{"title":"设计模式与加密算法在信息系统中的应用","authors":"D. Nikolaeva, V. Bozhikova, M. Stoeva","doi":"10.1109/ET50336.2020.9238292","DOIUrl":null,"url":null,"abstract":"The paper discusses to the application of Design Pattern (DP) and encryption algorithms in Information Systems (IS) in order to protect Information Security (ISec). The paper presents attack vectors, protection approaches and the ISO standard, generalizes classification of DPs, which are used in IS to protect ISec, compares encryption algorithms. The present paper proposes an approach for the use of DPs and algorithms for encrypting and decrypting data, using the algorithm Secure Hash 256 (SHA256), as well as authentication of the SMTP (Simple Mail Transfer Protocol).","PeriodicalId":178356,"journal":{"name":"2020 XXIX International Scientific Conference Electronics (ET)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Apply of Design Patterns and Encryption Algorithms in Information Systems\",\"authors\":\"D. Nikolaeva, V. Bozhikova, M. Stoeva\",\"doi\":\"10.1109/ET50336.2020.9238292\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper discusses to the application of Design Pattern (DP) and encryption algorithms in Information Systems (IS) in order to protect Information Security (ISec). The paper presents attack vectors, protection approaches and the ISO standard, generalizes classification of DPs, which are used in IS to protect ISec, compares encryption algorithms. The present paper proposes an approach for the use of DPs and algorithms for encrypting and decrypting data, using the algorithm Secure Hash 256 (SHA256), as well as authentication of the SMTP (Simple Mail Transfer Protocol).\",\"PeriodicalId\":178356,\"journal\":{\"name\":\"2020 XXIX International Scientific Conference Electronics (ET)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 XXIX International Scientific Conference Electronics (ET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ET50336.2020.9238292\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 XXIX International Scientific Conference Electronics (ET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ET50336.2020.9238292","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Apply of Design Patterns and Encryption Algorithms in Information Systems
The paper discusses to the application of Design Pattern (DP) and encryption algorithms in Information Systems (IS) in order to protect Information Security (ISec). The paper presents attack vectors, protection approaches and the ISO standard, generalizes classification of DPs, which are used in IS to protect ISec, compares encryption algorithms. The present paper proposes an approach for the use of DPs and algorithms for encrypting and decrypting data, using the algorithm Secure Hash 256 (SHA256), as well as authentication of the SMTP (Simple Mail Transfer Protocol).