National Repository of Grey Literature 16 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Online DNSSEC Records Validation
Bachtík, Martin ; Čejka, Rudolf (referee) ; Lampa, Petr (advisor)
Master's Thesis is studying an extension that secures the domain name system by introducing the verifiability of authenticity of data, known as DNSSEC. Productive output is proposal of application and its subsequent implementation that at each stage of browse the namespace to the selected domain name checks the appropriatenesses of this extension and in detail reports the trusted chain.
Http Tunneling of Camera Image Data Transmission
Kabelka, Michal ; Ráb, Jaroslav (referee) ; Ryšavý, Ondřej (advisor)
This thesis is trying to describe design and implementation of software for communication interface of camera with server developed for company Wasatis. The first part is describing difficulties and effort to finding solutions to given problems. The next part is about communication through interface called Call Back Connection. In next few parts it is describing process of implementation and principle of configuration of applications. In final part it solves security questions of communication.
Realization of attack on SHA-1 hash function
Dziura, Michal ; Hajný, Jan (referee) ; Malý, Jan (advisor)
The bachelor thesis is concerned with hash functions, SHA-1 function and its implementation in Java. The thesis describes weaknesses of this function and implements the implementation of the selected attack leading to the revelation of source text or attack based on targeted falsifying hash. This work also describes characteristics of hash functions, constructions and their use. The last part deals with a description of the attack on the hash function SHA-1 with the complexity of the 2^69.
Control of electronic systems via web interface
Dufek, Ladislav ; Šilhavý, Pavel (referee) ; Zeman, Václav (advisor)
This master thesis goes into problematics of design of an electronic device control system and its realization. First of all its overall conception is specified and potential hardware platforms are analyzed afterwards. Based on this analysis the system’s final conception is drawn up, the device’s circuit layout is created and finally a functional prototype is manufactured. The later part of this thesis describes the software accessories and tools. The principles of a chosen operating system, management application and webbased interface are described along with the problems of authentization to solve. The proposed solutions for the authentization-specific tasks gave rise to the final implementation of the authentization methods and techniques.
Application for Demonstration of Hash Algorithms SHA-1 and SHA-2
Siska, Josef ; Petrlík, Jiří (referee) ; Novotňák, Jiří (advisor)
In this thesis, the theory related to the hash algorithms SHA-1 and SHA-2 is presented, along with a description of possible implementation of an application that demonstrates how these algorithms work. The first part of this thesis describes the principles of construction of hash functions, their use and history of selected hash functions. The two following chapters present conventions and algorithms of the SHA-1 and SHA-2. The next chapter describes the general concepts related to the attacks on the hash functions and selected attacks are presented in more detail. The last two chapters outline the design and implementation of an application that was created as part of this work. In the end the evaluation of results of this thesis and proposals for its possible continuation are presented.
Cryptography on an embedded platform
Korenčiak, Peter ; Hynčica, Ondřej (referee) ; Fiedler, Petr (advisor)
This bachelor thesis deals with adjusting parts of the public domain cryptographic library LibTomCrypt so that it can be used on an embedded platform Rabbit 3000. The hash functions MD5, SHA-1 and RIPEMD-128, the Blowfish cipher and CBC block cipher mode have been successfully ported to this platform. These algorithms have been analysed by measuring of the exectution time for the computational power requirements, especially with regard to the length of the input data. The abovementioned hash functions showed non-linear relationship between the execution time and the length of input, the graph of which is like that of a step function. The non-existence of the relationship to the data values was confirmed. The measurements with Blowfish cipher in CBC block cipher mode showed that inicialization of cipher is time consuming (it lasted almost one second on the hardware used) and that it does not depend on the keysize or length of input. The encryption and decryption itself showed a linear relationship to input data length. In the scope of this thesis there was also verification of correct function of SSL/TLS library from the producer of Rabbit microprocessor by creating a HTTPS server and verifying that secure connection with the web browser has been established. The library worked correctly according to manual without any significant problems.
Electronic Mail Room of the BUT
Beran, Martin ; Křena, Bohuslav (referee) ; Marušinec, Jaromír (advisor)
This dissertation thesis attends to problems of electronic registry for VUT. It deals with the principal of electronic registry functioning, electronic signature and it compares offer of the commercial registries. It goes in for the proposal and implementation of the electronic registry for VUT. Since the using of the e- registry on all public service Office was legalized the people can avoid long queues and the employees are avoided from the stress before dead lines. By the communication through the electronic registry is very important the electronical signature. It is almost a full-valued and lawful alternative to the physical signature. For its safety and utility this system employes asymmetric codes and hash algorithm. Presently in many states, where the electronical signature is legalized it is used together with standard X 509 which defines the format of certificates, organization and action of certification authorities. The certification autority ensures safe connection of the person and general key for using of the electronical signature.
Online DNSSEC Records Validation
Bachtík, Martin ; Čejka, Rudolf (referee) ; Lampa, Petr (advisor)
Master's Thesis is studying an extension that secures the domain name system by introducing the verifiability of authenticity of data, known as DNSSEC. Productive output is proposal of application and its subsequent implementation that at each stage of browse the namespace to the selected domain name checks the appropriatenesses of this extension and in detail reports the trusted chain.
Electronic Mail Room of the BUT
Beran, Martin ; Křena, Bohuslav (referee) ; Marušinec, Jaromír (advisor)
This dissertation thesis attends to problems of electronic registry for VUT. It deals with the principal of electronic registry functioning, electronic signature and it compares offer of the commercial registries. It goes in for the proposal and implementation of the electronic registry for VUT. Since the using of the e- registry on all public service Office was legalized the people can avoid long queues and the employees are avoided from the stress before dead lines. By the communication through the electronic registry is very important the electronical signature. It is almost a full-valued and lawful alternative to the physical signature. For its safety and utility this system employes asymmetric codes and hash algorithm. Presently in many states, where the electronical signature is legalized it is used together with standard X 509 which defines the format of certificates, organization and action of certification authorities. The certification autority ensures safe connection of the person and general key for using of the electronical signature.
Development and utilization of hash functions for information processing
Zimmermannová, Jana ; Ivánek, Jiří (advisor) ; Souček, Martin (referee)
At the end of 70th of last century the concept began to emerge, now is referred as a cryptographic hash function. Currently, these functions are associated especially with a digital signature. In 2005, the worldwide most used function SHA-1 was broken. This fact led in 2007 NIST announced a public competition to create a new secure hash algorithm. This Thesis deals with issues of cryptographic hash functions from the beginning of their theoretical formulation to current events in this area. Key words: Cryptographic hash functions, SHA-1, MD5, NIST competition

National Repository of Grey Literature : 16 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.