In this thesis there is description of cryptographic algorithms. Their properties are being compared, weak and strong points and right usage of particular algorithms. The main topics are safeness of algorithms, their bugs and improvements and difficulty of breaching. As a complement to ciphers there are also hash functions taken in consideration. There are also showed the most common methods of cryptanalysis. As a practical application of described algorithms I analyze systems for secure data transfer SSH and SSL/TLS and demonstrate an attack on SSL connection. In conclusion there is recommendation of safe algorithms for further usage and safe parameters of SSH and SSL/TLS connections
This diploma thesis deals with cryptography. It describes its basic allocation and problems of numbe...
In order to electronically exchange information between network users in the web of data, different ...
Bachelor's thesis deals with analysis of the various cryptographic algorithms that are used for secu...
This thesis brings a reader an overview about historical and modern world of cryptographic methods, ...
(in English): This thesis describes and compares the most popular algorithms used in information sys...
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social medi...
Abstract — : Cryptography is that discover and study of methods and procedures for secure communicat...
For most cases, people use an ecrypted mode when sending personal information to a server, via an el...
This work deals with the analysis of basic cryptographic protocols, principle of the authentication ...
At present, through internet lots of confidential data is send across the world and though it is con...
The paper presents an overview of recent developments in the design of cryptographic algorithms. A s...
In the present work we study applied cryptography. . . The goal of this work is not to study algorit...
This thesis entitled Algorithms Group SuiteB NSA Cryptography deals with algorithms, which are inclu...
The paper presents comparative study of different authentication and identification algorithms used ...
Security of computer systems is becoming more important, because more users in more ways use more in...
This diploma thesis deals with cryptography. It describes its basic allocation and problems of numbe...
In order to electronically exchange information between network users in the web of data, different ...
Bachelor's thesis deals with analysis of the various cryptographic algorithms that are used for secu...
This thesis brings a reader an overview about historical and modern world of cryptographic methods, ...
(in English): This thesis describes and compares the most popular algorithms used in information sys...
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social medi...
Abstract — : Cryptography is that discover and study of methods and procedures for secure communicat...
For most cases, people use an ecrypted mode when sending personal information to a server, via an el...
This work deals with the analysis of basic cryptographic protocols, principle of the authentication ...
At present, through internet lots of confidential data is send across the world and though it is con...
The paper presents an overview of recent developments in the design of cryptographic algorithms. A s...
In the present work we study applied cryptography. . . The goal of this work is not to study algorit...
This thesis entitled Algorithms Group SuiteB NSA Cryptography deals with algorithms, which are inclu...
The paper presents comparative study of different authentication and identification algorithms used ...
Security of computer systems is becoming more important, because more users in more ways use more in...
This diploma thesis deals with cryptography. It describes its basic allocation and problems of numbe...
In order to electronically exchange information between network users in the web of data, different ...
Bachelor's thesis deals with analysis of the various cryptographic algorithms that are used for secu...