A Initiation Protocol for Crypto Graphical Session
This article presents the analysis of using cryptographic methods for sensitive information interchanging. It is proposed the initiationprotocol for crypto graphical session that security is based on certain demands: the channel must exist, which is additional and save, thefunctioning of trusted third party must be and adversary can’t interfere between subjects interact and the third, i.e. trusted party. Thecryptography primitives are proposed, that allow realizing the second and third phases of initiation protocol. Besides, the analysis ofsecond and third protocol phases and prevention of cracking is done. That permits motivated involving of these phases on to initiationprotocol. Ill. 2, bibl. 5 (in Lithuanian; summaries in Lithuanian, English and Russian).
Authors retain copyright and grant the journal the right of the first publication with the paper simultaneously licensed under the Creative Commons Attribution 4.0 (CC BY 4.0) licence.
Authors are allowed to enter into separate, additional contractual arrangements for the non-exclusive distribution of the paper published in the journal with an acknowledgement of the initial publication in the journal.
Copyright terms are indicated in the Republic of Lithuania Law on Copyright and Related Rights, Articles 4-37.