Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Фундаментальные иссл...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Исследование путей совершенствования протоколов распределения ключей в защищенной IP-телефонии

Исследование путей совершенствования протоколов распределения ключей в защищенной IP-телефонии

Abstract

Представлена математическая модель активного нарушителя, учитывающая возможность этого нарушителя реализовать атаку «человек посередине» на протокол распределения ключей и позволяющая рассчитать вероятность успешной атаки, нацеленной на несанкционированный доступ к информации, в зависимости от значений вероятностей промежуточных атак. Изложен учитывающий особенности криптографического протокола ZRTP подход к повышению защищенности протоколов распределения ключей посредством параллельной передачи специализированных сообщений по независимым каналам связи для случая, когда корреспонденты не имеют общего секрета. Выполнена оценка достигнутого повышения безопасности. Описан способ улучшения временных характеристик криптографического протокола ZRTP, позволяющий сократить время успешного выполнения протокола при работе по каналам связи с большими задержками, а также произведена оценка среднего времени успешного выполнения при реализации этого способа.

A mathematical model of the active intruder, taking into account the intruder’s possibility to realize attack man in the middle (MITM) for key distribution protocol, is described. Model allows to calculate the probability of a successful attack, aimed at unauthorized access to information (NSD), depending on the probabilities of intermediate attacks. Way of applying methods of security improvement for key agreement protocols for ZRTP is described. Increase of security is achieved through parallel transmission of specialized messages over the independent communication channels and applied when correspondents have no shared secret. Way of improving the time characteristics of a cryptographic protocol ZRTP, which allows to reduce the time of the execution of the protocol while working on the communication channels with large delays is described.

Keywords

КРИПТОГРАФИЧЕСКИЕ ПРОТОКОЛЫ, ПРОТОКОЛЫ РАСПРЕДЕЛЕНИЯ КЛЮЧЕЙ, ПОВЫШЕНИЕ БЕЗОПАСНОСТИ

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
gold