Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 4

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  cryptographic systems
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
In the present paper, we deal with the methodology of nonlinear encryption on the basis of parallel modular computing structures. The use of the minimal redundant modular number system and the interval-modular form of representation of an integer number defined by its modular code creates the computer-arithmetical basis of a cryptographic procedure under consideration. The proposed encryption algorithm is based on the index method of realization of the modular multiplicative operations.
2
Content available Generation of random keys for cryptographic systems
EN
Military and government institutions need security services for storing and exchanging classified information among them. Security of such information is important for independence of the State. At present, cryptography provides a lot of methods for information security. A one-time pad cipher may be used to ensure perfect (unconditional) security. There are many ciphers and other cryptographic transformations, which are not perfect, but ensure conditional security adequate to needs. All cryptosystems require keys and other crypto materials. These keys should satisfy numerous conditions. The basic is randomness. One of the best sources of random bit sequences used in the production of keys for special cryptosystems is a hardware generator. Now we have an electronic device, where it is possible to generate binary random sequences with the potential output rate of 100 Mbit/s. It gives us the capability of building an efficient key generation equipment for the cryptosystems to rely on the one-time pad cipher, where we need very long keys and for those based on symmetric or asymmetric transformations where many relatively short keys are needed.
PL
Intensywny rozwój możliwości komputerowych oraz technik kryptoanalitycznych sprawił, że istnieje pilna potrzeba znalezienia następcy DES, jak również weryfikowania bezpieczeństwa zapewnianego przez stosowane systemy kryptograficzne. Wynika więc z tego potrzeba stworzenia narzędzia umożliwiającego taką permanentną weryfikację. Tym narzędziem może być mechanizm umożliwiający szacowanie bezpiecznej (nie za długiej i nie za krótkiej) długości klucza.
EN
The intensive development of computer possibilities and cryptoanalytic techniques caused that there is current need to find DES successor and also to verify the safety ensured by cryptographic systems. This follows a need to create a tool making this permanent verification possible. The tool can be a mechanism which lets us estimate a safe (not too long and not too short) key size.This is what this work is devoted to.
EN
A problem in the use of cryptographic mobile agents in the multilevel data warehouse environment is discussed. First, a systematic approach to cryptographic systems is presented. A cryptographic system is a collection of cryptographic primitives and protocols which help to ensure the confidentiality, integrity, and authenticity of data as well as secure key exchange for these primitives. Cryptography is a good tool for protecting sensitive data stored in data warehouses and transmitted through the corporate network. Mobile agents are intelligent programs that can migrate on a computer network. The authority of each agent can be established by way of cryptographic techniques.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.