National Repository of Grey Literature 70 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Electronic Registry for Local Authority
Stránský, Karel ; Burget, Radek (referee) ; Rychlý, Marek (advisor)
Bachelor thesis "Electronic registry for local authority" is focused on usage of electronic registries for electronic communication between citizens and public authority. The first part describes the legislative page incidental with e-registries, principles of their functionality, and important requierements which are set on e-registiries. Furthermore elementary electronic signature's informations are included, along with creation and verification, and informations about certificates and certification authorities. The usage of digital signature at communication with electronic registry is also described. The second part is used to present particular concept of implemented sample electronic registry's system, and the solution of picked problems.
Digital certificates and certificate authorities
Lepa, Ondřej ; Hajný, Jan (referee) ; Člupek, Vlastimil (advisor)
This diploma thesis deals with certification and certification authorities, certification path PKI and principles of its validation and security. Also deals with structure of certificate itself and possible misuse of included information. Moreover, possibility of misues of third party certificates and proclamation of untrusted certificate to client's system.
Alternative methods in cryptology
Hampl, Dalibor ; Doležel, Radek (referee) ; Hajný, Jan (advisor)
In the first part of this thesis explains, what is generally cryptography, generally analyze the problem of the current encryption methods. These include asymmetric, symmetric and hybrid encryption methods. The second part focuses on the theory of lattices and their main mathematical problems, then the shortest vector problem, the closest vector problem, the approximate shortest vector problem and the approximate closest vector problem. Mathematically difficult problems of lattice are used in an encryption method GGH for asymmetrically encrypted communications method and GGH for digital signatures. It explains mathematical methods, which use these encryption methods. Another part of this thesis deals with the encryption method and the establishment of XTR on Diffie-Hellman protocol, thus XTR-DH. It explains mathematical methods, which use methods XTR, XTR-DH and Diffie-Hellman protocol. There are shown the main mathematical problems for this part of thesis DHP (Diffie-Hellman problem) and DLP (discrete logarithm problem). The fourth part focuses on a program designed to demonstrate the GGH encryption method for asymmetrically encrypted communications. Describes the structure, functionality, graphical part of the program and shows to a user interface. Students can test how the GGH encryption method behave when entering different input values. During the work with the program, the user should obtain sufficient information to understand the principles of this encryption method.
Elliptic curve based cryptosystems
Křivka, Petr ; Hajný, Jan (referee) ; Stančík, Peter (advisor)
In this bachelor thesis is examined problems elliptic curve cryptosystems. It is described mathematical underground, which use these systems. In more details is analyzed arithmetic finite fields. An important part of this work is the analysis of elliptical curves in cryptography. Among analyzed algorithms include e.g. ECDH or ECDSA. In conclusion is designed software solution, which helps in the study cryptosystems based elliptic curves. It allows basic operations over prime field.
Efficient Digital Signature Schemes
Varga, Ondrej ; Sobotka, Jiří (referee) ; Malina, Lukáš (advisor)
Digital signatures, which take the properties of classical signatures, are used to secure the actual content of documents, which can be modified during transmission over an insecure channel. The problems of security and protection of communicating participants are solved by cryptographic techniques. Identity verification, message integrity, credibility, the ownership of documents, and the secure transmission of information over an unsecured channel, are all dealt with in secure communications - Public Key Infrastructure, which uses digital signatures. Nowadays digital signatures are often used to secure data in communication over an unsecured channel. The aim of the following master’s thesis is to familiarize readers with the necessary technological aspects of digital signatures, as well as their advantages and disadvantages. By the time digital signatures are being used they will have to be improved and modified to be secure against more sophisticated attacks. In this paper, proposals of new efficient digital signature schemes and their comparison with current ones are described. Also are examined their implications for computationally weak devices, or deployment in low speed channel transmission systems. After an explanation of cryptography and a description of its basic subjects, digital signatures are introduced. The first chapter describes the possible formatting and architecture of the digital signature. The second part of this master’s thesis is about current digital signature schemes and their properties. Chapter 3 describes some proposals of new efficient digital signature schemes and their comparison to those currently in use. In the practical part, the implementations (in the environment .NET in C#) of two effective digital signature schemes as part of a client-server application are presented and described (Chapter 4). In the last chapter the comparison and analysis of the implemented signature schemes are provided.
Infrastructure of public keys
Bědajánek, Ondřej ; Malý, Jan (referee) ; Pust, Radim (advisor)
The subject of my thesis dscribes function and principles of the public key infrastructure as well as certificate authority. Under the operation system Linux was created self signed certificate authority. Web interface was devoloped in PHP for the purpose of the generation, distribution and rejection certificates. Configuration files for OpenVPN are included in the thesis and wireless security is achived by OpenVPN.
Copyright protection of electronic documents
Zachoval, Tadeáš ; Dzurenda, Petr (referee) ; Člupek, Vlastimil (advisor)
The bachelor thesis is focused on the copyright protection of electronic documents. The thesis consists of a theoretical part and a practical part. The theoretical part describes the electronic document and various types of files that can be encountered while working on a computer and consider them as electronic documents. The fundamental part of the theoretical part is the analysis of various copyright protection methods for electronic documents. In the practical part was created a Python application based on mentioned analysis. The application implements selected methods of copyright protection.
Certification authority
Herinek, Denis ; Sikora, Marek (referee) ; Zeman, Václav (advisor)
There is a lot of available services on the internet those need to be more secured and trusted. Public key infrastructure is used in sectors where are higher expectations in case of authentication, integrity and confidentality. It is almost impossible to imagine how internet banking or electronic signatures of important documents would work without PKI. There is a lot of open-source realisations of PKI created by users. Digital certificates as a part of PKI are issued by certificate authorities. This diploma thesis consists of open- source realisation of certificate authority and timestamping authority to demonstrate services which they provide.
Wireless robot control using mobile platform
Matuška, Jakub ; Kiac, Martin (referee) ; Přinosil, Jiří (advisor)
This bachelor’s thesis deals with design and implementation of an application for robot’s omnidirectional movement control using mobile platform. Implementation includes an Android application, used as user interface, as well as robot–side Python program for controlling movement and sending RTP stream to Android application. User can control robot’s movement using two virtual joysticks. Raspberry Pi was used as the control unit. The application has security module. Pipeline-based multimedia framework named GStreamer was used to implement RTP steaming. This paper describes necessary theory first and then introduces basic building blocks used in creation process of the application.
Software library of basic symmetric and asymmetric primitives of modern cryptography on embedded platforms
Miška, Matěj ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
This master thesis deals with a search of cryptographic primitives for embedded systems, which are tested on Raspberry Pi platforms and the results compared in the subsequent practical part. The content of the research is an explanation of the use of cryptography in information systems, an example of a protocol using cryptography in the energy sector, the selection of cryptographic primitives based on recommendations from security institutions, a description of Raspberry Pi embedded platforms and an introduction of cryptographic libraries providing tools to perform cryptographic operations. The theoretical part of the thesis results in an overview of the information needed to create a test tool. The subsequent practical part deals with the theoretical design of the required tool, the determination of the functions that the tool must have and the way of performing the testing. This is followed by a description of the choice of the programming language and development environment suitable for this work, together with a description of the internal structure of the developed application. The testing parameters are mainly the computational, memory and time requirements of the cryptographic primitives on the system. The paper concludes with methods of running and controlling the application, possible presentation of the measured results, the actual results of testing the selected embedded platforms and a discussion of these results.

National Repository of Grey Literature : 70 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.