National Repository of Grey Literature 6 records found  Search took 0.01 seconds. 
Safe Cryptography Algorithms
Mahdal, Jakub ; Hanáček, Petr (referee) ; Chmelař, Petr (advisor)
This thesis brings a reader an overview about historical and modern world of cryptographic methods, as well evaluates actual state of cryptographic algorithm progressions, which are used in applications nowadays. The aim of the work describes common symmetric, asymmetric encryption methods, cryptographic hash functions and as well pseudorandom number generators, authentication protocols and protocols for building VPNs. This document also shows the basics of the successful modern cryptanalysis and reveals algorithms that shouldn't be used and which algorithms are vulnerable. The reader will be also recommended an overview of cryptographic algorithms that are expected to stay safe in the future.
Notification robot
Hudák, Filip ; Horváth, Tomáš (referee) ; Holík, Martin (advisor)
The bachelor thesis focuses on the creation of notification bot for appropriate communication channel. In theoretical part, different communication channels are compared based on price, privacy, encryption, popularity etc. Practical part describes registration and application setting of communication, tests of data acquisition and sending messages to the communication channel. It deals with the design of a communication module, which stores a token and secret key, with simplified method for sending messages. It states design and a structure of the notification bot, as well as the design of communication interfaces for the communication with third party applications. It places importance on fast and secure encryption via created communication interfaces using best practices. Next point in the pratical part describes tracking individual web pages with easy addition of web pages. In conclusion it describes Docker images installation, which is followed by own containers deployment.
Specifications Database of Security Protocols
Papež, Zdeněk ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This bachelor's thesis is about the security protocols which are necessary for safe communication in the Internet. There are various kinds of security protocols in use but this work covers only selection of most important of them. I have tried to gather all available information and work them out into uniform database which can be used for further processing. In my opinion, main aid of this work is precise description of knowledge baseand prediction base of each protocol. Also all possible conditions and states are described. The end of part of this work sums up all concerned protocols into a user-friendly table which is used in web-side database accessible from the Internet.
Notification robot
Hudák, Filip ; Horváth, Tomáš (referee) ; Holík, Martin (advisor)
The bachelor thesis focuses on the creation of notification bot for appropriate communication channel. In theoretical part, different communication channels are compared based on price, privacy, encryption, popularity etc. Practical part describes registration and application setting of communication, tests of data acquisition and sending messages to the communication channel. It deals with the design of a communication module, which stores a token and secret key, with simplified method for sending messages. It states design and a structure of the notification bot, as well as the design of communication interfaces for the communication with third party applications. It places importance on fast and secure encryption via created communication interfaces using best practices. Next point in the pratical part describes tracking individual web pages with easy addition of web pages. In conclusion it describes Docker images installation, which is followed by own containers deployment.
Specifications Database of Security Protocols
Papež, Zdeněk ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This bachelor's thesis is about the security protocols which are necessary for safe communication in the Internet. There are various kinds of security protocols in use but this work covers only selection of most important of them. I have tried to gather all available information and work them out into uniform database which can be used for further processing. In my opinion, main aid of this work is precise description of knowledge baseand prediction base of each protocol. Also all possible conditions and states are described. The end of part of this work sums up all concerned protocols into a user-friendly table which is used in web-side database accessible from the Internet.
Safe Cryptography Algorithms
Mahdal, Jakub ; Hanáček, Petr (referee) ; Chmelař, Petr (advisor)
This thesis brings a reader an overview about historical and modern world of cryptographic methods, as well evaluates actual state of cryptographic algorithm progressions, which are used in applications nowadays. The aim of the work describes common symmetric, asymmetric encryption methods, cryptographic hash functions and as well pseudorandom number generators, authentication protocols and protocols for building VPNs. This document also shows the basics of the successful modern cryptanalysis and reveals algorithms that shouldn't be used and which algorithms are vulnerable. The reader will be also recommended an overview of cryptographic algorithms that are expected to stay safe in the future.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.