Using RSA algorithm for problems of cryptographic protection of information in modern information&telecommunication systems
DOI:
https://doi.org/10.18372/2410-7840.15.4856Keywords:
RSA algorithm, an asymmetric encryption algorithm, cryptographic protection of informationAbstract
In our time, asymmetric cryptoalgorithms are widely used in solving the problem of cryptographic protection of
information, especially in information and communication systems, they include RSA algorithm that has become the most popular. Existing publications mainly reveal the application of RSA algorithm, its primitives in other cryptoalgorithms, analyzing die stability of these cryptosys- tems. Besides, these publications do not provide a comprehensive description of the applications of RSA algorithm. Analyzed sources shows that RSA algorithm and the procedure for its application are described in a number of international, national and industry standards. This article also presents specific examples of using RSA algorithm in the protocols of information and telecommunication systems, and in hardware and software for die realization of cryptographic protection. The analysis shows that despite the appearance of new and more sophisticated asymmetric encryption algorithms in recent years, RSA algorithm is still widely represented in modern information and telecommunication systems to provide cryptographic security problems, including in our country, as it calls for a more detailed study.
References
Букин Максим. Skype: глобальная система персональной связи // [Электронный ресурс]. — Режим доступа: http://www.pcweek.ru/themes/detail. php?ID=73403.
Голдовский И. RSA в терминалах / И. Голдовский // ПЛАС. - 2007. - № 2 (122). - С. 13-15.
Горбенко I. Д. Прикладна криптологія: Терія. Практика. Застосування : монографія / І. Д. Горбенко, Ю. I. Горбенко. — Харків : Вид-во «Форт», 2012. - 880с.
Електронні підписи та інфраструктури (ESI). Алгоритми та параметри безпечних електронних підписів. Частина 1. Геш-функції й асиметричні алгоритми (ETSI TS 102 176-1:2007, IDT): ДСТУ ETSI TS 102 176-1:2009, 2009.
Зубок В. Ю. Безпека глобальних інформаційних систем та мереж : консп. лекцій / В. Ю. Зубок, О. В. Корнейко, Д. В. Ланде, В. В. Мохор; під. заг. ред. О. В. Корнейка. — К. : Вид-во ІСЗЗІ НТУУ «КПІ», 2010. - 162 с.
Информационные технологии. Криптография на основе алгоритма RSA: СТБ 34.101.22-2009, 2009.
Информационные технологии. Методы обеспечения безопасности. Схемы цифровой подписи, обеспечивающие восстановление сообщений. Часть 2. Механизмы на основе целочисленной факторизации: ISO/IEC 9796-2:2010, 2010.
Правила організації захисту електронних банківських документів з використанням засобів захисту інформації Національного банку України, затверджені постановою Правління Національного банку України від 02.04.2007 № 112 і зареєстровані в Міністерстві юстиції України 24.04.2007 за № 419/13686.
Технические решения для безопасности данных в ORACLE // [Электронный ресурс]. — Режим доступа: http://www.re.mipt.ru/infsec/2004/essay/
_Technical_solutions_to_security_in_ Oracle
Popov.htm.
Шифрующая файловая система EFS Windows // [Электронный ресурс]. — Режим доступа: http://www.ixbt.com /storage/efs.html.
Шнайер Б. Прикладная криптография. Протоколы, алгоритмы, исходные тексты на языке Си. — Applied Cryptography. Protocols, Algorithms and Source Code in С / Б. Шнайер. — M. : Триумф, 2002. - 816 с.
Banking. Key management by means of asymmetric algorithms. Algorithms using the RSA cryptosystem: ISO 11166-2:1994, 1994.
Digital Signature Standard (DSS): FIPS 186-3:2009, 2009.
Digital Signatures using Reversible Public Key Cryp¬tography for the Financial Services Industry (rDSA), Appendix A: ANSI X9.31-1998. - American Nation¬al Standards Institute, 1998.
Electronic Funds Transfer. — Key Management: AS 2805.6.5.3 Standarts Australia, 1990.
Key Establishment Using Integer Factorization Cryptography: ANSI X9.44-2007, 2007.
NICI 2.7.1. Cryptografhic Library FIPS 140-2 Level 2, versin 1.5 // [Электронный ресурс]. — Режим доступа: http: / / csrc.nist.gov/groups / STM/cmvp / documents /140-1 / 140sp/ 140sp767.pdf.
