SOFTWARE, ALGORITHMS AND METHODS OF DATA ENCRYPTION BASED ON NATIONAL STANDARDS

Keywords: Tools of cryptographic protection of information, Data encryption algorithm, Cryptographic provider, Hash function, Encryption key

Abstract

The article provides a brief description of the cryptography service provider software developed by the authors of this article, which is designed to create encryption keys, create private and public keys of electronic digital signature, create and confirm authenticity of digital signatures, hashing, encrypting, and simulating data using the algorithms described in the State Standards of Uzbekistan. It can be used in telecommunications networks, public information systems, and government corporate information systems by embedding into applications that store, process, and transmit information that does not contain information related to state secrets, as well as in the exchange of information, and ensuring the legal significance of electronic documents. The cryptography service provider includes the following functional components: a dynamically loadable library that implements a biophysical random number sensor; a dynamic library that implements cryptographic algorithms in accordance with the State Standards of Uzbekistan; a module supporting work with external devices; an installation module that provides the installation of a cryptography service provider in the appropriate environment of operation (environment).

ABSTRAK: Artikel ini memberikan penerangan ringkas tentang perisian penyedia perkhidmatan kriptografi yang dibangunkan oleh pengarang artikel ini, yang direka untuk membuat kunci penyulitan, kunci persendirian dan awam tandatangan digital elektronik, membuat dan mengesahkan kesahihan tandatangan digital, hashing, penyulitan dan simulasi data menggunakan algoritma yang dinyatakan dalam Standard Negeri Uzbekistan. Ia boleh digunakan dalam rangkaian telekomunikasi, sistem maklumat awam, sistem maklumat korporat kerajaan dengan memasukkan aplikasi aplikasi yang menyimpan, memproses dan menghantar maklumat yang tidak mengandungi maklumat yang berkaitan dengan rahsia negara, serta pertukaran maklumat dan memastikan undang-undang kepentingan dokumen elektronik.

Penyedia perkhidmatan kriptografi termasuk komponen berfungsi sebagai berikut: perpustakaan dinamik yang boleh dimuatkan yang melaksanakan sensor nombor rawak biofisika; perpustakaan dinamik yang melaksanakan algoritma kriptografi mengikut Standard Negeri Uzbekistan; modul menyokong kerja dengan peranti luaran; modul pemasangan yang menyediakan pemasangan penyedia perkhidmatan kriptografi dalam persekitaran operasi yang sesuai (persekitaran).

Downloads

Download data is not yet available.

References

O`z DSt 1105: 2009. State standard of Uzbekistan. Information technology CRYPTOGRAPHIC PROTECTION OF INFORMATION. Data encryption algorithm.

O`z DSt 1106: 2009. State standard of Uzbekistan. Information technology CRYPTOGRAPHIC PROTECTION OF INFORMATION. A Hash function.

O`z DSt 1092: 2009. State standard of Uzbekistan. Information technology CRYPTOGRAPHIC PROTECTION OF INFORMATION. Processes of formation and verification of electronic digital signature.

PKCS #5 v2.0: Password-Based Cryptography Standard. RSA Laboratories. March 25, 1999. [Electronic resource]. - Access mode: https://tools.ietf.org/html/rfc2898.

Expansion of PKCS #11 for the use of Russian cryptographic algorithms. Moscow, 2008.

GOST 28147-89 - Information processing systems. Cryptographic protection. An algorithm of cryptographic transformation.

GOST R 34.11-94 - Information technology. Cryptographic protection of information. A Hash function.

GOST R 34.10-2001 - Information technology. Cryptographic protection of information. Processes of formation and verification of electronic digital signature.

RFC 4357 Additional Cryptographic Algorithms for Use with GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms.

Aloev R.D., Nurullaev M.M. (2019) Cryptography Service Provider - Data Encryption. In Proceedings of the 10 th International Multi-Conference on Complexity, Informatics and Cybernetics: 12-15 March 2019; Orlando, Florida, USA. Edited by Nagib Gallaos, Hsing-Wie Chu, Jeremy Horne, Suzanne K. Lunsford, Belkis Sánchez, Michael Savoie; pp 127-131.

Aripov M.M., Alaev R.H. (2019) Research of the application of the new cryptographic algorithms: applying the cipher algorithm O'zDSt1105:2009 for MS office document encryption. In Proceedings of the 5th International Conference on Engineering and MIS (ICEMIS '19): 06-08 June 2019; Astana, Kazakhstan. ACM, New York, NY, USA. https://doi.org/10.1145/3330431.3330434.

Published
2020-01-20
How to Cite
Nurullaev, M., & ALOEV, R. D. (2020). SOFTWARE, ALGORITHMS AND METHODS OF DATA ENCRYPTION BASED ON NATIONAL STANDARDS. IIUM Engineering Journal, 21(1), 142 - 166. https://doi.org/10.31436/iiumej.v21i1.1179
Section
Engineering Mathematics and Applied Science