Development of the Software Cryptographic Service Provider on the Basis of National Standards
The article provides a brief description of the cryptography service provider software developed by the authors of this article, which is designed to create encryption keys, private and public keys of electronic digital signature, create and confirm authenticity of digital signature, hashing, encryp...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
International Institute of Informatics and Cybernetics
2019-02-01
|
Series: | Journal of Systemics, Cybernetics and Informatics |
Subjects: | |
Online Access: | http://www.iiisci.org/Journal/CV$/sci/pdfs/ZA369LP19.pdf
|
id |
doaj-cac94589bd6a4adf848c77546b9e91be |
---|---|
record_format |
Article |
spelling |
doaj-cac94589bd6a4adf848c77546b9e91be2021-03-27T15:54:08ZengInternational Institute of Informatics and CyberneticsJournal of Systemics, Cybernetics and Informatics1690-45242019-02-01171260272Development of the Software Cryptographic Service Provider on the Basis of National StandardsRakhmatillo Djuraevich AloevMirkhon Mukhammadovich NurullaevThe article provides a brief description of the cryptography service provider software developed by the authors of this article, which is designed to create encryption keys, private and public keys of electronic digital signature, create and confirm authenticity of digital signature, hashing, encrypting and simulating data using the algorithms described in State Standards Of Uzbekistan. It can be used in telecommunications networks, public information systems, government corporate information systems by embedding into application applications that store, process and transmit information that does not contain information related to state secrets, as well as in the exchange of information and ensuring the legal significance of electronic documents. The cryptography service provider includes the following functional components: a dynamically loadable library that implements a biophysical random number sensor; dynamic library that implements cryptographic algorithms in accordance with the State Standards of Uzbekistan; module supporting the work with external devices; installation module that provides the installation of cryptography service provider in the appropriate environment of operation (environment).http://www.iiisci.org/Journal/CV$/sci/pdfs/ZA369LP19.pdf data encryption algorithmtools of cryptographic protection of informationcryptographic providerhash functionencryption key |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Rakhmatillo Djuraevich Aloev Mirkhon Mukhammadovich Nurullaev |
spellingShingle |
Rakhmatillo Djuraevich Aloev Mirkhon Mukhammadovich Nurullaev Development of the Software Cryptographic Service Provider on the Basis of National Standards Journal of Systemics, Cybernetics and Informatics data encryption algorithm tools of cryptographic protection of information cryptographic provider hash function encryption key |
author_facet |
Rakhmatillo Djuraevich Aloev Mirkhon Mukhammadovich Nurullaev |
author_sort |
Rakhmatillo Djuraevich Aloev |
title |
Development of the Software Cryptographic Service Provider on the Basis of National Standards |
title_short |
Development of the Software Cryptographic Service Provider on the Basis of National Standards |
title_full |
Development of the Software Cryptographic Service Provider on the Basis of National Standards |
title_fullStr |
Development of the Software Cryptographic Service Provider on the Basis of National Standards |
title_full_unstemmed |
Development of the Software Cryptographic Service Provider on the Basis of National Standards |
title_sort |
development of the software cryptographic service provider on the basis of national standards |
publisher |
International Institute of Informatics and Cybernetics |
series |
Journal of Systemics, Cybernetics and Informatics |
issn |
1690-4524 |
publishDate |
2019-02-01 |
description |
The article provides a brief description of the cryptography service provider software developed by the authors of this article, which is designed to create encryption keys, private and public keys of electronic digital signature, create and confirm authenticity of digital signature, hashing, encrypting and simulating data using the algorithms described in State Standards Of Uzbekistan. It can be used in telecommunications networks, public information systems, government corporate information systems by embedding into application applications that store, process and transmit information that does not contain information related to state secrets, as well as in the exchange of information and ensuring the legal significance of electronic documents. The cryptography service provider includes the following functional components: a dynamically loadable library that implements a biophysical random number sensor; dynamic library that implements cryptographic algorithms in accordance with the State Standards of Uzbekistan; module supporting the work with external devices; installation module that provides the installation of cryptography service provider in the appropriate environment of operation (environment). |
topic |
data encryption algorithm tools of cryptographic protection of information cryptographic provider hash function encryption key |
url |
http://www.iiisci.org/Journal/CV$/sci/pdfs/ZA369LP19.pdf
|
work_keys_str_mv |
AT rakhmatillodjuraevichaloev developmentofthesoftwarecryptographicserviceprovideronthebasisofnationalstandards AT mirkhonmukhammadovichnurullaev developmentofthesoftwarecryptographicserviceprovideronthebasisofnationalstandards |
_version_ |
1724200986124222464 |