National Repository of Grey Literature 5 records found  Search took 0.01 seconds. 
Electronic ID security
Šánek, Jaromír ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This work is dedicated the security of Electronic identity card and the platform of Multos smart card. In the first part are descripted symmetric and asymmetric cryptographic algorithms which are used in the area of eID. The second part is engaged the solution of electronic identity cards in Belgium, Estonia and Germany and Czech Republic. In this part are specified the eID, chips and digital certificates and applications. The part contains standard CEN TS 15480 European Citizen Card and access control mechanisms BAC, EAC and EAC v2. Next section is dedicated to describing the specification of passports with a chip and security of data stored on the chip. Last section is dedicated the practical part. In this part is described smart card Multos and development of applications for this smart card. Created application demonstrates the basic cryptographic functions. Between implemented functions are functions for generating random number, hash algorithm SHA-1, modular exponentiation and modular multiplication.
Digital identity
Dvořák, Roman ; Burda, Karel (referee) ; Zeman, Václav (advisor)
This bachelor‘s thesis deals with the personal digital identity area. Its goal is to describe accompanying technologies which ensure the course of this field. In addition, another goal is to describe the state of things in related sectors. At first, attention is focused to basic concepts and terms describing this topic. The following section describes technologies which are used in area of digital and bank identity. In the next chapter, the emphasis is on explaining terms linked with digital identity and the structure of public eGovernment, followed by the description of e-identity. In this chapter, the identification means, provided by the government or commercial sector, are more explained. The same applies to the identification means provided by the government, but which are not considered as e-identity. Another chapter is dedicated to European Digital Identity and its current state, followed by mentioning states which have used digital identity before it was made mandatory by the regulation from European Commission. The following chapter explores security threats, their enumeration and classification according to different criteria. It mentions types of cyberattacks, threats associated with using digital identity and elimination of the threats. The point of view is taken from user’s experience, but from providers as well. The last chapter describes the practical part which is an educational web application that summarizes the output of this bachelor’s thesis.
Digital identity
Dvořák, Roman ; Burda, Karel (referee) ; Zeman, Václav (advisor)
This bachelor‘s thesis deals with the personal digital identity area. Its goal is to describe accompanying technologies which ensure the course of this field. In addition, another goal is to describe the state of things in related sectors. At first, attention is focused to basic concepts and terms describing this topic. The following section describes technologies which are used in area of digital and bank identity. In the next chapter, the emphasis is on explaining terms linked with digital identity and the structure of public eGovernment, followed by the description of e-identity. In this chapter, the identification means, provided by the government or commercial sector, are more explained. The same applies to the identification means provided by the government, but which are not considered as e-identity. Another chapter is dedicated to European Digital Identity and its current state, followed by mentioning states which have used digital identity before it was made mandatory by the regulation from European Commission. The following chapter explores security threats, their enumeration and classification according to different criteria. It mentions types of cyberattacks, threats associated with using digital identity and elimination of the threats. The point of view is taken from user’s experience, but from providers as well. The last chapter describes the practical part which is an educational web application that summarizes the output of this bachelor’s thesis.
Electronic ID security
Šánek, Jaromír ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
This work is dedicated the security of Electronic identity card and the platform of Multos smart card. In the first part are descripted symmetric and asymmetric cryptographic algorithms which are used in the area of eID. The second part is engaged the solution of electronic identity cards in Belgium, Estonia and Germany and Czech Republic. In this part are specified the eID, chips and digital certificates and applications. The part contains standard CEN TS 15480 European Citizen Card and access control mechanisms BAC, EAC and EAC v2. Next section is dedicated to describing the specification of passports with a chip and security of data stored on the chip. Last section is dedicated the practical part. In this part is described smart card Multos and development of applications for this smart card. Created application demonstrates the basic cryptographic functions. Between implemented functions are functions for generating random number, hash algorithm SHA-1, modular exponentiation and modular multiplication.
LISP - The separation of network node's locator and identifier
Šubrt, Ondřej ; Pavlíček, Luboš (advisor) ; Matuška, Miroslav (referee)
The purpose of this paper is to describe the features and functionality of LISP protocol (Locator / ID Separation Protocol), its possible use in the network infrastructure and description of the requirements necessary for its successful implementation. Part of this thesis is also the setting of modules to support the network protocol on FreeBSD and then connecting the station to the experimental network, operated by Cisco Systems. The reachability of the test station in the experimental network is verified by station within the network and by server from the internet. LISP implementation on FreeBSD is called OpenLISP and has fully integrated support for encapsulation and decapsulation of datagrams. It also includes the implementation of the mapping cache and mapping database. For connection to Map Server is used OpenLISP Control Plane implementation by Guruprasad K. Rao and LIP6. The paper is based on the draft implementation of this protocol and its individual parts placed on the website of the Internet Engineering Task Force organization. The functionality of the protocol, described in this paper, is valid by March 2012.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.