Return to search

Autentifikacijos protokolų tyrimas / Research of authentification protocols

In this paper I examine the possibilities of subject authentification, cryptographic methods of authentification in symmetrical and asymmetrical criptology systems (for instance, on-line and off-line regimes authentification; authentification with the participation of a two servers or an arbiter, etc.). Much attention was given to study, analyzing possibilities of computer trespasser to penetrate into the protocol, to deceive the authentification server, to change public key by its own public key, etc. A more detailed study of three protocols was carried out (Feige-Fiat-Shamir, GQ and Schnorr), concrete examples of these protocols are described, and made conclusions about safety of protocols, probability of forgery, on selection of more suitable parameters.

Identiferoai:union.ndltd.org:LABT_ETD/oai:elaba.lt:LT-eLABa-0001:E.02~2006~D_20060626_221538-47003
Date26 June 2006
CreatorsMaklakova, Natalija
ContributorsDzemyda, Gintautas, Lipeikienė, Joana, Kazlauskas, Kazys, Pupeikis, R., Račienė, Jurga, Vilnius Pedagogical University
PublisherLithuanian Academic Libraries Network (LABT), Vilnius Pedagogical University
Source SetsLithuanian ETD submission system
LanguageLithuanian
Detected LanguageEnglish
TypeMaster thesis
Formatapplication/pdf
Sourcehttp://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20060626_221538-47003
RightsUnrestricted

Page generated in 0.0018 seconds