1 / 11

Using cryptography to protect data in networks. Summary

Explore the innovative research on secure correspondence & data storage in networks. Project offers user-friendly, powerful encryption solutions with open-source verification. Contact for more details.

mgroom
Download Presentation

Using cryptography to protect data in networks. Summary

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Using cryptography to protect data in networks.Summary National Taras Shevchenko University of Kiev Ukraine Vsevolod Ievgiienko

  2. Kiev University Today Founded in 1834 Founded in 1969 • 21 faculties • 154 chairs • 318 full professors • 1130 associated professors • 276 assistant professors • 991 scientific staff • 9chairs and9labs are acting in 4 directions: • applied mathematics • computer science • social applications of software development • software engineering • 30 full professors • 102 associated professors • 61 assistant professors, engineers • 1021 bachelors and masters

  3. Scientific Partners Association for Communications, Electronics, Intelligence and Information Systems Professionals Faculty of Cybernetics Military Technical Academy (Warsaw, Poland)

  4. AFCEA Ukraine Chapter Prof.Volodymyr Zaslavskyy President of AFCEA Ukraine Chapter Phone: (38044) 266 40 43 FAX: (38044) 266 00 89 E-mail: zas@unicyb.kiev.ua

  5. Summary The result of my research was a set of applications created for secure correspondence and secure storage of data in networks.

  6. Summary A primary objective was to create cheap, simple for an end user and at the same time powerful cryptographic solution. A user must not be a specialist in cryptography to use it. A secondary objective was to make the source code opened enough for verification of all implemented cryptographic algorithms.

  7. Project Development New project is based on the previous one presented at AFCEA's International Student Conference2008. Development of a remote storage system for confidential data suitable for usage in networks of small and middle enterprises.

  8. Project Description • A simple, user-friendly software uploads user files to a remote storage space, eliminating all traces of the confidential document on the sending computer. • Authorisation requires a unique asymmetric key, eliminating the possibility of the password being discovered through trial-and-error. All encryption operations are done on sending computer and all data is transfered to server via encrypted channel. Unauthorised access is blocked for server administrators.

  9. Project Description Screenshot of BETA version Internet, LAN etc. Server

  10. Project Description Advantages: • Strong crypto algorithms: RSA, AES, Twofish, Serpent, SHA2… • Simple compilation on different operating systems using GCC or compatible compiler (tested on Microsoft Windows 2003/XP/Vista and FreeBSD 6.3) • Server applications does not need much system resources

  11. Contact me Web: www.cipherwall.com E-mail:vsevolod@afcea.org.ua Phone: (38050) 3 555 999

More Related