|
Scientific paper ID 1105 : 2015/1
![]() DESIGN AND INVESTIGATION OF A HYBRID CRYPTOSYSTEM PROVIDING DEFINED LEVEL OF SECURITY
Maria Nenova In the paper is presented a realization of the cryptography process implementing the RSA asymmetric algorithm together with the AES symmetric algorithm for protection of the transferred data. The time necessary for encryption with different key sizes is investigated.
криптиране асимиетрични алгортми за криптиране симетрични алгоритми за криптиране хеш функции RSA AEScryptography symmetric and asymmetric crypto algorithms hash function RSA AESMaria Nenova BIBLIOGRAPHY [1] Adi Shamir, RivestR., Adleman L.,A METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLICKEY CRYPTOSYSTEMS.Communications of the ACM, 21:120–126, 1978. [2] William Stallings. CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICES. Prentice Hall, November 16, 2005. [3] B. H. Thomas: AN INVITATION TO CRYPTOLOGY, ISBN-13: 978-0130889768, Aug 2001. [4] Elaine Barker and Allen Roginsky, NIST SPECIAL PUBLICATION 800-131A, Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, 2011. [5]Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., ERROR ANALYSIS AND DETECTION PROCEDURES FOR A HARDWARE IMPLEMENTATION OF THE ADVANCED ENCRYPTION STANDARD, IEEE TRANSACTIONS ON COMPUTERS, Vol. 52 , Issue: 4, pp. 492 – 505, April 2003. [6] Chih-Chung Lu, Shau-Yin Tseng., INTEGRATED DESIGN OF AES (ADVANCED ENCRYPTION STANDARD) ENCRYPTER AND DECRYPTER, The IEEE International Conference on Application-Specific Systems, Architectures and ProcessorsProceedings, pp. 277 – 285, 2002. [7] Trifonov V, SAFETYAUTOMATA NETWORK FOR INTERLOCKING SYSTEM XXInternational Scientific Conference TRANSPORT 2011, Sofia, Nov 2010 part 3, p.83-88 2011. [8] Trifonov V, Hristov H., AUTOMATAMODEL FOR SAFETY CRITICAL NETWORK ESI39, European Politechnical University Pernik, 9-10 Jun 2012. |