|
|
Main
Диссертация
Theme of master's degree work:
«Research
and development methods of cryptographic defence information»
Author:
Polovenko Yan Igorovich
Abstract of thesis
In my work application of methods of cryptographic defence of
information is examined at creation of the coding file systems and their
further introduction in the kernel of the operating system. These
methods allow to accelerate creation of such systems, and also to bring
in in their development terms, allowing effectively to protect
information from an unauthorized division with the minimum loss of the
productivity.
For
realization of methods it is suggested to utillize the coding file
system (Encrypting file system, EFS), architecture of which is developed
with a help Windows CRYPTOAPI. In its basis technology of coding lies
with the opened key, in obedience to which for every file casual
appearance is generate the key, any symmetric algorithm can be used in
this connection . Presently utillized only one - DESX, being the special
modification of widely widespread standard of DES [1].
EFS codes
information utillizing a chart with the general key storage of which
takes a place in the resident pool of memory (the system is located in a
kernel Windows2K/XP/Vista), that eliminates access to it through the
file of pumping [3]. FEK - it by casual appearance the generated key of
certain length, its size in a north-american version was 128 beaten, and
in an international version got out between 40 and by 56 bats.
FEK is coded
one or a few general keys of coding, the list of FEK, which is kept in
the special attributes of EFS, DDF (data decryption field is the field
of decoding of information) and DRF, turns out as a result (data
recovery field is the field of renewal of information). Information
which coding of information is made through is hardly related to this
file. The general keys are selected from the pair of user, certificate
of X509, with additional possibility of the use of «File encryption», and also from a few written down in the policy of renewal of in cipher
information for this computer, with additional possibility of «File
recovery». The personal keys from these pair are used for decoding of
information and FEK, part is kept either on smart cards or in other
reliable place (for example, in memory safety of which is provided
through CRYPTOAPI) [2], and the agents of renewal can keep them in a
safe place out of the system.
EFS executes
four basic operations with by files which utillize ordinary Win32API: opening, reading, record and transformation. At planning of process of
transformation of files consists a main requirement in that, to
eliminate the loss of data even in case of setting off feed or other
failures.For this purpose the careful going is utillized near storage of
back-up copies of the deciphered information which are saved until
transformation will not be completed fully.
For providing
of transparent work of service EFS its components must be present on
many levels of the operating system, here utillizing intuitional-clear
man-machine interface. Components can be divided into two groups:
workings in the user mode and mode of kernel, their intercommunication
is shown on Pic.1.
Pic.1.
Intercommunication of the operating system and EFS
On the whole, EFS provides acceptable defence and confidentiality of
files, its components are successfully projected, realized and
repeatedly utillize an existent code, speaking to the system API at a
management the keys and certificates. It successfully gets along at
cleaning of resources on completion of their use and renewal after
system errors, arising up at implementation of operations. It is
important to mark that EFS not utillized for providing of integrity of
files and defence on the basis of authentification, developers
consciously went on a compromise between absolute safety and comfort.
During realization of such methods of cryptographic defence of
information there is a row of advantages: use of rapid and reliable
algorithms of coding, integration with a graphic shell, transparent
access to the protected files, low cost of development.
Conception of
the probed defence of information, is innovative, because the systems of
such type yet are only developed. Because of what it is needed to notice
that if to take into account all of lacks of these methods of defence,
such systems will be able to utillize not only professionals but also
ordinary users, and also will be much more reliable and less dear, what
other similar type. To date, this method of the coding file systems is
large scientific interest and space for development of such type of the
programs.
Banner on the theme of
master's degree work
Literature
[1]
The Microsoft Windows
Vista Driver
Development Kit (DDK)
[Электронный ресурс]: Справочная система — Microsoft, 2006.
[2] MSDN Library
[Электронный ресурс]: Справочная система — Microsoft, 2006.
[3]
Solomon D.A., Russinovich M.E.
Inside Microsoft Windows 2000[Электронныйресурс]:
Справочная система – 2000.
Main
Диссертация
|
|
|