Radiotekhnika
Publishing house Radiotekhnika

"Publishing house Radiotekhnika":
scientific and technical literature.
Books and journals of publishing houses: IPRZHR, RS-PRESS, SCIENCE-PRESS


Тел.: +7 (495) 625-9241

 

Secret key agreement mechanisms based on asymmetric cryptography for users of high availability information technology systems

Keywords:

V.I. Budzko – Dr. Sc. (Eng.), Corresponding Member of Academy of Cryptography of RF, Deputy Director of R&D, Institute of Informatics Problems of FRC CSC RAS (Moscow). E-mail: vbudzko@ipiran.ru D.A. Melnikov – Ph. D. (Eng.), Associate Professor, Leading Research Scientist, Institute of Informatics Problems of FRC CSC RAS (Moscow); Deputy Head of Department National Research Nuclear University «MEPhI» (Moscow). E-mail: mda-17@gmail.com V.M. Fomichev – Dr. Sc. (Phys.-Math.), Professor, Leading Research Scientist, Institute of Informatics Problems of FRC CSC RAS (Moscow); Professor, Financial University under Government of RF; Professor, National Research Nuclear University «MEPhI» (Moscow). E-mail: fomichev@nm.ru


Secret key agreement mechanisms (protocols) based on asymmetric cryptography are systematized for cryptographic systems used to protect data in high availability information technology systems. Explicit key confirmation is described. In addition, the main cha-racteristics of the secret key agreement keys protocols are presented.
References:

 

  1. Budzko V.I., Melnikov D.A., Fomichjov V.M. Protokoly obespechenija kljuchami polzovatelejj informacionno-tekhnologicheskikh sistem vysokojj dostupnosti s ispolzovaniem simmetrichnojj kriptografii // Sistemy vysokojj dostupnosti. 2014. T. 10. № 3. S. 36−51.
  2. ISO/IEC 11770‑1: «Information technology – Security techniques – Key management – Part 1: Framework». 2010-12-01.
  3. ISO/IEC 11770‑3: «Information technology – Security techniques – Key management – Part 3: Mechanisms using asymmetric techniques». 2008-07-15.
  4. ISO/IEC 7499‑2: «Information Processing Systems – Open Systems Interconnection Reference Model – Part 2: Security Architecture».
  5. ITU‑T, «Information technology – Open Systems Interconnection – Security frameworks for open systems: Authentication framework». RecommendationX.811. 1995.
  6. Melnikov D., Jones A., «Masquerade» Attacks and a Process for Their Detection. Proceedings of the 3rd European Conference on Information Warfare and Security. - Royal Holloway University of London. UK. 28−29 June 2004. P. 269.
  7. Melnikov D.A. Informacionnaja bezopasnost otkrytykh sistem: Uchebnik. M.: FLINTA. Nauka. 2013.
  8. Alfjorov A.P., Zubov A.JU., Kuzmin A.S., CHerjomushkin A.V. Osnovy kriptografii. M.: Gelios ARV. 2001.
  9. Fomichev V.M. Metody diskretnojj matematiki v kriptologii. M.: Dialog-MIFI. 2010. 424 s.
  10. Kaliski B.S. An unknown key-share attack on the MQV key agreement protocol. ACMTrans. Inf. Syst. Secur. 2001. № 4. P. 275−288.
  11. Law L., Menezes A., Qu M., Solinas J., Vanstone S. An Efficient Protocol for Authenticated Key Agreement. Designs, Codes, andCryptography. 2003.28. P. 119−134.
  12. NIST Special Publication 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography.2007.

 

© Издательство «РАДИОТЕХНИКА», 2004-2017            Тел.: (495) 625-9241                   Designed by [SWAP]Studio