Download presentation
Presentation is loading. Please wait.
Published byHarry Kelley Modified over 9 years ago
1
Using cryptography to protect data in networks. Summary National Taras Shevchenko University of Kiev Ukraine Vsevolod Ievgiienko
2
Kiev University Today 21 faculties 154 chairs 318 full professors 1130 associated professors 276 assistant professors 991 scientific staff Founded in 1834Founded in 1969 9 chairs and 9 labs are acting in 4 directions: applied mathematics computer science social applications of software development software engineering 30 full professors 102 associated professors 61 assistant professors, engineers 1021 bachelors and masters
3
Scientific Partners Association for Communications, Electronics, Intelligence and Information Systems Professionals Faculty of Cybernetics Military Technical Academy (Warsaw, Poland)
4
AFCEA Ukraine Chapter Prof. Volodymyr Zaslavskyy President of AFCEA Ukraine Chapter Phone: (38044) 266 40 43 FAX: (38044) 266 00 89 E-mail: zas@unicyb.kiev.ua
5
Summary The result of my research was a set of applications created for secure correspondence and secure storage of data in networks.
6
Summary A primary objective was to create cheap, simple for an end user and at the same time powerful cryptographic solution. A user must not be a specialist in cryptography to use it. A secondary objective was to make the source code opened enough for verification of all implemented cryptographic algorithms.
7
Project Development New project is based on the previous one presented at AFCEA's International Student Conference 2008. Development of a remote storage system for confidential data suitable for usage in networks of small and middle enterprises.
8
Project Description A simple, user-friendly software uploads user files to a remote storage space, eliminating all traces of the confidential document on the sending computer. Authorisation requires a unique asymmetric key, eliminating the possibility of the password being discovered through trial-and- error. All encryption operations are done on sending computer and all data is transfered to server via encrypted channel. Unauthorised access is blocked for server administrators.
9
Project Description Screenshot of BETA version Server Internet, LAN etc.
10
Project Description Advantages: Strong crypto algorithms: RSA, AES, Twofish, Serpent, SHA2… Simple compilation on different operating systems using GCC or compatible compiler (tested on Microsoft Windows 2003/XP/Vista and FreeBSD 6.3) Server applications does not need much system resources
11
Contact me Web: www.cipherwall.com E-mail: vsevolod@afcea.org.uavsevolod@afcea.org.ua Phone: (38050) 3 555 999
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.