Preview

Advanced Engineering Research (Rostov-on-Don)

Advanced search

Secure document management model based on distributed data transmission with authentication

https://doi.org/10.12737/16054

Abstract

The present research subject is the secure document management. Its purpose is increasing the reliability of the data transmission. The research problem is the construction of a reliable model of the secure document management with authentication. The distributed data transmission technique which allows - using multiple channels - reduce significantly the risk of the unauthorized access to the information, and the possibilities of its modification, is used to solve this problem. The research result is a secure document management model based on the dual-link MV2 cryptoalgorithm, and AES and RC4 underlying ciphers. The replacement of the basic ciphers is provided, and the need of the additional associated data which must remain open, but be authenticated with the basic encrypted information is considered. The model constructed solves the original problem, and the software implementation developed in C ++ using NTL library can be applied in practice. The application field of the results obtained is the commercial document management protection.

About the Authors

Vladimir M. Deundyak
Southern Federal University, Research Institute “Spetsvuzavtomatika”
Russian Federation


Svetlana B. Popova
Southern Federal University
Russian Federation


References

1. Satton, M.G.D. Korporativnyy dokumentooborot: printsipy, tekhnologii, metodologiya vnedreniya. [Corporate document management: principles, technologies, implementation methodology.] St. Petersburg: Azbuka, 2002, 448 p. (in Russian).

2. Babash, А.V., Shankin, G.R. Kriptografiya. [Cryptology.] Moscow: SOLON-R, 2002, 512 p. (in Russian).

3. Rogaway, P. Evaluation of Some Blockcipher Modes of Operation. Available at:

4. http://web.cs.ucdavis.edu/~rogaway/papers/modes.pdf (accessed: 01.06.15).

5. Bellare, M., Namprempre, C. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Lecture Notes in Computer Science, 2000, vol. 1976, pp. 531–545; Advances in Cryptology — ASIACRYPT 2000, Okamoto, T., ed. Berlin: Springer-Verlag, 2000.

6. Rogaway, P. Authenticated-encryption with associated-data. ACM Conference on Computer and Communications Security (CCS'02). Washington, 2002, pp. 98–107.

7. Shnayer, B. Prikladnaya kriptografiya. Protokoly, algoritmy, iskhodnye teksty na yazyke Si. [Applied Cryptography. Protocols, algorithms, source code in C.] Moscow: Triumf, 2002, 816 p. (in Russian).

8. Mishchenko, V.А., Vilanskiy, V.A. Ushcherbnye teksty i mnogokanal'naya kriptografiya. [Defective texts and multichannel cryptology.] Minsk: Entsiklopediks, 2007, 292 p. (in Russian).

9. Mishchenko, V.А., Vilanskiy, V.A., Lepin, V.V. Kriptograficheskiy algoritm MV 2. [Cipher algorithm.] Minsk: Entsiklopediks, 2007, 176 p. (in Russian).

10. Deundyak, V.M., Kosolapov, Y.V. O stoykosti kodovogo zashumleniya k statisticheskomu analizu nablyudaemykh dannykh mnogokratnogo povtoreniya. [On the firmness code noising to the statistical analysis of the observable data of repeated repetition.] Modelirovanie i AnalyzInformatsionnykh Sistem, 2012, vol. 19, no. 4, pp. 110–127 (in Russian).

11. Mogilevskaya, N.S. Programmnoe sredstvo logicheskoy proverki korrektnosti kriptograficheskikh protokolov raspredeleniya klyuchey na osnove BAN-logiki. [Software tool for logical validation of cryptographic key generation protocols based on BAN-logic.] Vestnik of DSTU, 2012, vol. 12, no. 1, iss. 2, pp. 5–15 (in Russian).

12. Mogilevskaya, N.S., Kulbikayan, R.V., Zhuravlev, L.A. Porogovoe razdelenie faylov na osnove bitovykh masok: ideya i vozmozhnoe primenenie. [Threshold file sharing based on bit masks: concept and possible use.] Vestnik of DSTU, 2011, vol. 11, no. 10, pp. 1749–1755 (in Russian).

13. Barichev, S.G., Goncharov, V.V., Serov, R.E. Osnovy sovremennoy kriptografii. [Fundamentals of modern cryptology.] Moscow: Goryachaya liniya — Telekom, 2002, 176 p. (in Russian).

14. Alpherov, A.P., et al. Osnovy kriptografii. [Fundamentals of cryptology.] Moscow: Gelios ARV, 2002, 480 p. (in Russian).

15. Shoup, V. NTL: A Library for doing Number Theory. Available at: http://www.shoup.net/ntl/ (accessed: 01.06.15).


Review

For citations:


Deundyak V.M., Popova S.B. Secure document management model based on distributed data transmission with authentication. Vestnik of Don State Technical University. 2015;15(4):101-106. (In Russ.) https://doi.org/10.12737/16054

Views: 552


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2687-1653 (Online)