A Initiation Protocol for Crypto Graphical Session

Authors

  • S. Japertas Krašto apsaugos ministerija
  • P. Nefas Vyriausybinių ryšių centras prie valstybės Saugumo departamento Kauno sk.
  • R. Jankūnienė Kauno technologijos universitetas

Abstract

This article presents the analysis of using cryptographic methods for sensitive information interchanging. It is proposed the initiationprotocol for crypto graphical session that security is based on certain demands: the channel must exist, which is additional and save, thefunctioning of trusted third party must be and adversary can’t interfere between subjects interact and the third, i.e. trusted party. Thecryptography primitives are proposed, that allow realizing the second and third phases of initiation protocol. Besides, the analysis ofsecond and third protocol phases and prevention of cracking is done. That permits motivated involving of these phases on to initiationprotocol. Ill. 2, bibl. 5 (in Lithuanian; summaries in Lithuanian, English and Russian).

Downloads

Published

2004-10-20

Issue

Section

T 180 TELECOMMUNICATION ENGINEERING

How to Cite

A Initiation Protocol for Crypto Graphical Session. (2004). Elektronika Ir Elektrotechnika, 56(7). https://eejournal.ktu.lt/index.php/elt/article/view/10862