National Repository of Grey Literature 57 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Electronic Registry for Local Authority
Stránský, Karel ; Burget, Radek (referee) ; Rychlý, Marek (advisor)
Bachelor thesis "Electronic registry for local authority" is focused on usage of electronic registries for electronic communication between citizens and public authority. The first part describes the legislative page incidental with e-registries, principles of their functionality, and important requierements which are set on e-registiries. Furthermore elementary electronic signature's informations are included, along with creation and verification, and informations about certificates and certification authorities. The usage of digital signature at communication with electronic registry is also described. The second part is used to present particular concept of implemented sample electronic registry's system, and the solution of picked problems.
System for Loging Changes in Operating System
Pečeňa, Jan ; Smrčka, Aleš (referee) ; Peringer, Petr (advisor)
Bachelor's thesis describes the design and implementation of applications for the detection of changes in the operating system. Window´s registry, registry key, subkey and value are explained in introductory part. Hash function needed to identify the changed files is explained too. The created application is fully functional and works with 32 and 64 bit versions of Windows. Actual state is saved in the first run. Changes in operating system are detected in the second run. Operating system is installed in a VMWare virtual machine.
Evolutionary Design of Hash Functions Using Grammatical Evolution
Freiberg, Adam ; Bidlo, Michal (referee) ; Sekanina, Lukáš (advisor)
Grammatical evolution allows us to automate creating solutions to various problems in arbitrary programming languages. This thesis takes advantage of this method to experimentally generate new hash functions focused specifically on network flow hashing. Subsequently, these newly generated functions are compared with existing state-of-the-art hash functions, created by experts in the field.
Hash functions and their usage in user authentication
Piller, Igor ; Stančík, Peter (referee) ; Hajný, Jan (advisor)
This thesis concerns with hash functions and their usage in authentication. It presents basics of hash functions theory and construction elements. In particular the thesis focuses on LMHash, MD4, MD5 and SHA family hash functions, which are compared from the security point of view. The thesis describes in general the most frequently used hash function attacks, points out the weaknesses of current construction and mentions the future perspective of hash functions. Furthermore the thesis outlines the area authentication and describes usage of hash functions in the area. Practical part of the thesis contains an implements of a general authentication framework implemented in programming language C#. The result is client and server applications, in which two selected authentication methods were successfully tested. The result implementation is flexible with respect to the possible future use of other authentication methods.
Modular Content Management System in ASP.NET
Michalovič, Miroslav ; Karásek, Jan (referee) ; Malina, Lukáš (advisor)
This bachelor thesis contains a proposal of a content management system, created according to the standards usually required of systems working with content management, these standards are the object of the opening chapter. In this chapter, options of the realization and their advantages are also discussed. The system is realized through ASP.NET, which is a part of a bigger .NET Framework, a platform, which also comprises of some additional technologies, which were used in the project. The technologies used during the application development are discussed in the second chapter. The content management in the proposed application would not be possible without a functional database, which the third chapter describes. A relational database model based on a client-server communication using SQL inquiries was selected for the developed application. The fourth chapter is dedicated to the application creation itself, which is made of a simple interface for the synchronization of clients’ replies to the events of logged users. This chapter also contains a database proposal and a description of the individual application content. The final chapter is dedicated to the security of the project along with the potential risks description and their existing or proposed solutions. The appendices shows the visual part of application and it’s components.
Safe Cryptography Algorithms
Mahdal, Jakub ; Hanáček, Petr (referee) ; Chmelař, Petr (advisor)
This thesis brings a reader an overview about historical and modern world of cryptographic methods, as well evaluates actual state of cryptographic algorithm progressions, which are used in applications nowadays. The aim of the work describes common symmetric, asymmetric encryption methods, cryptographic hash functions and as well pseudorandom number generators, authentication protocols and protocols for building VPNs. This document also shows the basics of the successful modern cryptanalysis and reveals algorithms that shouldn't be used and which algorithms are vulnerable. The reader will be also recommended an overview of cryptographic algorithms that are expected to stay safe in the future.
Hash Function Design Using Genetic Programming
Michalisko, Tomáš ; Piňos, Michal (referee) ; Sekanina, Lukáš (advisor)
This thesis deals with automated design of hash functions using Cartesian genetic programming. The chosen method for collision resolution is cuckoo hashing. Three variants of hash function encodings were compared. Experiments were performed with datasets containing network flows. The most suitable parameters of CGP, including the function set, were determined. The best evolved hash functions achieved comparable results to the functions designed by experts. The main finding is that hash functions consisting of 64-bit operations achieve the best results.
Electronic money
Gescheidt, Daniel ; Komosný, Dan (referee) ; Zeman, Václav (advisor)
In this bachelor thesis are described electronic money systems, which uses cryptography techniques such as symmetric and asymmetric ciphers, digital sign and hash function. Describing those techniques is crucial for understanding how electronic money systems works. Then three electronic money systems from Czech republic are briefly described.
Implementation of modern hash functions
Trbušek, Pavel ; Sobotka, Jiří (referee) ; Stančík, Peter (advisor)
Master's thesis analyses modern hash functions. The requirements for these features and briefly outlined some of the types of attacks are given in the first part. The second part focuses on the specication Skein hash function, which is among the candidates for the new SHA-3 standard, and a description of the JCOP platform, which is a function implemented. In the last part of the work there are discussed implementation problematic parts and evaluation of the selected solution.
Password deposition techniques in operating systems
Pavlík, Martin ; Růčka, Lukáš (referee) ; Hajný, Jan (advisor)
This master thesis deals with ways to store passwords in current operating systems. Specifically, this work focuses on Windows, Linux, BSD and OS X. These systems are examined for ways of hashing passwords and on resistance of resulting hashes against various attacks. First (theoretical) section describes the procedures and algorithms that are needed for user authentication. This part also describes methods of hash storing. At the end of the theoretical part are generally described some possible attacks against hash functions. In second (practical) part is described and tested tools for obtaining hashes of the investigated operating systems. Subsequently practical attacks were conducted against obtained hashes by using appropriate tools. Furthermore there are presented results of the attacks. In the conclusion of the work there is a comparison of tools and methods which were used to obtain plaintext passwords from operating systems.

National Repository of Grey Literature : 57 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.