Cryptographic protocol to data exchange in hostile machines
Downloads
The technology continuous advancement, especially of Internet, has allowed the evolution of the computers usage from a situation that it was used just for simple and isolated tasks to the current global integration level, in which it wants to join the diverse points of generation and use of the information inside and outside of an institution. This has created several possibilities to improve the service quality and information access. On the other hand, new challenges like information heterogeneity and secure appear. This paper presents a new XML-based cryptographic protocol to access and manipulate encrypted data in machines that are susceptible to intruder’s attacks. Following the RSA algorithm, this new protocol defines rules in which the encrypted data are handled independent from the user keys and without access of intruders in the others encryption keys and plain text.
Downloads
Eastlake III, D. E., Niles, K., Secure XML: The New Syntax for Signatures and Encryption, Addison-Wesley, Boston, 2002.
W3C, XML Encryption Syntax and Processing, http://www.w3.org/TR/xmlenc-core/, December 10, 2017.
W3C, Decryption Transform for XML Signature, http://www.w3.org/TR/xmlenc-decrypt, December 10, 2017.
W3C, XML-Signature Syntax and Processing, http://www.w3.org/TR/xmldsig-core/, February 12, 2018.
W3C, Extensible Markup Language (XML) 1.0 (Second Edition), http://www.w3.org/TR/REC-xml, February 4, 2018.
W3C, HTML 4.01 Specification, http://www.w3.org/TR/REC-html40, December 24, 2017.
W3C, Canonical XML Version 1.0, http://www.w3.org/TR/2001/REC-xml-c14n-20010315, March 15, 2018.
Johanston, H., Sistemas de Informação Hospitalar: Presente e Futuro, Revista Informédica, in http://www.epub.org.br/ informed, São Paulo, v.1, n.2, 1993.
E-Health Latin America, Há um Futuro Promissor na História Clínica Eletrônica, Bibliomed, in http://www.bibliomed.com.br, November 2000.
Kohnfelder, L., Towards a Practical Public-Key Cryptosystem, Bachalor’s Thesis, M.I.T., May 1978.
Stallings, W., Cryptography and Network Security, Principles and Practice, Prentice Hall, New Jersey, 1999.
Blaze M., Strauss, M., Atomic Proxy Cryptography, AT&T Labs-Research, February 1998.
Castano, S., Fugini, M., Martella, G., Samarati, P., Database Security, Addison-Weslwy, 3rd edition, 2000.
Souza, J. N., Moreira, M. A. R., Silva, I. R., A Multi-User Key and Data Exchange Protocol to Manage a Secure Database, XVII Simpósio Brasileiro de Banco de Dados, 14-16 October 2002, Gramado Rio Grande do Sul, Brasil, Anais/Proceedings.
Blake, I., Seroussi, G., Smart, N., Elliptic Curves in Cryptography, Cambridge University Press, 1999.
Stinson, D. R., Cryptography, Theory and Practice, CRC Press, 1995.
Coutinho, S. C., The Mathematics of Ciphers: Number Theory and RSA Cryptography, A K Peters, 1998.
Koblitz, N., Algebraic Aspects of Cryptography, Springer, 1999.
Copyright (c) 2021 International Journal of Scientific Research and Management
This work is licensed under a Creative Commons Attribution 4.0 International License.