Secure document management model based on distributed data transmission with authentication
https://doi.org/10.12737/16054
Abstract
About the Authors
Vladimir M. DeundyakRussian Federation
Svetlana B. Popova
Russian Federation
References
1. Satton, M.G.D. Korporativnyy dokumentooborot: printsipy, tekhnologii, metodologiya vnedreniya. [Corporate document management: principles, technologies, implementation methodology.] St. Petersburg: Azbuka, 2002, 448 p. (in Russian).
2. Babash, А.V., Shankin, G.R. Kriptografiya. [Cryptology.] Moscow: SOLON-R, 2002, 512 p. (in Russian).
3. Rogaway, P. Evaluation of Some Blockcipher Modes of Operation. Available at:
4. http://web.cs.ucdavis.edu/~rogaway/papers/modes.pdf (accessed: 01.06.15).
5. Bellare, M., Namprempre, C. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Lecture Notes in Computer Science, 2000, vol. 1976, pp. 531–545; Advances in Cryptology — ASIACRYPT 2000, Okamoto, T., ed. Berlin: Springer-Verlag, 2000.
6. Rogaway, P. Authenticated-encryption with associated-data. ACM Conference on Computer and Communications Security (CCS'02). Washington, 2002, pp. 98–107.
7. Shnayer, B. Prikladnaya kriptografiya. Protokoly, algoritmy, iskhodnye teksty na yazyke Si. [Applied Cryptography. Protocols, algorithms, source code in C.] Moscow: Triumf, 2002, 816 p. (in Russian).
8. Mishchenko, V.А., Vilanskiy, V.A. Ushcherbnye teksty i mnogokanal'naya kriptografiya. [Defective texts and multichannel cryptology.] Minsk: Entsiklopediks, 2007, 292 p. (in Russian).
9. Mishchenko, V.А., Vilanskiy, V.A., Lepin, V.V. Kriptograficheskiy algoritm MV 2. [Cipher algorithm.] Minsk: Entsiklopediks, 2007, 176 p. (in Russian).
10. Deundyak, V.M., Kosolapov, Y.V. O stoykosti kodovogo zashumleniya k statisticheskomu analizu nablyudaemykh dannykh mnogokratnogo povtoreniya. [On the firmness code noising to the statistical analysis of the observable data of repeated repetition.] Modelirovanie i AnalyzInformatsionnykh Sistem, 2012, vol. 19, no. 4, pp. 110–127 (in Russian).
11. Mogilevskaya, N.S. Programmnoe sredstvo logicheskoy proverki korrektnosti kriptograficheskikh protokolov raspredeleniya klyuchey na osnove BAN-logiki. [Software tool for logical validation of cryptographic key generation protocols based on BAN-logic.] Vestnik of DSTU, 2012, vol. 12, no. 1, iss. 2, pp. 5–15 (in Russian).
12. Mogilevskaya, N.S., Kulbikayan, R.V., Zhuravlev, L.A. Porogovoe razdelenie faylov na osnove bitovykh masok: ideya i vozmozhnoe primenenie. [Threshold file sharing based on bit masks: concept and possible use.] Vestnik of DSTU, 2011, vol. 11, no. 10, pp. 1749–1755 (in Russian).
13. Barichev, S.G., Goncharov, V.V., Serov, R.E. Osnovy sovremennoy kriptografii. [Fundamentals of modern cryptology.] Moscow: Goryachaya liniya — Telekom, 2002, 176 p. (in Russian).
14. Alpherov, A.P., et al. Osnovy kriptografii. [Fundamentals of cryptology.] Moscow: Gelios ARV, 2002, 480 p. (in Russian).
15. Shoup, V. NTL: A Library for doing Number Theory. Available at: http://www.shoup.net/ntl/ (accessed: 01.06.15).
Review
For citations:
Deundyak V.M., Popova S.B. Secure document management model based on distributed data transmission with authentication. Vestnik of Don State Technical University. 2015;15(4):101-106. (In Russ.) https://doi.org/10.12737/16054