{"title":"密码协议的特点","authors":"Alexander Labinsky","doi":"10.61260/2307-7476-2024-1-53-59","DOIUrl":null,"url":null,"abstract":"The article considers the features of cryptographic protocols used to protect data transmitted over a computer network. Due to the increase in the number of network attacks, the urgency of the problem of network security is constantly increasing. \nThe cryptographic protocol contains a description of the structures used and a set of rules governing the use of cryptographic transformations and algorithms in information communication processes between two or more participants. \nThe article provides classification of cryptographic protocols on various features and considers security properties of protocols, characterizing their resistance to various attacks. The SSL data encryption protocol, which uses asymmetric cryptography for key authentication, symmetric encryption to preserve confidentiality and authentication codes to verify message integrity, \nis discussed in detail. The SSL protocol has been widely used in recent years for instant messaging and IP voice transmission in applications such as e-mail, Internet fax and others. \nThe article deals with encryption and hashing of data (MD5, SHA-1, DES encryption algorithms). Computer models of data encryption (DES algorithm), text data checksum calculation (CRC32 algorithm) and password character matching were developed according to the algorithms considered. The computer models were implemented as computer programs, with the first two models as console programs and the third model as a program with graphical interface.","PeriodicalId":477082,"journal":{"name":"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)","volume":" 9","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"FEATURES OF CRYPTOGRAPHIC PROTOCOLS\",\"authors\":\"Alexander Labinsky\",\"doi\":\"10.61260/2307-7476-2024-1-53-59\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article considers the features of cryptographic protocols used to protect data transmitted over a computer network. Due to the increase in the number of network attacks, the urgency of the problem of network security is constantly increasing. \\nThe cryptographic protocol contains a description of the structures used and a set of rules governing the use of cryptographic transformations and algorithms in information communication processes between two or more participants. \\nThe article provides classification of cryptographic protocols on various features and considers security properties of protocols, characterizing their resistance to various attacks. The SSL data encryption protocol, which uses asymmetric cryptography for key authentication, symmetric encryption to preserve confidentiality and authentication codes to verify message integrity, \\nis discussed in detail. The SSL protocol has been widely used in recent years for instant messaging and IP voice transmission in applications such as e-mail, Internet fax and others. \\nThe article deals with encryption and hashing of data (MD5, SHA-1, DES encryption algorithms). Computer models of data encryption (DES algorithm), text data checksum calculation (CRC32 algorithm) and password character matching were developed according to the algorithms considered. The computer models were implemented as computer programs, with the first two models as console programs and the third model as a program with graphical interface.\",\"PeriodicalId\":477082,\"journal\":{\"name\":\"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)\",\"volume\":\" 9\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-04-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)\",\"FirstCategoryId\":\"0\",\"ListUrlMain\":\"https://doi.org/10.61260/2307-7476-2024-1-53-59\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)","FirstCategoryId":"0","ListUrlMain":"https://doi.org/10.61260/2307-7476-2024-1-53-59","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
文章探讨了用于保护计算机网络传输数据的加密协议的特点。由于网络攻击数量的增加,网络安全问题的紧迫性不断提高。加密协议包含对所使用结构的描述,以及在两个或多个参与者之间的信息通信过程中使用加密变换和算法的一系列规则。文章根据各种特征对加密协议进行了分类,并考虑了协议的安全属性,描述了协议抵御各种攻击的能力。文章详细讨论了 SSL 数据加密协议,该协议使用非对称加密技术进行密钥验证,使用对称加密技术保持机密性,并使用验证码验证信息的完整性。近年来,SSL 协议已广泛应用于电子邮件、网络传真等应用中的即时消息和 IP 语音传输。文章涉及数据的加密和散列(MD5、SHA-1、DES 加密算法)。根据所考虑的算法,开发了数据加密(DES 算法)、文本数据校验和计算(CRC32 算法)和密码字符匹配的计算机模型。计算机模型以计算机程序的形式实现,前两个模型为控制台程序,第三个模型为图形界面程序。
The article considers the features of cryptographic protocols used to protect data transmitted over a computer network. Due to the increase in the number of network attacks, the urgency of the problem of network security is constantly increasing.
The cryptographic protocol contains a description of the structures used and a set of rules governing the use of cryptographic transformations and algorithms in information communication processes between two or more participants.
The article provides classification of cryptographic protocols on various features and considers security properties of protocols, characterizing their resistance to various attacks. The SSL data encryption protocol, which uses asymmetric cryptography for key authentication, symmetric encryption to preserve confidentiality and authentication codes to verify message integrity,
is discussed in detail. The SSL protocol has been widely used in recent years for instant messaging and IP voice transmission in applications such as e-mail, Internet fax and others.
The article deals with encryption and hashing of data (MD5, SHA-1, DES encryption algorithms). Computer models of data encryption (DES algorithm), text data checksum calculation (CRC32 algorithm) and password character matching were developed according to the algorithms considered. The computer models were implemented as computer programs, with the first two models as console programs and the third model as a program with graphical interface.