Return to search

Metody návrhu bezpečnostních protokolů / Methods of the Security Protocols Design

The security protocols are widely used for providing safe communication. They are used for creating private communication channels in unsecured area. This thesis deals with the design of such protocols and their properties. The first part deals with properties and requirements of designed protocol as well as with the most common attacks on protocols. In the second part, the method of trace formula is described in more detail. This method is used for analytic design of security protocols. Later, the library of automated functions was created upon the principles of the method. The library support both the handling of protocol properties and protocol design. The thesis concludes with some examples of generated protocols.

Identiferoai:union.ndltd.org:nusl.cz/oai:invenio.nusl.cz:236675
CreatorsMíchal, Luboš
ContributorsTrchalík, Roman, Očenášek, Pavel
PublisherVysoké učení technické v Brně. Fakulta informačních technologií
Source SetsCzech ETDs
LanguageCzech
Detected LanguageEnglish
Typeinfo:eu-repo/semantics/masterThesis
Rightsinfo:eu-repo/semantics/restrictedAccess

Page generated in 0.0018 seconds