In this paper I examine the possibilities of subject authentification, cryptographic methods of authentification in symmetrical and asymmetrical criptology systems (for instance, on-line and off-line regimes authentification; authentification with the participation of a two servers or an arbiter, etc.). Much attention was given to study, analyzing possibilities of computer trespasser to penetrate into the protocol, to deceive the authentification server, to change public key by its own public key, etc. A more detailed study of three protocols was carried out (Feige-Fiat-Shamir, GQ and Schnorr), concrete examples of these protocols are described, and made conclusions about safety of protocols, probability of forgery, on selection of more suitable parameters.
Identifer | oai:union.ndltd.org:LABT_ETD/oai:elaba.lt:LT-eLABa-0001:E.02~2006~D_20060626_221538-47003 |
Date | 26 June 2006 |
Creators | Maklakova, Natalija |
Contributors | Dzemyda, Gintautas, Lipeikienė, Joana, Kazlauskas, Kazys, Pupeikis, R., Račienė, Jurga, Vilnius Pedagogical University |
Publisher | Lithuanian Academic Libraries Network (LABT), Vilnius Pedagogical University |
Source Sets | Lithuanian ETD submission system |
Language | Lithuanian |
Detected Language | English |
Type | Master thesis |
Format | application/pdf |
Source | http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20060626_221538-47003 |
Rights | Unrestricted |
Page generated in 0.0028 seconds