A Initiation Protocol for Crypto Graphical Session
This article presents the analysis of using cryptographic methods for sensitive information interchanging. It is proposed the initiationprotocol for crypto graphical session that security is based on certain demands: the channel must exist, which is additional and save, thefunctioning of trusted third party must be and adversary can’t interfere between subjects interact and the third, i.e. trusted party. Thecryptography primitives are proposed, that allow realizing the second and third phases of initiation protocol. Besides, the analysis ofsecond and third protocol phases and prevention of cracking is done. That permits motivated involving of these phases on to initiationprotocol. Ill. 2, bibl. 5 (in Lithuanian; summaries in Lithuanian, English and Russian).
How to Cite
The copyright for the paper in this journal is retained by the author(s) with the first publication right granted to the journal. The authors agree to the Creative Commons Attribution 4.0 (CC BY 4.0) agreement under which the paper in the Journal is licensed.
By virtue of their appearance in this open access journal, papers are free to use with proper attribution in educational and other non-commercial settings with an acknowledgement of the initial publication in the journal.