Vol: 4(4) No: 1 / March 1994 Security Services for Cryptographic Data Protection in Distributed Systems Victor-Valeriu Patriciu Computer Science Department, Tehnical Military Academy, Bucharest, Bd. G. Cosbuc, nr. 81-83, Sector 4, 050141, Bucarest, Romania, e-mail: aionescu@roearn.ici.ro Keywords: cryptographic data protection, security services, distributed systems Abstract Data security in distributed systems has become a subject of great concern witch microcomputers increasingly being used to hold sensitive company information. This paper willshow more security services for distributed applications. We have create a software toolkit, called CECST (Security Software Toolkit) with the goal to assist and to help programmers to create security services programs for networks applications. The generated program implement cryptographic functions selected by users from manyipossibilities offerend by the toolkit. SECST may be used to ensure security in network applications, especial in documents processing and transmission, or to study network cryptographic mechanism, in education and training process in the universities. References [1] Biham E., Shamir A., “Differential Cryptoanalysis of FEAL and N-Heash”, Procedings of EUROCRYPT’91, Univ. of Sussex, UK, 1991. [2] Brassard G. “Cryptology in Academia”, IEEE Compcon Conf., San Francisco, 1987. [3] Camion P., “The Knapsack hash Function”, Procedeedings of EUROCRYPT’91, 1991. [4] Cooper J. A. “Computer and Comunications Security “ New York, Mc. Graw-Hill, 1989. [5] Damgard I. “Design Principles For Hash Functions”, Proc. Of CRYPTO’89, Springer-Verlag 1989. [6] Denning D. E. “Cryptography and Data Security”, Addison Wesley, 1979. [7] El Gamal T., “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithsm” [8] Gerberick D., “Functional Specification for an EDI Cryptoserver”, SIGSAC Reciew, nr.3, 1991. [9] Girault M. “Hash Functions Using Modulo N Operations”, Proceeding of EUROCRYPT’87, Heidelberg, 1987. [10] Jennifer S., Pieprzyk J., “Cryptography: An Introduction to Computer Security”, Prent-Hall, 1989. [11] Massey J., Xnejia L., “Markow Ciphers and Differetial Cryptoanalysis”, Proceedings of EUROCRYPT’91, Univ. of Sussex, UK, 1991. [12] Mayer C., Matyas S., “Generation Strong One Way Functions”, IBM Tech. Disclousure Bull, mar. 1985. [13] Merkle R. C., Hellman M. E., “Hiding Information and Signatures in Trapdoor Knapsacks”, IEEE Trans on Inform. Theory, sep., 1978. [14] Miyaaguchi S., Siroishi A., Shimizu A., “Fast Data Encryption Algorithm FEAL-8”, Review of Electrical Comunication Lab., nr. 4, 1988. [15] Miyagichi S., Ohta K., Iwato M., “128 Bit Hash Function (N-Hash)”, Proceedings of SECURICOM’90, 1990. [16] Muftic S., “Security Mecanism for Computer Networks”, ELLIS HORWOOD, UK, 1988. [17] Muftic S., “Security Mecanism for Computer Networks”, Proj. Rep. CEC COST-11, 1990. [18] Patriciu V. V., Angheloiu I., Gőyrfi E., \"Computer Data Security\", Ed. Militara, Bucuresti, 1986. [19] Patriciu V. V., Coculescu L. Cristea V., Pilat F., “The Design of Teleinformatics Systems”, Ed. Militara, Bucuresti, 1988. [20] Patriciu V. V. “Data Security in DistribuitedSystems”, Doctoral Thesis, Politehnical University Bucharest, 1992. [21] Patriciu V. V., “Cryptography and Security in Computer Networks”, Ed. Tehnica Bucharest, 1994. [22] Rivest R. L., Shamir A., Adleman L., “On Digital Signatures and Public-Key Functions”,Comm of ACM, Mai 1979. [23] RSA Data Security Inc., “The Keys to Privacy and Authentication”, Products Catalog, Redwood City, USA, 1992. |