Effective software-oriented cryptosystem in complex PC security software

نویسندگان

  • Alexander A. Moldovyan
  • Nikolay A. Moldovyan
  • P. Moldovyan
چکیده

To ensure high encryption rate and good data security, an organization of an encipherement program in the form of two modules was proposed. The first module is used for customizing the second one, the latter being the resident of the program, wich maintains all application calls about encryption procedures. This approach is shown to be perspective for the elaboration of the cryptosystems with indefinite cryptalgorithm. Several typical software–oriented cryptoschemes are considered. The developed cryptomodules have high encipherement rate (2–10 Mbps for Intel 386) and secure high information protection level. Organization of a new computer security software complex COBRA is considered. High enciphering rate and good data protection are provided by the resident cryptomodule using less than 1 kbyte of the main memory and working in dynamic encryption mode.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

The Elliptic Curve Cryptosystem

The Elliptic Curve Cryptosystem (ECC) provides the highest strength-per-bit of any cryptosystem known today. This paper provides an overview of the three hard mathematical problems which provide the basis for the security of publickey cryptosystems used today: the integer factorization problem (IFP), the discrete logarithm problem (DLP), and the elliptic curve discrete logarithm problem (ECDLP)...

متن کامل

A two-phase encryption scheme for enhancing database security

In this article, we propose a two-phase encryption algorithm for data base systems. The system, a record-oriented cryptosystem, allows the encryption and decryption of fields within a record by means of writing and reading subkeys of fields. In addition, we develop two algorithms for cryptographic relational algebra in data base systems. Two simple methods of solving the key management problem ...

متن کامل

Architecting Secure Software Systems Using an Aspect-Oriented Approach: : A Survey of Current Research

The importance of security in the development of complex software systems has increasingly become more critical as software becomes increasingly more pervasive in our everyday lives. Aspect-orientation has been proposed as a means to handle the crosscutting nature of security requirements when developing, designing and implementing security-critical applications. This paper surveys some of the ...

متن کامل

Algorithms to encrypt and decrypt messages with Magma ∗

The security in current communications recommend to develop the implementation of cryptographic primitives and algorithms in an effective way. The cryptosystem proposed by Chor and Rivest, which is based on the knapsack problem, has recently been broken by Vaudenay but only when the original parameters are used. In this paper we give a brief overview of some developments in Cryptography and we ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • The Computer Science Journal of Moldova

دوره 2  شماره 

صفحات  -

تاریخ انتشار 1994