利用密码技术保护数码资讯以加强资讯科技保安

S. Chaudhari, Archana Thakur, A. Rajan
{"title":"利用密码技术保护数码资讯以加强资讯科技保安","authors":"S. Chaudhari, Archana Thakur, A. Rajan","doi":"10.37256/rrcs.2320232635","DOIUrl":null,"url":null,"abstract":"In information technology (IT) security, defence in depth is considered the best practice. Protecting data at rest or in transit is a part of the defence in depth approach. Confidentiality, data integrity, authentication, and non-repudiation are four IT security paradigms that need to be achieved to protect data and enhance IT security. Every scientific organisation requires i) to maintain the confidentiality of information like novel research ideas, results, patents, indigenous developed techniques and designs, human resource personal data and remarks, etc. ii) to manage the integrity of Internet-based web resources, users' credentials, etc. and iii) to manage non-repudiation and integrity guarantee enabled implementation of various software systems. The Rivest-Shamir-Adleman (RSA) technique is used to achieve confidentiality of secret data during its storage and transmission over insecure channels. The elliptic curve cryptography (ECC) technique is used for key exchange with extremely constrained devices like wireless and wireless sensor networks. Data hashing is used for maintaining data integrity; digital certificates are employed to achieve non-repudiation. In order to enhance IT security, the application of these cryptographic algorithms has been studied in data security like workflow-based applications, video conferencing, Domain Name System (DNS), web security, and radio frequency identification (RFID) systems and presented in the paper. A novel scheme to ensure website integrity and to detect website attacks using time-stamped hash functions with timestamping is also demonstrated in the paper. The study revealed that symmetric key and asymmetric key algorithms provide confidentiality and authentication. Data integrity and authentication are achieved using digital signatures and message authentication codes. Non-repudiation is established with asymmetric key algorithms and digital signatures.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Securing Digital Information Using Cryptography Techniques to Enhance IT Security\",\"authors\":\"S. Chaudhari, Archana Thakur, A. Rajan\",\"doi\":\"10.37256/rrcs.2320232635\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In information technology (IT) security, defence in depth is considered the best practice. Protecting data at rest or in transit is a part of the defence in depth approach. Confidentiality, data integrity, authentication, and non-repudiation are four IT security paradigms that need to be achieved to protect data and enhance IT security. Every scientific organisation requires i) to maintain the confidentiality of information like novel research ideas, results, patents, indigenous developed techniques and designs, human resource personal data and remarks, etc. ii) to manage the integrity of Internet-based web resources, users' credentials, etc. and iii) to manage non-repudiation and integrity guarantee enabled implementation of various software systems. The Rivest-Shamir-Adleman (RSA) technique is used to achieve confidentiality of secret data during its storage and transmission over insecure channels. The elliptic curve cryptography (ECC) technique is used for key exchange with extremely constrained devices like wireless and wireless sensor networks. Data hashing is used for maintaining data integrity; digital certificates are employed to achieve non-repudiation. In order to enhance IT security, the application of these cryptographic algorithms has been studied in data security like workflow-based applications, video conferencing, Domain Name System (DNS), web security, and radio frequency identification (RFID) systems and presented in the paper. A novel scheme to ensure website integrity and to detect website attacks using time-stamped hash functions with timestamping is also demonstrated in the paper. The study revealed that symmetric key and asymmetric key algorithms provide confidentiality and authentication. Data integrity and authentication are achieved using digital signatures and message authentication codes. Non-repudiation is established with asymmetric key algorithms and digital signatures.\",\"PeriodicalId\":377142,\"journal\":{\"name\":\"Research Reports on Computer Science\",\"volume\":\"58 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Research Reports on Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.37256/rrcs.2320232635\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Research Reports on Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37256/rrcs.2320232635","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在信息技术(IT)安全中,纵深防御被认为是最佳实践。保护静态或传输中的数据是纵深防御方法的一部分。机密性、数据完整性、身份验证和不可否认性是保护数据和增强IT安全性需要实现的四个IT安全范式。每一个科学机构都要求i)保持信息的机密性,如新颖的研究思想、成果、专利、自主开发的技术和设计、人力资源个人数据和评论等;ii)管理基于互联网的网络资源的完整性,用户凭据等;iii)管理各种软件系统的不可否认性和完整性保证。RSA (Rivest-Shamir-Adleman)技术用于实现机密数据在不安全通道上的存储和传输过程中的机密性。椭圆曲线加密(ECC)技术用于无线和无线传感器网络等极端受限设备的密钥交换。数据散列用于维护数据完整性;使用数字证书来实现不可否认性。为了提高IT安全性,本文研究了这些加密算法在基于工作流的应用程序、视频会议、域名系统(DNS)、web安全以及射频识别(RFID)系统等数据安全中的应用。本文还介绍了一种利用带时间戳的时间戳哈希函数来保证网站完整性和检测网站攻击的新方案。研究表明,对称密钥和非对称密钥算法提供了机密性和身份验证。数据完整性和身份验证使用数字签名和消息身份验证码来实现。采用非对称密钥算法和数字签名建立了不可否认性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Securing Digital Information Using Cryptography Techniques to Enhance IT Security
In information technology (IT) security, defence in depth is considered the best practice. Protecting data at rest or in transit is a part of the defence in depth approach. Confidentiality, data integrity, authentication, and non-repudiation are four IT security paradigms that need to be achieved to protect data and enhance IT security. Every scientific organisation requires i) to maintain the confidentiality of information like novel research ideas, results, patents, indigenous developed techniques and designs, human resource personal data and remarks, etc. ii) to manage the integrity of Internet-based web resources, users' credentials, etc. and iii) to manage non-repudiation and integrity guarantee enabled implementation of various software systems. The Rivest-Shamir-Adleman (RSA) technique is used to achieve confidentiality of secret data during its storage and transmission over insecure channels. The elliptic curve cryptography (ECC) technique is used for key exchange with extremely constrained devices like wireless and wireless sensor networks. Data hashing is used for maintaining data integrity; digital certificates are employed to achieve non-repudiation. In order to enhance IT security, the application of these cryptographic algorithms has been studied in data security like workflow-based applications, video conferencing, Domain Name System (DNS), web security, and radio frequency identification (RFID) systems and presented in the paper. A novel scheme to ensure website integrity and to detect website attacks using time-stamped hash functions with timestamping is also demonstrated in the paper. The study revealed that symmetric key and asymmetric key algorithms provide confidentiality and authentication. Data integrity and authentication are achieved using digital signatures and message authentication codes. Non-repudiation is established with asymmetric key algorithms and digital signatures.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Witness System of Vehicle Accidents Based on the Internet of Things Comparative Machine Learning Approaches to Analyzing the Illnesses of the Chronic Renal and Heart Diseases Evaluating Simultaneous Multi-threading and Affinity Performance for Reproducible Parallel Stochastic Simulation Chest Disease Image Classification Based on Spectral Clustering Algorithm Investigation of Multilayer Perceptron Regression-based Models to Forecast Reference Evapotranspiration (ETo)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1