Vol: 47(61) No: 1 / March 2002 Design and Implementation of a Cryptographic Tool Alin Suciu Department of Computer Science, Technical University of Cluj-Napoca, Baritiu 28, 3400 Cluj-Napoca, Romania, phone: (+40-64) 194491, e-mail: alin.suciu@cs.utcluj.ro, web: www.cs.utcluj.ro/~suciu Kalman Pusztai Department of Computer Science, Technical University of Cluj-Napoca, Baritiu 28, 3400 Cluj-Napoca, Romania, e-mail: kalman.pusztai@cs.utcluj.ro, web: www.cs.utcluj.ro/~pusztai Cristian Ionescu Department of Computer Science, Technical University of Cluj-Napoca, Baritiu 28, 3400 Cluj-Napoca, Romania, e-mail: ci@arobs.ro Keywords: Cryptography, library, Cryptolib, tool, Cryptos. Abstract This paper focuses on the development of a cryptographic library, called Cryptolib, and the cryptographic tool built on top of it, called Cryptos. Cryptolib implements all the fundamental cryptographic concepts: symmetric encryption (block and stream), asymmetric encryption, hash functions, pseudo-random number generators, true random number generator and statistical tests for randomness. The implemented algorithms are cryptographically strong and there is no limitation for the key length. Cryptolib can be used to design and implement various cryptographic applications and has an open design that makes it very easy to integrate with the application. To validate our approach, on top of Cryptolib we developed the Cryptos tool. Using a simple and intuitive graphical user interface, it offers easy access to the following main features: key generation and management, public key import / export, symmetric encryption, asymmetric encryption, hybrid encryption, message fingerprints generation, digital signatures, pseudo-random number generation, true random number generation and statistical tests for randomness with graphical visualization of the results. References [1] T.H. Cormen, C.E. Leiserson and R.R. Rivest, “Introduction to Algorithms”, MIT Press, 2001. [2] D.E.R. Denning, “Cryptography and Data Security”, Addison Wesley, 1982. [3] A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1997. [4] D. Salomon, “Data Compression – The Complete reference”, Springer, 1997. [5] B. Schneier, “Applied Cryptography”, John Wiley & Sons, 1996. [6] D.R. Stinson, “Cryptography – Theory and Practice”, CRC Press, 1995. |