Аннотация
For last 60 years in cryptography new directions have appeared. One of such directions is cryptographic protocols (CP). Now cryptographic protocols are widely used In Information technologies. They solve such problems as division of a secret, identification, authentication, the blind signature, maintenance of integrity, etc. Construction CP is complexity problem. It is necessary to construct CP in such a manner that he completely would execute the function, and any malefactor could not prevent in correct performance CP, and also take the confidential information from intercepted messages between participants of the protocol. Therefore now the problem of analysis CP which will show weaknesses (vulnerability) CP is actual. As a result of the carried out analysis it becomes possible or to correct found vulnerability, or to refuse use CP. Words "testing" and "the analysis" we shall count synonyms.
Язык оригинала | Английский |
---|---|
Название основной публикации | 6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005 |
Страницы | 236-237 |
Число страниц | 2 |
Том | 2005 |
Состояние | Опубликовано - 1 дек 2005 |
Событие | 6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005 - Erlagol, Altai, Российская Федерация Продолжительность: 1 июл 2005 → 5 июл 2005 |
Конференция
Конференция | 6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005 |
---|---|
Страна | Российская Федерация |
Город | Erlagol, Altai |
Период | 1.7.05 → 5.7.05 |
ASJC Scopus subject areas
- Engineering(all)