{"title":"FEATURES OF CRYPTOGRAPHIC PROTOCOLS","authors":"Alexander Labinsky","doi":"10.61260/2307-7476-2024-1-53-59","DOIUrl":null,"url":null,"abstract":"The article considers the features of cryptographic protocols used to protect data transmitted over a computer network. Due to the increase in the number of network attacks, the urgency of the problem of network security is constantly increasing. \nThe cryptographic protocol contains a description of the structures used and a set of rules governing the use of cryptographic transformations and algorithms in information communication processes between two or more participants. \nThe article provides classification of cryptographic protocols on various features and considers security properties of protocols, characterizing their resistance to various attacks. The SSL data encryption protocol, which uses asymmetric cryptography for key authentication, symmetric encryption to preserve confidentiality and authentication codes to verify message integrity, \nis discussed in detail. The SSL protocol has been widely used in recent years for instant messaging and IP voice transmission in applications such as e-mail, Internet fax and others. \nThe article deals with encryption and hashing of data (MD5, SHA-1, DES encryption algorithms). Computer models of data encryption (DES algorithm), text data checksum calculation (CRC32 algorithm) and password character matching were developed according to the algorithms considered. The computer models were implemented as computer programs, with the first two models as console programs and the third model as a program with graphical interface.","PeriodicalId":477082,"journal":{"name":"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)","volume":" 9","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)","FirstCategoryId":"0","ListUrlMain":"https://doi.org/10.61260/2307-7476-2024-1-53-59","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The article considers the features of cryptographic protocols used to protect data transmitted over a computer network. Due to the increase in the number of network attacks, the urgency of the problem of network security is constantly increasing.
The cryptographic protocol contains a description of the structures used and a set of rules governing the use of cryptographic transformations and algorithms in information communication processes between two or more participants.
The article provides classification of cryptographic protocols on various features and considers security properties of protocols, characterizing their resistance to various attacks. The SSL data encryption protocol, which uses asymmetric cryptography for key authentication, symmetric encryption to preserve confidentiality and authentication codes to verify message integrity,
is discussed in detail. The SSL protocol has been widely used in recent years for instant messaging and IP voice transmission in applications such as e-mail, Internet fax and others.
The article deals with encryption and hashing of data (MD5, SHA-1, DES encryption algorithms). Computer models of data encryption (DES algorithm), text data checksum calculation (CRC32 algorithm) and password character matching were developed according to the algorithms considered. The computer models were implemented as computer programs, with the first two models as console programs and the third model as a program with graphical interface.