Dynamic key generation according to the starting time
https://doi.org/10.15514/ISPRAS-2016-28(3)-4
Abstract
About the Authors
A. S. KiryantsevRussian Federation
I. A. Stefanova
Russian Federation
References
1. Mikhail Adamenko. The basics of classical cryptology. The secrets of ciphers and codes. DMK Press [DMK Publishing], 256 p., 2014 (in Russian).
2. Diffie, W. and Hellman, M. E. New directions in cryptography. IEEE Transactions on Information Theory, vol. 22, issue 6, 1976, pp. 644-654.
3. Maurer U.M, Wolf S. The Diffie-Hellman Protocol. Retrieved. Designs, Codes and Cryptography. Special Issue: Public Key Cryptography, № 19, 2000, pp.147-171.
4. The construction of the password generator. Retrieved from www.scritub.com/limba/rusa/194620205.php, 2013-08-02 (accessed February, 2016) (in Russian).
5. Self-authenticated method with timestamp. Patent US 20140325225 A1. Retrieved from http://www. google.com/patents/US20140325225 (accessed Oct. 30, 2014).
6. SELF-AUTHENTICATED METHOD WITH TIMESTAMP - DIAGRAM, SCHEMATIC, AND IMAGE. Retrieved from http://www.faqs.org/patents/imgfull/ 20140325225_06 (accessed Oct. 30, 2014 Sheet 5 of 5).
7. Kiryantsev A.C., Stefanova I.A. Constructing Private Service with CRYP2CHAT application. Trudy ISP RAN / Proc. ISP RAS], vol. 27, issue 3, 2015, pp. 279-290. DOI: 10.15514/ISPRAS-2015-27(3)-19
Review
For citations:
Kiryantsev A.S., Stefanova I.A. Dynamic key generation according to the starting time. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2016;28(3):51-64. https://doi.org/10.15514/ISPRAS-2016-28(3)-4