Article

Article title HASH-FUNCTION USING FOR INFORMATION PROTECTION IN LAN MILITARY APPOINTMENTS
Authors A.S. Rodionov, S.L. Sukharev
Section SECTION IV. COMPUTER TECHNOLOGIES IN FORMATION, MANAGEMENT AND MEDICIN
Month, Year 05, 2012 @en
Index UDC 025.4.03
DOI
Abstract Based on the analysis of hashing methods information (symmetric, asymmetric), which are currently used in information and communication systems for military and civilian use and electronic workflow, developed original algorithms that implement the coding of textual information in the form of a combination of cryptographic algorithms. With symmetric encryption algorithm is the basic MD5 (Message Digest 5) used in the implementation of options: a constant length of the key, the key recursive, cyclical shift key, the key cyclic shift code. Asymmetric encryption to hash a text document with the simultaneous creation of digital signature is implemented in accordance with GOST 34.10-2001. The developed software can be useful to system administrator.

Download PDF

Keywords Symmetrical; asymmetrical coding; hashing; electronic workflow; digital signature.
References 1. Олифер В.Г. Компьютерные сети. Принципы, технологии, протоколы. – 3-е изд. – СПБ.: Питер, 2006. – 958 с.
2. Рябко Б.Я. Криптографические методы защиты информации: Учебное пособие для вузов. – М.: Горячая линия-Телеком, 2005. – 229 с.

Comments are closed.