Security of a Key System of a Fiscal Feature
Autor: | Oleg N. Murashov, Victor Sergeevich Gorbatov, I. Yu. Zhukov |
---|---|
Rok vydání: | 2018 |
Předmět: |
Authentication
Computer science business.industry Compromise media_common.quotation_subject Cryptography 0102 computer and information sciences 02 engineering and technology Encryption Computer security computer.software_genre 01 natural sciences Information protection policy 010201 computation theory & mathematics Control and Systems Engineering Signal Processing 0202 electrical engineering electronic engineering information engineering Key (cryptography) Feature (machine learning) 020201 artificial intelligence & image processing business Protocol (object-oriented programming) computer Software media_common |
Zdroj: | Automatic Control and Computer Sciences. 52:1065-1070 |
ISSN: | 1558-108X 0146-4116 |
Popis: | This paper describes the protocol for generating a master key for a system for exchanging fiscal features, generating a fiscal feature key with authentication of the means for generating and verifying fiscal features that are installed on the fiscal drive and in the equipment of fiscal data operators and the authorized body. This protocol is based on the use of known domestic cryptographic transformations and is aimed at ensuring the integrity and authenticity of data transmitted through the communication channel between the means of formation and means of verification of fiscal features. The protocol was developed in accordance with the recommendations of Rosstandart regarding the principles of the development and modernization of encryption (cryptographic) means of information protection and was issued in the form of a draft national standard proposed for public discussion and approval in accordance with the established procedure. The main result of this study is the formulation of certain security properties that are identical to those objectives that the intruder sets for the purpose of compromise. Already at the stage of creating a protocol, taking into account methods of compromise makes it possible to establish such structural features in this protocol that would ensure the fulfillment of specified security properties and the subsequent justification of their sufficiency. |
Databáze: | OpenAIRE |
Externí odkaz: |