Abstract and keywords
Abstract (English):
The article considers the features of cryptographic protocols used to protect data transmitted over a computer network. Due to the increase in the number of network attacks, the urgency of the problem of network security is constantly increasing. The cryptographic protocol contains a description of the structures used and a set of rules governing the use of cryptographic transformations and algorithms in information communication processes between two or more participants. The article provides classification of cryptographic protocols on various features and considers security properties of protocols, characterizing their resistance to various attacks. The SSL data encryption protocol, which uses asymmetric cryptography for key authentication, symmetric encryption to preserve confidentiality and authentication codes to verify message integrity, is discussed in detail. The SSL protocol has been widely used in recent years for instant messaging and IP voice transmission in applications such as e-mail, Internet fax and others. The article deals with encryption and hashing of data (MD5, SHA-1, DES encryption algorithms). Computer models of data encryption (DES algorithm), text data checksum calculation (CRC32 algorithm) and password character matching were developed according to the algorithms considered. The computer models were implemented as computer programs, with the first two models as console programs and the third model as a program with graphical interface.

Keywords:
information protection, cryptographic protocol, data hashing and encryption, algorithms and encryption protocols, computer model, computer program
Text
Publication text (PDF): Read Download
References

1. Cheryomushkin A.V. Kriptograficheskie protokoly: osnovnye svojstva i uyazvimosti // Prikladnaya diskretnaya matematika. 2009. № 2. S. 115–150.

2. Zashchita informacii: ucheb. posobie / S.M. Vladimirov [i dr.]. M.: MFTI, 2013.

3. Vvedenie v kriptografiyu / V.V. Yashchenko [i dr.]. M.: MCNMO, 2012.

4. Shahanova M.V., Varlataya S.K. Kriptograficheskie metody i sredstva obespecheniya informacionnoj bezopasnosti: ucheb. posobie. Dal'nevostochnyj GTU: OOO «Prospekt», 2015.

5. Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 2006.

6. Ronald L. Rivest Adi Shamir. How to Expose an Eavesdropper (angl.) // Communications of the ACM. 1984. Vol. 27. № 4. P. 393–395.

7. Roger M. Needham, Michael D. Schroeder. Using encryption for authentication in large networks of computers // Communications of the ACM. 1978. Vol. 21. № 12. P. 993–999.

8. Bruce Schneier. Applied Cryptography. John Wiley & Sons, 2006.

9. Rescorla E. The Transport Layer Security (TLS) Protocol Version 1.2. RTFM, Inc., 2008.

10. Karlton P. The Secure Sockets Layer (SSL) Protocol Version 3.0. RTFM, Inc., 2011.

Login or Create
* Forgot password?