National Repository of Grey Literature 254 records found  previous11 - 20nextend  jump to record: Search took 0.04 seconds. 
Platform Independent Storge of Sensitive Data
Klemens, Jakub ; Herout, Adam (referee) ; Španěl, Michal (advisor)
This thesis addresses the issues when securing sensitive data for Windows, iOS and MacOS, with the target being to create the ideal key-value data storage library. A C++ library has been designed and implemented based on a given facts. The library offers a simple application programming interface for storing data and structuring them into modules. A base functionality is verified by set of unit tests.
Network attacks by Cain & Abel
Smékal, Lukáš ; Stančík, Peter (referee) ; Sobotka, Jiří (advisor)
This Master’s thesis is dealt in the local area network security, cryptographic algorithms, particular attacks on computer networks a practical application these attacks in local area networks. To application particular attacks is used the Cain & Abel program. The detailed manual for this program is created from the results of these attacks. This manual contains the exhibits of usage particular program tools and the attack application exhibits. This manual considers consequences of particular attacks and summarises achieved results during work with tools too. Master thesis closely deals with one of the program tools called RSA SecureID Token Calculator. Authentication via hardware tokens is contained in this Master thesis. Thesis contains the way of authentication using RSA SecureID Token Calculator without physical owning of the hardware token. Cain & Abel program shows and interprets why cashed passwords in operation system are dangerous and it shows methods how attacker can reveal this passwords from the operation system memory. This Master thesis is focused on sniffing credentials and passwords in local area networks and it is focused on cryptographic algorithms cracking for username and passwords revealing.
Security design for system of remote quality measurement of electric power
Jakubíček, Michal ; Koutný, Martin (referee) ; Mlýnek, Petr (advisor)
Bachelor thesis in the first chapter deals with the concept of quality of electric power and its parameters. The next chapter is focused on systems that used remote data collection and the current direction of evolution of these systems. The third of the thesis discusses the symmetric and asymmetric cryptographic systéme and their main representatives. The asymmetric system is described by the principle of calculating RSA and Diffie–Hellman. The next part deals with selected libraries that can count large numbers. Through the establishment of key using the Diffie–Hellman with these libraries. The evaluation of the used library in terms of speed, number of elementary cycles and memory consumption is inculded in the chapter 5. The last chapter explains the optimization focused on Ultra-Low Power MCU and shown Montgomery multiplication and squaring. It describes in detail the procedure of calculation and described why is his calculation faster than conventional modular multiplication and exponentiation. The appendix include installation instructions for the libraries BigDigits, GMP and OpenSSL in Visual Studio 2010.
Modern Asymmetric Cryptosystems
Walek, Vladislav ; Sobotka, Jiří (referee) ; Malina, Lukáš (advisor)
Asymmetric cryptography uses two keys for encryption public key and for decryption private key. The asymmetric cryptosystems include RSA, ElGamal, Elliptic Curves and others. Generally, asymmetric cryptography is mainly used for secure short messages and transmission encryption key for symmetric cryptography. The thesis deals with these systems and implements selected systems (RSA, ElGamal, McEliece, elliptic curves and NTRU) into the application. The application can test the features of chosen cryptosystems. These systems and their performance are compared and evaluated with the measured values. These results can predict the future usage of these systems in modern informatics systems.
Microsoft Office Password Recovery Using GPU
Zobal, Lukáš ; Veselý, Vladimír (referee) ; Hranický, Radek (advisor)
This thesis describes the password recovery of Microsoft Office documents by expanding an existing tool Wrathion. The thesis explains the issue of digital document protection, modern encryption and hashing algorithms and rudiments of OpenCL standard. Next, the analysis of structure of MS Word, MS Excel and MS PowerPoint documents is performed, including all the versions since 1997. Using this knowledge, we create a draft and an implementation of improved DOC module for newer versions of the encryption, as well as a draft and an implementation of brand new modules for XLS and PPT formats and their newer variants DOCX, XLSX and PPTX. After that, we measure performance of the new modules and compare it with other competing password recovery tools.
Cryptovirology
Kubík, Pavel ; Schäfer, Jiří (referee) ; Pecho, Peter (advisor)
This thesis is focused on a relatively new branch of computer security called Cryptovirology. It uses cryptography and its principles in conjunction with designing and writing malicious codes (e.g. computer viruses, trojan horses, worms). Techniques such as viral propagation through computer networks, capabilities of current viruses and similar threats are described. Beside cryptography and computer viruses, design of the cryptovirus and methods of a cryptoviral extortion attack along with their related potential are also analyzed below in this paper. As a proof of the concept in the given area of cryptovirology, a demonstrational computer program was written. The program was implemented with the respect to the satisfaction of the essentials set to the cryptovirus.
Generation of Cryptographic Key from Eye Biometric Features
Semerád, Lukáš ; Hájek, Josef (referee) ; Drahanský, Martin (advisor)
The main topic of the thesis is creation of formulas for the amount of information entropy in biometric characteristics of iris and retina. This field of science in biometrics named above is unstudied yet, so the thesis tries to initiate research in this direction. The thesis also discusses the historical context of security and identification fields according to biometric characteristics of a human being with an overlap for potential usage in biometrics of iris and retina. The Daugman’s algorithm for converting iris image into the binary code which can be used as a cryptographic key is discussed in detail. An application implementing this conversion is also a part of the thesis.
Library of Algorithms for Text Ciphering
Vozák, Petr ; Řezníček, Ivo (referee) ; Kubíček, Radek (advisor)
p, li { white-space: pre-wrap; } p, li { white-space: pre-wrap; } This thesis deals with text ciphering. The presented paper describes at first basic theoretical background of cryptology and basic distribution of cryptographic algorithms. Then it describes a brief history of encryption from beginning to present. Theoretical description of ciphering methods and its implementation details are discussed here. All basic types of conventional encryption algorithms and also some modern ciphering methods are included; these are substitution, transposition, steganographic or combinations encryption systems. The result of this thesis is the library of algorithms for text ciphering in Java with a sample application, which demonstrates its funcionality.
Implementation of Encryption Algorithms in VHDL Language
Kožený, Petr ; Martínek, Tomáš (referee) ; Kořenek, Jan (advisor)
This thesis deals with design and implementation of AES and DES encryption architectures for embedded systems. Architectures are implemented in VHDL language and design for FPGA technology. The proposed implementations are mapped on the Xilinx Spartan 3 technology. Both architectures are applied in simple ECB (Electronic Codebook) scheme with cache memories. A maximum throughput of design DES architecture 370 Mbps is achived with clock frequency of 104 MHz. The throughput of AES architecture at the maximum clock frequency of 118 MHz is 228 Mbps. Compared to software implementations for embedded systems, we achieve significantly higher throughput for both architectures.
Message Encryption over Text Messengers for Android
Balvín, David ; Burget, Radek (referee) ; Kolář, Dušan (advisor)
The main purpose of this thesis is to design and implement an application that would handle encrypted communication using several protocols or existing applications. The application is able to handle automatic encryption using a symetric-key algorithm for sending messages and decryption on demand for receiving/reading messages. It also supports asymetric exchange of keys for symetric encryption. A simple user interface is also created for this application, taking ideas from default SMS application for Android and popular Messenger a Whatsapp.

National Repository of Grey Literature : 254 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.