Home | Issues | Profile | History | Submission | Review
Vol: 47(61) No: 1 / March 2002      

Design and Implementation of a Cryptographic Tool
Alin Suciu
Department of Computer Science, Technical University of Cluj-Napoca, Baritiu 28, 3400 Cluj-Napoca, Romania, phone: (+40-64) 194491, e-mail: alin.suciu@cs.utcluj.ro, web: www.cs.utcluj.ro/~suciu
Kalman Pusztai
Department of Computer Science, Technical University of Cluj-Napoca, Baritiu 28, 3400 Cluj-Napoca, Romania, e-mail: kalman.pusztai@cs.utcluj.ro, web: www.cs.utcluj.ro/~pusztai
Cristian Ionescu
Department of Computer Science, Technical University of Cluj-Napoca, Baritiu 28, 3400 Cluj-Napoca, Romania, e-mail: ci@arobs.ro


Keywords: Cryptography, library, Cryptolib, tool, Cryptos.

Abstract
This paper focuses on the development of a cryptographic library, called Cryptolib, and the cryptographic tool built on top of it, called Cryptos. Cryptolib implements all the fundamental cryptographic concepts: symmetric encryption (block and stream), asymmetric encryption, hash functions, pseudo-random number generators, true random number generator and statistical tests for randomness. The implemented algorithms are cryptographically strong and there is no limitation for the key length. Cryptolib can be used to design and implement various cryptographic applications and has an open design that makes it very easy to integrate with the application. To validate our approach, on top of Cryptolib we developed the Cryptos tool. Using a simple and intuitive graphical user interface, it offers easy access to the following main features: key generation and management, public key import / export, symmetric encryption, asymmetric encryption, hybrid encryption, message fingerprints generation, digital signatures, pseudo-random number generation, true random number generation and statistical tests for randomness with graphical visualization of the results.

References
[1] T.H. Cormen, C.E. Leiserson and R.R. Rivest, “Introduction to Algorithms”, MIT Press, 2001.
[2] D.E.R. Denning, “Cryptography and Data Security”, Addison Wesley, 1982.
[3] A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1997.
[4] D. Salomon, “Data Compression – The Complete reference”, Springer, 1997.
[5] B. Schneier, “Applied Cryptography”, John Wiley & Sons, 1996.
[6] D.R. Stinson, “Cryptography – Theory and Practice”, CRC Press, 1995.