Lyenshyna I. Models and protocols of cryptographic support of privacy services with provable strength

Українська версія

Thesis for the degree of Candidate of Sciences (CSc)

State registration number

0412U002568

Applicant for

Specialization

  • 05.13.05 - Комп'ютерні системи та компоненти

25-04-2012

Specialized Academic Board

Д 64.052.01

Kharkiv National University Of Radio Electronics

Essay

The aim is to develop new and improve existing models, protocols and methods for cryptographic support services privacy from unauthorized access, which allows for provable level of services stability of privacy in untrusted environments. The object of research are the processes of information security services that implement privacy. The subject of research is a model of cryptographic protocols and methods of support services privacy. Research methods use the theory of groups, rings and fields, the theory of probability and mathematical statistics, methods, systems and methods of structural analysis and simulation software. Methods of group theory, rings and fields used in the study of methods chameleon-hash of group signatures and chameleon-signatures, methods of probability theory and mathematical statistics used in determining the strength of cryptographic transformations such as digital signatures, methods of systemic and structural analysis were used to develop a model policy security services with a demonstrable level of confidentiality of resistance, methods of simulation software used in the implementation of cryptographic transformations. During the dissertation research were obtained by these new scientific and practical results: 1. For the first time a model of service privacy policy security systems service applications, which is characterized by providing a formal proof of the absence of such systems, the identity of the subject through the use of the mechanism of group signature, protocol, delegating authority to appoint an alias and non-interactive algorithms alert users that can provide provable level of persistence services privacy in untrusted environments. 2. For the first time a method is proposed chameleon hashing, which is characterized by the use of cryptographic transformations in the group of points of an elliptic curve, that allows to provide cryptographic services to support the level of privacy with the exponential stability. 3. Improved method of digital signature in the group of points of elliptic curve, which, unlike the existing uses hashing and chameleon-deterministic method of displaying a bit string to point to the elliptic curve, which makes it possible to provide cryptographic services to support privacy. The practical significance of these results is to provide practical guidance on implementation of the model of security policy demonstrably sustainable level of service provision in the privacy of service orders, designing a cryptographic protocol based on DSTU 4145-2002, has the properties of message hiding and non-transferability of digital signature; proposals for the formation of a new format of the certificate's public key to an improved method of digital signature in the existing national system of digital signature, creating a test layout software package online auction, which uses the proposed method signature in the group of points of elliptic curve.

Files

Similar theses