National Repository of Grey Literature 20 records found  1 - 10next  jump to record: Search took 0.00 seconds. 
Linear Cryptoanalysis
Kopko, Jan ; Hanáček, Petr (referee) ; Cvrček, Daniel (advisor)
This paper discusses one of possible attacks on block ciphers - linear cryptanalysis. In the beginning of this paper a basic structure of block cipher is presented, as well as concrete cipher on which the linear cryptanalysis is presented. After that basic principles of linear cryptanalysis and a preview of attack on this cipher follow.
AES Tolerance to Timing Analysis
Ondruš, Juraj ; Matyáš, Václav (referee) ; Cvrček, Daniel (advisor)
This thesis deals with timing analysis of the AES (Advanced Encryption Standard). The design of {\em Rijndael\/}, which is the AES algorithm, is described here. For the side channel attacks is necessary to know the principles of the cache memory in CPU and its architecture. In this thesis are involved major security problems of AES which can be used for successful attacks. Several different implementations of AES are discussed too. Several types of timing attaks are also described. According to the experimentations these attacks should be efficient to the most presently used AES implementations. Finally, the results of this work are described, possible countermeasures against this attack and motions for the next research.
Configurable Security Email Proxy
Židek, Stanislav ; Samek, Jan (referee) ; Cvrček, Daniel (advisor)
This bachelor thesis deals with design and implementation of multiuser configurable system capable of securing communication via electronic mail. Emphasis is put especially on remote configuration. It also describes existing protocols used for this communication and some of the mechanisms that can secure this communication from different points of view.
User Authentication and Autorization for New Generation Networks
Přibyl, Radek ; Cvrček, Daniel (referee) ; Matoušek, Petr (advisor)
This document describes methods of user authentication and authorisation via a trusted server. There is analysis of the system Kerberos, which is used as an inspiration for desing of a new authentication scheme. There are analysed programming layers and interfaces for specific applications ensuring user authentication and authorisation. The document contains a design and detailed description of a new authentication scheme. This scheme is implemented into the communication between email client and imap server.
User Interface for WiFi Network Security System
Hirš, Petr ; Chudý, Robert (referee) ; Cvrček, Daniel (advisor)
This master thesis deals with analysis of an implementation of a reputation system. I particularly focus on analysis of user interface and to find an approach for possible user interface improvements of such a reputation system. I describe possible solutions and I also compare my solution with similar existing systems that are also focused on network security. A part of the diploma thesis is devoted to user interface design. There is also mentioned a database design together with a way the users log on into the system. A few chapters are devoted to the area of data presentation and the usage of template system. In the work there are also described interesting issues that appeared during the implementation. In the conclusion of this work, there is an overall project evaluation and also several remarks about the possible upgrade.
Encrypting Landlines Phone Communication
Vávra, Jakub ; Kumpošt, Marek (referee) ; Cvrček, Daniel (advisor)
This master's thesis is about making draft and implementing land-line phone call encryption using FITkit. The ultimate goal is to find suitable compression and encryption methods, implement or adapt them for FITkit board and create functional solution.
Security Analysis of WiFi Networks
Butela, Michal ; Malinka, Kamil (referee) ; Cvrček, Daniel (advisor)
This document provides overview of commonly used standards and mechanisms for securing the wireless network based on Wi-Fi protocol. It is covering all important security areas including confidentiality, integrity and authentication. We can find here also detailed analysis and description of functionality of listed mechanisms. Description of possible attacks against listed security mechanisms. There is a measurement of influence of encryption to transfer speed in the another section. It's followed by attacks against particular security mechanisms. And finally, description of deployment of central authentication system.
Copy Protection of CD and DVD
Řehák, Lukáš ; Říha, Zdeněk (referee) ; Cvrček, Daniel (advisor)
This bachelor thesis is about the CD anc DVD copy protection, its discription, classification and testing. It also focuses on the quality of the protections, frequency of use, possibility of succesful copying and other properties of these protections. Then it discusses the reasons for using these protections.
Honey-Pot: System for Attack Detection
Michlovský, Zbyněk ; Malinka, Kamil (referee) ; Cvrček, Daniel (advisor)
This thesis deals with the area of honeypots and honeynets. It defines their classification and contains detailed descriptions of their properties and features. It further elaborates on several freely available systems. The main focus is given to honeypot Nepethes that was being run for one month on an unfiltered Internet connection. A detailed analysis of the collected data is then given.
Cryptovirology and Future of Malware
Prchal, Josef ; Říha, Zdeněk (referee) ; Cvrček, Daniel (advisor)
Malware is connected to information technology. They influence each other. The aim of this thesis is to describe various types of this software and give a brief account of its history and development. It also discusses main trends of this area and tries to foretell the future development.

National Repository of Grey Literature : 20 records found   1 - 10next  jump to record:
See also: similar author names
3 Cvrček, David
Interested in being notified about new results for this query?
Subscribe to the RSS feed.