A Initiation Protocol for Crypto Graphical Session
This article presents the analysis of using cryptographic methods for sensitive information interchanging. It is proposed the initiationprotocol for crypto graphical session that security is based on certain demands: the channel must exist, which is additional and save, thefunctioning of trusted third party must be and adversary can’t interfere between subjects interact and the third, i.e. trusted party. Thecryptography primitives are proposed, that allow realizing the second and third phases of initiation protocol. Besides, the analysis ofsecond and third protocol phases and prevention of cracking is done. That permits motivated involving of these phases on to initiationprotocol. Ill. 2, bibl. 5 (in Lithuanian; summaries in Lithuanian, English and Russian).
Copyright terms are indicated in the Republic of Lithuania Law on Copyright and Related Rights, Articles 4-37.