{"id":24189,"date":"2024-09-24T15:17:54","date_gmt":"2024-09-24T13:17:54","guid":{"rendered":"https:\/\/www.itspy.cz\/thesis\/kompaktna-implementacia-opaque-protokolu-pre-vstavanekryptograficke-aplikacie\/"},"modified":"2024-09-24T15:17:54","modified_gmt":"2024-09-24T13:17:54","slug":"kompaktna-implementacia-opaque-protokolu-pre-vstavanekryptograficke-aplikacie","status":"publish","type":"thesis","link":"https:\/\/www.itspy.cz\/sk\/thesis\/kompaktna-implementacia-opaque-protokolu-pre-vstavanekryptograficke-aplikacie\/","title":{"rendered":"Kompaktn\u00e1 implement\u00e1cia OPAQUE protokolu pre vstavan\u00e9\nkryptografick\u00e9 aplik\u00e1cie"},"content":{"rendered":"<p>T\u00e1to pr\u00e1ca je zameran\u00e1 na zlep\u0161enie digit\u00e1lnej bezpe\u010dnosti,<br \/>\nkonkr\u00e9tne na modern\u00fd sp\u00f4sob overovania pou\u017e\u00edvate\u013eov bez<br \/>\npou\u017eitia tradi\u010dn\u00fdch hesiel. Vyvinuli sme vlastn\u00fa r\u00fdchlu,<br \/>\nbezpe\u010dn\u00fa a kompaktn\u00fa implement\u00e1ciu protokolu OPAQUE, ktor\u00fd<br \/>\numo\u017e\u0148uje overi\u0165 toto\u017enos\u0165 pou\u017e\u00edvate\u013ea bez potreby uchov\u00e1va\u0165<br \/>\nhesl\u00e1 na serveroch. To v\u00fdrazne zvy\u0161uje bezpe\u010dnos\u0165 a<br \/>\ns\u00fakromie pou\u017e\u00edvate\u013eov.<\/p>\n<p>Na\u0161e rie\u0161enie je optimalizovan\u00e9 na pou\u017eitie v zariadeniach<br \/>\ns n\u00edzkymi v\u00fdpo\u010dtov\u00fdmi n\u00e1rokmi, ako s\u00fa mikrokontrol\u00e9ry,<br \/>\nktor\u00e9 sa \u010dasto nach\u00e1dzaj\u00fa v inteligentn\u00fdch zariadeniach,<br \/>\ninteligentn\u00fdch dom\u00e1cnostiach alebo senzoroch. V\u010faka na\u0161ej<br \/>\nimplement\u00e1cii je mo\u017en\u00e9 vyu\u017e\u00edva\u0165 pokro\u010dil\u00e9 overovacie met\u00f3dy<br \/>\naj na takto hardv\u00e9rovo limitovan\u00fdch syst\u00e9moch, \u010d\u00edm sa<br \/>\nzvy\u0161uje ich odolnos\u0165 vo\u010di hackersk\u00fdm \u00fatokom. V\u00fdsledky n\u00e1\u0161ho<br \/>\nv\u00fdskumu m\u00f4\u017eu v bud\u00facnosti prispie\u0165 k \u0161ir\u0161iemu nasadeniu<br \/>\nbezpe\u010dnej\u0161\u00edch technol\u00f3gi\u00ed a lep\u0161ej ochrane be\u017en\u00fdch<br \/>\npou\u017e\u00edvate\u013eov pred kybernetick\u00fdmi hrozbami.<\/p>\n","protected":false},"featured_media":23638,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"university":[182,180],"thesis-year":[391,407],"class_list":["post-24189","thesis","type-thesis","status-publish","has-post-thumbnail","hentry","thesis-year-391","thesis-year-2024-sk"],"acf":{"autor":"Patrik Zele\u0148\u00e1k","portret":"","vedouci":"prof. Ing. Milo\u0161 Drutarovsk\u00fd, CSc."},"_links":{"self":[{"href":"https:\/\/www.itspy.cz\/sk\/wp-json\/wp\/v2\/thesis\/24189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itspy.cz\/sk\/wp-json\/wp\/v2\/thesis"}],"about":[{"href":"https:\/\/www.itspy.cz\/sk\/wp-json\/wp\/v2\/types\/thesis"}],"version-history":[{"count":0,"href":"https:\/\/www.itspy.cz\/sk\/wp-json\/wp\/v2\/thesis\/24189\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itspy.cz\/sk\/wp-json\/wp\/v2\/media\/23638"}],"wp:attachment":[{"href":"https:\/\/www.itspy.cz\/sk\/wp-json\/wp\/v2\/media?parent=24189"}],"wp:term":[{"taxonomy":"university","embeddable":true,"href":"https:\/\/www.itspy.cz\/sk\/wp-json\/wp\/v2\/university?post=24189"},{"taxonomy":"thesis-year","embeddable":true,"href":"https:\/\/www.itspy.cz\/sk\/wp-json\/wp\/v2\/thesis-year?post=24189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}