Módulo Cifrador de Documentos Eletrônicos

  • Ricardo Felipe Custódio UFSC
  • Júlio da Silva Dias UDESC
  • Fernando Carlos Pereira UFSC
  • Adriana Elissa Notoya UFSC

Abstract


Electronic documents are relevant for many applications and users. Doctors, lawyers or bankers requires information confidentiality. However, the solutions found cannot provide the confidentiality required, presenting high costs and limited functions. This paper presents the security requirements that were obtained through the analysis of several applications. Based on this security requirements we propose the implementation of a new architecture for a secure encipherment module.

References

Ansper, A., Buldas, A., Roos, M., and Willemson, J. (2001). Efficient long-term validation of digital signatures. Lecture Notes in Computer Science, 1992:402-415.

Austrália, A. M., Caelli, W., and Little, P. (2003). Electronic signatures - understand the past to develop the future. http://www.law.edu.au/unswlj/ecommerce/mccullagh.html.

Balacheff, B., Chen, L., Plaquin, D., and Proudler, G. (2001). A trusted process to digitally sign a document. In Proceedings of the 2001 Workshop on New Security Paradigms, pages 79-86. ACM Press.

Buldas, A. and Lipmaa, H. (1998). Digital signatures, time-stamping and corresponding infrastructure. Technical report, Küberneetika AS.

Dias, J., Demétrio, D. B., Custódio, R. F., and De Rolt, C. R. (2003). Reliable clock synchronization for electronic documents. In Proceedings of III IEEE Latin American Network Mangment Systems, pages 550-559.

Gennaro, R., R.M. O. R. T. (1998). Simplified vss and fast-track multiparty computations with applications to threshold cryptography. Proceedings of the 1998 ACM Symposium on Principles of Distributed Computing.

ISO (1999). Information technology - security techniques - evaluation criteria for it security - part 1: Introduction and general model.

NIST (2002). Fips pub 140-2 security requirements for cryptographic modules. Disponível em <http://csrc.nist.gov/cryptval/140-2.htm>. Acesso em 18 de Dezembro de 2002.

Press, W. H., Teukolsky, S. A., Vetterling, W. T., and Plannery, B. P. (1994). Cambridge University Press. New York, 2 edition.

Schneier, B. (1995). Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition. John Wiley and Sons, 2 edition.

Shamir, A. (1979). How to share a secret. Communications of the ACM, Volume 22, pages 612-613.

Stinson, D. R. (1995). Cryptography : Theory and Practice. CRC Press.

Stinson, D. R. (2002). Cryptography - Theory and Practice. Chapnan & Hall, 2 edition.
Published
2004-05-10
CUSTÓDIO, Ricardo Felipe; DIAS, Júlio da Silva; PEREIRA, Fernando Carlos; NOTOYA, Adriana Elissa. Módulo Cifrador de Documentos Eletrônicos. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 4. , 2004, Gramado. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2004 . p. 129-140. DOI: https://doi.org/10.5753/sbseg.2004.21232.