Practical application of open source software tools in cryptography

التفاصيل البيبلوغرافية
العنوان: Practical application of open source software tools in cryptography
المؤلفون: Dragan Ranđelović, Željko Kuzmanović, Miloš Ranđelović
المصدر: NBP: Nauka, bezbednost, policija, Vol 2014, Iss 2, Pp 115-135 (2014)
بيانات النشر: Centre for Evaluation in Education and Science (CEON/CEES), 2014.
سنة النشر: 2014
مصطلحات موضوعية: cryptool, cryptography, business.industry, Computer science, symmetric and asymmetric systems, Cryptography, Open source software, computer.software_genre, Social pathology. Social and public welfare. Criminology, digital signature, Operating system, cryptowork flow, Software engineering, business, HV1-9960, computer
الوصف: Security of computer systems is becoming more important, because more users in more ways use more information in the computer world. With the development of information technologies and telecommunication systems and a greater diffusion in the geographical sense growing is also the possibility of misuse of data which are transferred through open and insecure communication paths which requires a more efficient protection. In the system of data transfer attackers can easily destroy data, modify them or the information can come into possession of unauthorized persons or organizations which can often have very heavy consequences. The problem is especially expressed in some organizations such as state administrations, banking, judicial, military, medical and other administrations. In this paper explained are basic terms related to crypts and algorithms which were used and which are used, as well as methods of data protection in computer networks based on cryptography in order to protect privacy inside a network of computers. Explained are symmetrical and asymmetrical cryptosystems and the technique of digital signature. Also, the subject of this paper is the presentation of the program CrypTool and CryptoWork flow, which belong to the most famous free ie. shareware software in the field of cryptography, with special emphasis on the possibility of applying different algorithms and comparative analysis of their work and are given concrete examples of their use.
تدمد: 0354-8872
DOI: 10.5937/nbp1402115r
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1f2d7913bb21035a959e5db5283121d8
https://doi.org/10.5937/nbp1402115r
Rights: OPEN
رقم الانضمام: edsair.doi.dedup.....1f2d7913bb21035a959e5db5283121d8
قاعدة البيانات: OpenAIRE
الوصف
تدمد:03548872
DOI:10.5937/nbp1402115r