Abstract

The article describes the development of modified encryption protocol based on the El–Gamal cryptoalgorithm. The development of an import–substituting software package for secure file transfer, based on the modified protocol of El–Gamal was made also.

Highlights

  • In today's world of globalization and development of information technology, it is not possible to build a business and production without using the latest advances in science and technology related to information technology

  • Today the development of an appropriate regulatory framework in the Russian Federation strengthens the process of introducing this type of technology into the modern market

  • The most promising branches of the direction of information technology are the development and application of cryptographic means of protecting information for various purposes, including the use by government bodies and commercial organizations, the implementation of electronic document management tools, the expansion of the use of encryption schemes based on public keys and means of protecting web resources from various attacks [1]

Read more

Summary

Introduction

In today's world of globalization and development of information technology, it is not possible to build a business and production without using the latest advances in science and technology related to information technology. Today the development of an appropriate regulatory framework in the Russian Federation strengthens the process of introducing this type of technology into the modern market. The most promising branches of the direction of information technology are the development and application of cryptographic means of protecting information for various purposes, including the use by government bodies and commercial organizations, the implementation of electronic document management tools, the expansion of the use of encryption schemes based on public keys and means of protecting web resources from various attacks [1]. The introduction into operation of an electronic digital signature as a cryptographic system is capable of fully ensuring the implementation of the basic properties of information: integrity and confidentiality. At the same time, this use does not provide guarantees for the provision of another important property of information resources – accessibility

Objectives
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call