National Repository of Grey Literature 5 records found  Search took 0.00 seconds. 
Real-Time Simulation Library in 3D Space
Benna, Tomáš ; Peringer, Petr (referee) ; Hrubý, Martin (advisor)
This thesis describes design and implementation of 3D space physical real-time simulation system as add-on to graphical engine. System contains processing of rigid solid simulation, collision detection and response, which are provided by physical laws. Document contains theoretical introduction of this course of study, design and implementation as multiplatform library and description of user interfaces. Output of this thesis, except library, is also example applications, which demonstrate functionality of designed simulation model.
Hash functions - characteristics, implementation and collisions
Karásek, Jan ; Sobotka, Jiří (referee) ; Lambertová, Petra (advisor)
Hash functions belong to elements of modern cryptography. Their task is to transfer the data expected on the entry into a unique bite sequence. Hash functions are used in many application areas, such as message integrity verification, information authentication, and are used in cryptographic protocols, to compare data and other applications. The goal of the master’s thesis is to characterize hash functions to describe their basic characteristics and use. Next task was to focus on one hash function, in particular MD5, and describe it properly. That means, to describe its construction, safety and possible attacks on this function. The last task was to implement this function and collisions. The introductory chapters describe the basic definition of hash function, the properties of the function. The chapters mention the methods preventing collisions and the areas were the hash functions are used. Further chapters are focused on the characteristics of various types of hash functions. These types include basic hash functions built on basic bit operations, perfect hash functions and cryptographic hash functions. After concluding the characteristics of hash functions, I devoted to practical matters. The thesis describes the basic appearance and control of the program and its individual functions which are explained theoretically. The following text describes the function MD5, its construction, safety risks and implementation. The last chapter refers to attacks on hash functions and describes the hash function tunneling method, brute force attack and dictionary attack.
Kombinatorika hashovacích funkcí
Sýkora, Jiří ; Holub, Štěpán (advisor) ; Šaroch, Jan (referee)
In this thesis, we study hash functions. We focus mainly on the famous Merkle-Damg˚ard construction and its generalisation. We show that even this generalised construction is not resistant to multicollision attacks. Combinatorics on words plays a fundamental role in the construction of our attack. We prove that regularities unavoidably appear in long words with bounded number of symbol occurences. We present our original results concerning regularities in long words. We lower some earlier published estimates, thus reducing the comlexity of the attack. Our results show that generalised iterated hash functions are interesting rather from the theoretical than practical point of view. 1
Real-Time Simulation Library in 3D Space
Benna, Tomáš ; Peringer, Petr (referee) ; Hrubý, Martin (advisor)
This thesis describes design and implementation of 3D space physical real-time simulation system as add-on to graphical engine. System contains processing of rigid solid simulation, collision detection and response, which are provided by physical laws. Document contains theoretical introduction of this course of study, design and implementation as multiplatform library and description of user interfaces. Output of this thesis, except library, is also example applications, which demonstrate functionality of designed simulation model.
Hash functions - characteristics, implementation and collisions
Karásek, Jan ; Sobotka, Jiří (referee) ; Lambertová, Petra (advisor)
Hash functions belong to elements of modern cryptography. Their task is to transfer the data expected on the entry into a unique bite sequence. Hash functions are used in many application areas, such as message integrity verification, information authentication, and are used in cryptographic protocols, to compare data and other applications. The goal of the master’s thesis is to characterize hash functions to describe their basic characteristics and use. Next task was to focus on one hash function, in particular MD5, and describe it properly. That means, to describe its construction, safety and possible attacks on this function. The last task was to implement this function and collisions. The introductory chapters describe the basic definition of hash function, the properties of the function. The chapters mention the methods preventing collisions and the areas were the hash functions are used. Further chapters are focused on the characteristics of various types of hash functions. These types include basic hash functions built on basic bit operations, perfect hash functions and cryptographic hash functions. After concluding the characteristics of hash functions, I devoted to practical matters. The thesis describes the basic appearance and control of the program and its individual functions which are explained theoretically. The following text describes the function MD5, its construction, safety risks and implementation. The last chapter refers to attacks on hash functions and describes the hash function tunneling method, brute force attack and dictionary attack.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.