and OpenMP, in the extent needed to understand the problematic of parallel evolutionary algorithms.
Simulations of impact of security requirements on industrial system performance
Loskot, Michal ; Blažek, Petr (referee) ; Mlýnek, Petr (advisor)
Safety and security is always a hot topic in the world of information security, but only a few solve how much cryptographic algorithms affect the performance of systems. Newer longer-key algorithms may provide more security, but it takes longer to encrypt data, that is, they may contain extra bits, which increases transfer time and uses more memory to store additional information. This bachelor thesis is focused on the analysis of the impact of the security requirements of the ANSI/ISA-62443 standard on the performance of industrial systems. Communication is simulated in which cryptographic algorithms AES and SHA were used. These simulations are carried out in the open source simulation tool TTool, which enables embedded systems, hardware and software modeling, and simple simulations directly from UML and SysML diagrams.

National Repository of Grey Literature : 19 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.