Εξατομικευμένο λογισμικό ασφαλούς διαμοίρασης αρχείων με ελλειπτική κρυπτογράφηση
Personalized secure file sharing using elliptic curves
Βαρκάς, Χρήστος - Στυλιανός
KeywordsΕλλειπτική κρυπτογράφηση ; Ασφάλεια με κρυπτογράφηση ; Εξατομικευμένο λογισμικό ; Ασφαλή διαμοίραση αρχείων ; Personalized secure file sharing ; Elliptic curves
This dissertation concerns the development of an online application, the purpose of which is to share files to a third party, of which these files will be Digitally Signed using a Digital Certificate Authority installed on the Server. As we will mention later in the work there are different types of algorithms for certificates, with different algorithms. Cryptographic systems based on elliptic curves are a very important part of public key cryptography and in recent years more and more scientists are studying them. The advantages of these systems over conventional cryptographic systems are that they use smaller parameters and keys while offering the same levels of security. The main goal of security in information systems in general, but also in web-based environments in particular, is to preserve the confidentiality, integrity and availability of all their components. Every technological development seems to create new security problems, so the biggest challenge in the field of security is precisely because it requires the immediate use of cutting-edge technologies to deal with new problems that are constantly emerging. The picture of "dangerous situations" or "damages" needs to be made clearer. What exactly is at stake? The prevailing views distinguish the following three basic concepts in relation to the management of a secure system (Cherdantseva & Hilton, 2013): • Confidentiality: It is a concept closely related to privacy and secrecy. It concerns the non-disclosure of sensitive information to users who do not have the appropriate authorization. • Integrity: It concerns the possibility of modifications (additions, deletions and changes) of information. Only properly authorized users should the system allow such actions. This preserves the accuracy and completeness of the contents of an information system. • Availability: Refers to the possibility of direct access to information, services and in general to all information technology resources (IT resources) when requested, without undue delay. In this work we will use the Elliptic Curve and specifically the algorithm secp256k1 which as the number of the algorithm indicates determines the key length in 256-bit), security power. We will also report more comprehensively on the purpose of the work as well as the use of the Elliptic Curve, what slves the advantages of this use.