izpis_h1_title_alt

Šifriranje z avtentikacijo
ID ŠTRUBELJ, NEJC (Author), ID Žitnik, Arjana (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (777,34 KB)
MD5: BC8DB3546987D70C21455E51361D7B86

Abstract
Šifriranje nas neopazno obdaja vsakokrat, ko uporabljamo mobilne komunikacije, spletne storitve in podobno. Zahteve po učinkovitem šifriranju pa se vsak dan povečujejo. V delu predstavljamo šifriranje z avtentikacijo, ki je eno najbolj učinkovitih orodij za zagotavljanje varne komunikacije, saj zagotavlja tako zaupnost kot avtentičnost poslanih sporočil. Pokažemo, pred katerimi napadi je takšen sistem varen in razložimo zakaj. Razložimo delovanje zgoščevalne funkcije s ključem in pokažemo, kako nam ta pomaga pri ohranjanju verodostojnosti podatkov. Za konec predstavimo načine, kako sestaviti sistem za šifriranje z avtentikacijo, ter opišemo algoritma OCB in GCM, ki takšen sistem realizirata.

Language:Slovenian
Keywords:kriptografija, šifriranje z avtentikacijo, MAC, AES, OCB, GCM
Work type:Bachelor thesis/paper
Typology:2.11 - Undergraduate Thesis
Organization:FRI - Faculty of Computer and Information Science
Year:2021
PID:20.500.12556/RUL-130171 This link opens in a new window
COBISS.SI-ID:77480195 This link opens in a new window
Publication date in RUL:10.09.2021
Views:1707
Downloads:92
Metadata:XML RDF-CHPDL DC-XML DC-RDF
:
Copy citation
Share:Bookmark and Share

Secondary language

Language:English
Title:Authenticated encryption
Abstract:
Encryption surrounds us imperceptibly every time we use mobile communications, online banking, online services and the like. Meanwhile the demand for efficient encryption is growing daily. In this thesis, we present authenticated encryption, which is one of the most powerful tools for ensuring secure communications, since it provides both privacy and authenticity. We show which kind of attacks a system like that is effective against and explain why. We describe message authentication codes and show how they assure data integrity. Finally, we present different approaches to constructing authenticated encryption schemes: generic compositions which combine an encryption scheme and a message authentication code, and integrated schemes. Two algorithms that realize such systems are then presented: GCM and OCB.

Keywords:cryptography, authenticated encription, MAC, AES, OCB, GCM

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Back