Národní úložiště šedé literatury Nalezeno 4 záznamů.  Hledání trvalo 0.00 vteřin. 
Cryptographic protocols used in computer networks
Lúdik, Michal ; Hajný, Jan (oponent) ; Doležel, Radek (vedoucí práce)
This work deals with the analysis of basic cryptographic protocols, principle of the authentication and verification of their safety. In the first part of the work is a short introduction to the issue - cryptography, some types of attacks, authentication and authorisation. In the second part is the analysis of protocols SSH, SSL, IPSec, and Kerberos, authentication and verification of their functionality and security under laboratory conditions.
Automatic Kerberos Key Rotation
Kos, Ondřej ; Henzl, Martin (oponent) ; Zelený, Jan (vedoucí práce)
This thesis is focused on the Kerberos authentication system and itsmanagement, primarily in the area of the Keytab files. The thesis describes the basic components of the whole system which are involved in these operations and their main properties. The FreeIPA administration system is partly described as well. It uses the Kerberos for the users' authentication. The main objective of this work was to develop an application capable of ,automatically and without user's effort, rotation of the Kerberos keys and thus enhance the security level of the whole system in cases of the communication eavesdropping.
Automatic Kerberos Key Rotation
Kos, Ondřej ; Henzl, Martin (oponent) ; Zelený, Jan (vedoucí práce)
This thesis is focused on the Kerberos authentication system and itsmanagement, primarily in the area of the Keytab files. The thesis describes the basic components of the whole system which are involved in these operations and their main properties. The FreeIPA administration system is partly described as well. It uses the Kerberos for the users' authentication. The main objective of this work was to develop an application capable of ,automatically and without user's effort, rotation of the Kerberos keys and thus enhance the security level of the whole system in cases of the communication eavesdropping.
Cryptographic protocols used in computer networks
Lúdik, Michal ; Hajný, Jan (oponent) ; Doležel, Radek (vedoucí práce)
This work deals with the analysis of basic cryptographic protocols, principle of the authentication and verification of their safety. In the first part of the work is a short introduction to the issue - cryptography, some types of attacks, authentication and authorisation. In the second part is the analysis of protocols SSH, SSL, IPSec, and Kerberos, authentication and verification of their functionality and security under laboratory conditions.

Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.