Abstract
For last 60 years in cryptography new directions have appeared. One of such directions is cryptographic protocols (CP). Now cryptographic protocols are widely used In Information technologies. They solve such problems as division of a secret, identification, authentication, the blind signature, maintenance of integrity, etc. Construction CP is complexity problem. It is necessary to construct CP in such a manner that he completely would execute the function, and any malefactor could not prevent in correct performance CP, and also take the confidential information from intercepted messages between participants of the protocol. Therefore now the problem of analysis CP which will show weaknesses (vulnerability) CP is actual. As a result of the carried out analysis it becomes possible or to correct found vulnerability, or to refuse use CP. Words "testing" and "the analysis" we shall count synonyms.
Original language | English |
---|---|
Title of host publication | 6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005 |
Pages | 236-237 |
Number of pages | 2 |
Volume | 2005 |
Publication status | Published - 1 Dec 2005 |
Event | 6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005 - Erlagol, Altai, Russian Federation Duration: 1 Jul 2005 → 5 Jul 2005 |
Conference
Conference | 6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005 |
---|---|
Country | Russian Federation |
City | Erlagol, Altai |
Period | 1.7.05 → 5.7.05 |
Keywords
- Cryptography protocol
- Protocol
- Testing
ASJC Scopus subject areas
- Engineering(all)