ISSN (Online): 2321-3418
server-injected
Engineering and Computer Science
Open Access

Cryptographic protocol to data exchange in hostile machines

, ,
DOI: 10.18535/ijsrm/v9i05.ec02· Pages: 597-603· Vol. 9, No. 05, (2021)· Published: May 24, 2021
PDF
Views: 382 PDF downloads: 149

Abstract

The technology continuous advancement, especially of Internet, has allowed the evolution of the computers usage from a situation that it was used just for simple and isolated tasks to the current global integration level, in which it wants to join the diverse points of generation and use of the information inside and outside of an institution. This has created several possibilities to improve the service quality and information access. On the other hand, new challenges like information heterogeneity and secure appear. This paper presents a new XML-based cryptographic protocol to access and manipulate encrypted data in machines that are susceptible to intruder’s attacks. Following the RSA algorithm, this new protocol defines rules in which the encrypted data are handled independent from the user keys and without access of intruders in the others encryption keys and plain text.

Keywords

Cryptographydatabase securityprotocolXMLsecure data exchange

References

  1. Eastlake III, D. E., Niles, K., Secure XML: The New Syntax for Signatures and Encryption, Addison-Wesley, Boston, 2002.Google Scholar ↗
  2. W3C, XML Encryption Syntax and Processing, http://www.w3.org/TR/xmlenc-core/, December 10, 2017.Google Scholar ↗
  3. W3C, Decryption Transform for XML Signature, http://www.w3.org/TR/xmlenc-decrypt, December 10, 2017.Google Scholar ↗
  4. W3C, XML-Signature Syntax and Processing, http://www.w3.org/TR/xmldsig-core/, February 12, 2018.Google Scholar ↗
  5. W3C, Extensible Markup Language (XML) 1.0 (Second Edition), http://www.w3.org/TR/REC-xml, February 4, 2018.Google Scholar ↗
  6. W3C, HTML 4.01 Specification, http://www.w3.org/TR/REC-html40, December 24, 2017.Google Scholar ↗
  7. W3C, Canonical XML Version 1.0, http://www.w3.org/TR/2001/REC-xml-c14n-20010315, March 15, 2018.Google Scholar ↗
  8. Johanston, H., Sistemas de Informação Hospitalar: Presente e Futuro, Revista Informédica, in http://www.epub.org.br/ informed, São Paulo, v.1, n.2, 1993.Google Scholar ↗
  9. E-Health Latin America, Há um Futuro Promissor na História Clínica Eletrônica, Bibliomed, in http://www.bibliomed.com.br, November 2000.Google Scholar ↗
  10. Kohnfelder, L., Towards a Practical Public-Key Cryptosystem, Bachalor’s Thesis, M.I.T., May 1978.Google Scholar ↗
  11. Stallings, W., Cryptography and Network Security, Principles and Practice, Prentice Hall, New Jersey, 1999.Google Scholar ↗
  12. Blaze M., Strauss, M., Atomic Proxy Cryptography, AT&T Labs-Research, February 1998.Google Scholar ↗
  13. Castano, S., Fugini, M., Martella, G., Samarati, P., Database Security, Addison-Weslwy, 3rd edition, 2000.Google Scholar ↗
  14. Souza, J. N., Moreira, M. A. R., Silva, I. R., A Multi-User Key and Data Exchange Protocol to Manage a Secure Database, XVII Simpósio Brasileiro de Banco de Dados, 14-16 October 2002, Gramado Rio Grande do Sul, Brasil, Anais/Proceedings.Google Scholar ↗
  15. Blake, I., Seroussi, G., Smart, N., Elliptic Curves in Cryptography, Cambridge University Press, 1999.Google Scholar ↗
  16. Stinson, D. R., Cryptography, Theory and Practice, CRC Press, 1995.Google Scholar ↗
  17. Coutinho, S. C., The Mathematics of Ciphers: Number Theory and RSA Cryptography, A K Peters, 1998.Google Scholar ↗
  18. Koblitz, N., Algebraic Aspects of Cryptography, Springer, 1999.Google Scholar ↗
Author details
Alex Fabianne de Paulo
Federal University of Goiás
✉ Corresponding Author
👤 View Profile →
Ilmério Reis da Silva
Federal University of Uberlândia
👤 View Profile →
João Nunes Souza
Federal University of Uberlândia
👤 View Profile →🔗 Is this you? Claim this publication