Интернет магазин китайских планшетных компьютеров



Компьютеры - Стандарты криптографии

23 января 2011


Оглавление:
1. Стандарты криптографии
2. Российские стандарты



Стандарты шифрования
  • Data Encryption Standard
  • Triple-DES
  • Advanced Encryption Standard
  • RSA исходный алгоритм открытого ключа
  • OpenPGP
  • CipherSaber

Стандарты хеширования

  • MD5 128-bit
  • SHA доступен в вариантах 160, 256, 384 и 512-бит
  • HMAC
  • PBKDF2

Стандарты цифровой подписи

  • Digital Signature Standard, based on the Digital Signature Algorithm
  • RSA

Стандарты беспроводных коммуникаций

  • Wired Equivalent Privacy, severely flawed and superseded by WPA)
  • Wi-Fi Protected Access better than WEP, a 'pre-standard' partial version of 802.11i
  • 802.11i a.k.a. WPA2, uses AES and other improvements on WEP
  • A5/1 and A5/2 cell phone encryption for GSM

Федеральные стандарты обработки информации

  • FIPS PUB 31 Guidelines for Automatic Data Processing Physical Security and Risk Management 1974
  • FIPS PUB 46-3 Data Encryption Standard 1999
  • FIPS PUB 73 Guidelines for Security of Computer Applications 1980
  • FIPS PUB 74 Guidelines for Implementing and Using the NBS Data Encryption Standard 1981
  • FIPS PUB 81 DES Modes of Operation 1980
  • FIPS PUB 102 Guideline for Computer Security Certification and Accreditation 1983
  • FIPS PUB 112 Password Usage 1985, defines 10 factors to be considered in access control systems that are based on passwords
  • FIPS PUB 113 Computer Data Authentication 1985, specifies a Data Authentication Algorithm based on DES, adopted by the Department of Treasury and the banking community to protect electronic fund transfers.
  • FIPS PUB 140-2 Security Requirements for Cryptographic Modules 2001, defines four increasing security levels
  • FIPS PUB 171 Key Management Using ANSI X9.17 1992, based on DES
  • FIPS PUB 180-2 Secure Hash Standard 2002 defines the SHA family
  • FIPS PUB 181 Automated Password Generator 1993
  • FIPS PUB 185 Escrowed Encryption Standard 1994, a key escrow system that provides for decryption of telecommunications when lawfully authorized.
  • FIPS PUB 186-2 Digital Signature Standard 2000
  • FIPS PUB 190 Guideline for the Use of Advanced Authentication Technology Alternatives 1994
  • FIPS PUB 191 Guideline for the Analysis of local area network Security 1994
  • FIPS PUB 196 Entity Authentication Using Public Key Cryptography 1997
  • FIPS PUB 197 Advanced Encryption Standard 2001
  • FIPS PUB 198 The Keyed-Hash Message Authentication Code 2002


Просмотров: 1846


<<< Q-метод Полларда дискретного логарифмирования