RSA Cryptography Standard: PKCS #1 v2.1. - RSA Laboratories, 2002.
Standard Specifications for Public Key Cryptography: IEEE Std 1363-2000. - IEEE, 2000.
Standard Specifications For Public Key Cryptography- Amendment 1: IEEE 1363a-2004, 2004.
Trusted Platform Module // [Электронный ресурс]. — Режим доступа: http://ru.wikipedia.org/ wiki/Trusted_Platform_Module#cite_note-0.
Windows 7 її Windows Server 2008 сертифицированы на соответствие закону о защите персональных данных // [Электронный ресурс]. — Режим доступа: http: / /bda-expert.com/2011/10/ windows-7-server-2008-sertificirovany-na-sootve- tstvie-zakonu-o-zashhite-personalnyh-dannyh/.
Bukin Maxim. Skype: The global personal communications, [electronic resource]. Mode access: http: / /www.pcweek.ru/tliemes / detail.phpPID = 73403.
Goldovskiy I. RSA in terminals. PLAS , 2007, Vol. 122, No. 2, pp. 13-15.
Gorbenko I.D. Applied cryptology: theory. Practice. Application: Monograph., I.D. Gorbenko, U.I. Gorbenko., Harkiv: «Fort», 2012, 880 P.
Electronic signatures and infrastructures (ESI). Algorithms and Parameters secure electronic signatures. Part 1. Hash functions and asymmetric algorithms (ETSI TS 102 176-1:2007, IDT): State Standard of Ukraine ETSI TS 102 176-1:2009, 2009.
Zubok V.U. Security of global information systems and networks: lecture notes, V.U. Zubok, O.V. Korneiko, D.V. Lande, V.V. Moklior., K: publishing house of Institute of special communication and information security NTUU "KPI", 2010, 162 P.
Information technologies. Cryptography on the basis of algorithm of RSA: Natsionalny standard of Belarus 34.101.22-2009.
Information technology - Security techniques - Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms: ISO/IEC 9796-2:2010, 2010.
Terms of protect electronic banking documents using information security National Bank of Ukraine, approved by the National Bank of Ukraine of 02.04.2007 № 112 and registered with the Ministry of Justice of Ukraine from 24.04.2007 № 419/13686.
Technical solutions for data security in ORACLE, [electronic resource]. Mode access: http://www.re.mipt.ru/infsec/2004/essay/2004_Te chnical_solutions_to_security_in_Oracle Po-pov.htm.
The encrypting file system (EFS) in Windows, [electronic resource]. Mode access: http:/ /www. ixbt.com /storage/efs.html.
Schneier Bruce. Applied Cryptography. Protocols, Algorithms and Source Code in C, Schneier Bruce. — M. Triumf, 2002, 816 P.
Banking. Key management by means of asymmetric algorithms. Algorithms using the RSA cryptosystem: ISO 11166-2:1994,1994.
Digital Signature Standard (DSS): FIPS 186-3:2009, 2009.
Digital Signatures using Reversible Public Key Cryptography for the Financial Services Industry (rDSA), Appendix A: ANSI X9.31-1998., American National Standards Institute, 1998.
Electronic Funds Transfer. — Key Management: AS 2805.6.5.3 Standarts Australia, 1990.
Key Establishment Using Integer Factorization Cryptography: ANSI X9.44-2007, 2007.
NICI 2.7.1. Cryptografhic Library FIPS 140-2 Level 2, versin 1.5, [electronic resource]. Mode access:
http://csrc.nist.gov /groups/STM /стур/ documents/140-1/ 140sp/ 140sp767.pdf.
RSA Cryptography Standard: PKCS #1 v2.1. - RSA Laboratories, 2002.
Standard Specifications for Public Key Cryptography: IEEE Std 1363-2000, IEEE, 2000.
Standard Specifications For Public Key Cryptography- Amendment 1: IEEE 1363a-2004, 2004.
Trusted Platform Module, [electronic resource]. Mode access: http://ru.wikipedia.org/wiki /Trusted _Platform_ Module#cite_note-0.
Windows 7 и Windows Server 2008 сертифицированы на соответствие закону о защите персональных данных, [electronic resource]. Mode access: http://bda-expert.com/2011/10/windows-7- server-2008-sertificirovany-na-sootvetstvie-zakonu- o-zashhite-personalnyh-dannyh/.
Downloads
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).