Proceedings of the Institute for System Programming of the RAS
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Proceedings of ISP RAS:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Proceedings of the Institute for System Programming of the RAS, 2016, Volume 28, Issue 3, Pages 51–64
DOI: https://doi.org/10.15514/ISPRAS-2016-28(3)-4
(Mi tisp37)
 

Dynamic key generation according to the starting time

A. S. Kiryantsev, I. A. Stefanova

Volga Region State University of Telecommunications and Informatics
References:
Abstract: The article analyses the problem of data persistence while transmitting the messages and looks into possible solutions. The central part of the article describes the algorithm of data encryption and digital signature algorithm according to the starting time of the session. In the algorithm the session key is symmetrically generated for each pair of subscribers; further the data are encrypted with this key. In its turn the session key is also encrypted with a public asymmetric key of a recipient and with an asymmetric encryption algorithm. Then the decrypted session key with the decrypted message are sent to the recipient. This client employs the same asymmetric encryption algorithm and his/her secret decryption key to decrypt the asymmetric session key. The decrypted session key is used for decryption of the received message. Thus, every time new symmetric keys are generated according to the starting time of a session, which enables high speed of encryption along with an open to public temporary encryption keys transmitting. Besides, the article contains examples of Diffie-Hellman protocol work and the hash-function algorithm MD5. They are used for encryption of generated temporary keys and for transmitting common private key to both clients. According to the suggested algorithm, the prototype of key and signature generation has been created and probated. The article illustrates the stages of Diffie-Hellman and MD5 protocol work. The prototype was tested with the help of a computer and two phones (2013 and 2015 production years).
Keywords: Diffie-Hellman protocol, MD5-function, cryptography, encryption, decryption, digital protection, digital signature, symmetric and asymmetric cryptosystems.
Bibliographic databases:
Document Type: Article
Language: English
Citation: A. S. Kiryantsev, I. A. Stefanova, “Dynamic key generation according to the starting time”, Proceedings of ISP RAS, 28:3 (2016), 51–64
Citation in format AMSBIB
\Bibitem{KirSte16}
\by A.~S.~Kiryantsev, I.~A.~Stefanova
\paper Dynamic key generation according to the starting time
\jour Proceedings of ISP RAS
\yr 2016
\vol 28
\issue 3
\pages 51--64
\mathnet{http://mi.mathnet.ru/tisp37}
\crossref{https://doi.org/10.15514/ISPRAS-2016-28(3)-4}
\elib{https://elibrary.ru/item.asp?id=26605246}
Linking options:
  • https://www.mathnet.ru/eng/tisp37
  • https://www.mathnet.ru/eng/tisp/v28/i3/p51
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Proceedings of the Institute for System Programming of the RAS
    Statistics & downloads:
    Abstract page:126
    Full-text PDF :101
    References:34
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024