Abstract
This article describes Object-Oriented modeling of cryptographic primitives and algorithms. Instead of just designing an Object-Oriented cryptographic interface the primitives and algorithms themselves are modeled and assigned to class hierarchy. Models are based on abstract classes or interfaces which define concept of functions manipulating data. Manipulation is done in buffers which also are classes. Models are further used to define new primitives and algorithms. A package of pipe classes is introduced to face the problem of different block sizes of different primitives. A pipe is a sequence of primitives which together manipulate data. Mismatches in buffer sizes within pipes are balanced by valves. Introduced techniques are tested in software library called Secure Tools (ST). Finally, some future directions are discussed.
Preview
Unable to display preview. Download preview PDF.
References
Schneier, B.: Applied Cryptography, Second Edition, (1996), John Wiley & Sons, Inc.
Menezes A. J., van Oorschot P. C., Vanstone S. A. Handbook of Applied Cryptography, (1997), CRC Press, Inc.
Fowler M., Scott K.: UML Distilled: Applying the standard object modeling language, (1997) Addison-Wesley
Lee R., Tepfenhart W.: UML and C++ A Practical Guide to Object-Oriented Development, (1997) Prentice Hall, New Jersey.
Wei Dai: Crypto++: a C++ Class Library of Cryptographic Primitives Version 2.1. (1996) (http://www.eskimo.com/weidai/)
Java Security API for Java Development Kit 1.1 (1996). Sun Microsystems, Inc. (http://sun.java.com/)
Microsoft Cryptographic API, Version 1.0. Microsoft Corporation. (http://www.microsoft.com/)
Stroustrup B.: The C++ Programming Language, 2nd Edition (Corrected 1995). Addison-Wesley.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kaksonen, R., MÄhönen, P. (1998). Object modeling of cryptographic algorithms with UML. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053733
Download citation
DOI: https://doi.org/10.1007/BFb0053733
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64732-4
Online ISBN: 978-3-540-69101-3
eBook Packages: Springer Book Archive