...
首页> 外文期刊>Kybernetes: The International Journal of Systems & Cybernetics >Cryptography: A security pillar of privacy, integrity and authenticity of data communication
【24h】

Cryptography: A security pillar of privacy, integrity and authenticity of data communication

机译:密码术:数据通信的隐私,完整性和真实性的安全支柱

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Purpose - This paper seeks to advance research and strategies that lead to a heightened awareness of the need to protect data from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Design/methodology/approach - The paper introduces the necessary mathematics of cryptography: integer and modular arithmetic, linear congruence, Euclidean and extended Euclidean algorithm, Fermat's theorem, and Elliptic curve. Findings - The results indicate that encryption has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs, and secure computation. Practical implications - The results of this research show that all forms of e-commerce activities such as online credit card processing, purchasing stocks, and banking data processing, if compromised, would lead to businesses losing billions of dollars in lost revenues as well as losing confidence in e-commerce. In the last few years, it had been reported that organizations that store and maintain customers' private and confidential records were compromised on many occasions by hackers breaking into the data networks and stealing the records from the storage media. Originality/value - This paper tackles one of the most critical problems of securing data networks. Security problems arise among other things to resource and workload sharing; complexity of interconnected networks; authentication of users; fast expandability of networks; threats to networks such as wiretapping and violations of the seven pillars of security: authentication, authorization, privacy, integrity, non-repudiation, availability, and audit.
机译:目的-本文旨在推进研究和策略,以提高人们对保护数据免遭泄露,保证数据和消息的真实性以及保护系统免受基于网络的攻击的需求的认识。设计/方法/方法-本文介绍了密码学的必要数学:整数和模块化算法,线性同余,欧几里德和扩展的欧几里得算法,费马定理和椭圆曲线。调查结果-结果表明加密已经超出了机密性的范围,包括消息完整性检查,发送者/接收者身份验证,数字签名,交互式证明和安全计算的技术。实际意义-该研究的结果表明,所有形式的电子商务活动,例如在线信用卡处理,购买股票和银行数据处理,如果受到损害,将导致企业损失数十亿美元的收入,甚至损失对电子商务充满信心。在过去的几年中,据报道,存储和维护客户的私人和机密记录的组织在许多情况下受到黑客入侵数据网络并从存储介质中窃取记录的威胁。原创性/价值-本文解决了保护数据网络最关键的问题之一。资源和工作负载共享尤其会带来安全性问题。互连网络的复杂性;用户认证;网络的快速扩展;诸如窃听和违反安全七大支柱等网络威胁:身份验证,授权,隐私,完整性,不可抵赖性,可用性和审计。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号