350 rub
Journal Highly available systems №4 for 2015 г.
Article in number:
Key transport mechanisms based on asymmetric cryptography for users of high availability information systems
Authors:
V.I. Budzko - Dr. Sc. (Eng.), Corresponding Member of Academy of Cryptography of RF, Deputy Director of R&D, Institute of Informatics Problems of FRC CSC RAS (Moscow). E-mail: vbudzko@ipiran.ru D.A. Melnikov - Ph. D. (Eng.), Associate Professor, Leading Research Scientist, Institute of Informatics Problems of FRC CSC RAS (Moscow); Deputy Head of Department National Research Nuclear University «MEPhI» (Moscow). E-mail: mda-17@gmail.com V.M. Fomichev - Dr. Sc. (Phys.-Math.), Professor, Leading Research Scientist, Institute of Informatics Problems of FRC CSC RAS (Moscow); Professor, Financial University under Government of RF; Professor, National Research Nuclear University «MEPhI» (Moscow). E-mail: fomichev@nm.ru
Abstract:
Key transport mechanisms (protocols) based on asymmetric cryptography are systematized for cryptographic systems used to protect data in high availability information systems. In addition, the main characteristics of the key transport protocols are presented.
Pages: 32-44
References

 

  1. Budzko V.I., Melnikov D.A., Fomichjov V.M. Protokoly obespechenija kljuchami polzovatelejj informacionno-tekhnologi­cheskikh sistem vysokojj dostupnosti s ispolzovaniem simmetrichnojj kriptografii // Sistemy vysokojj dostupnosti. 2014. T. 10. № 3. S. 36−51.
  2. Budzko V.I., Melnikov D.A., Fomichjov V.M.Sposoby soglasovanija kljuchejj polzovateljami informacionno-tekhnologi­cheskikh sistem vysokojj dostupnosti na osnove asimmetrichnykh kriptograficheskikh metodov // Sistemy vysokojj dostupnosti. 2015. T. 11. № 4. S. 16−30.
  3. ISO/IEC 11770‑1: «Information technology - Security techniques - Key management - Part 1: Framework». 2010-12-01.
  4. ISO/IEC 11770‑3: «Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques». 2008-07-15.
  5. ISO/IEC 7499‑2: «Information Processing Systems - Open Systems Interconnection Reference Model - Part 2: Security Architecture».
  6. ITU‑T, «Information technology - Open Systems Interconnection - Security frameworks for open systems: Authentication framework». RecommendationX.811. 1995.
  7. Melnikov D., Jones A. «Masquerade» Attacks and a Process for Their Detection. Proceedings of the 3rd European Conference on Information Warfare and Security. RoyalHollowayUniversityofLondon. UK. 28−29 June 2004. P. 269.
  8. Melnikov D.A. Informacionnaja bezopasnost otkrytykh sistem: Uchebnik. M.: FLINTA. Nauka. 2013.
  9. Alfjorov A.P., Zubov A.JU., Kuzmin A.S., CHerjomushkin A.V. Osnovy kriptografii. M.: Gelios ARV. 2001.
  10. Fomichev V.M. Metody diskretnojj matematiki v kriptologii. M.: Dialog-MIFI. 2010. 424 s.
  11. Kaliski B.S. An unknown key-share attack on the MQV key agreement protocol // ACM Trans. Inf. Syst. Secur. 2001. 4. P. 275−288.
  12. Law L., Menezes A., Qu M., Solinas J., Vanstone S. An Efficient Protocol for Authenticated Key Agreement // Designs, Codes, and Cryptography. 2003. 28. P. 119−134.
  13. NIST Special Publication 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography.2007.