APPLICATION OF DATA ENCRYPTION IN MANAGEMENT ACTIVITIES
DOI:
https://doi.org/10.32689/maup.it.2023.5.8Keywords:
software, encryptions algorytms, trade secrets, finance information, personal data.Abstract
Abstract. In today’s digital world, where a significant portion of business operations and data exchange takes place in electronic format, encryption becomes an indispensable tool for ensuring security. This article is dedicated to the description of the developed application software that implements data encryption algorithms. The software application can be used in managerial activities to provide an adequate level of data protection, considering potential threats. Sensitive company data that require special attention in terms of security include the following: trade secrets, financial information, internal correspondence, as well as personal data of employees and clients, etc. Encrypting these types of data allows companies to protect their commercial information, reduce the risk of financial and reputational losses. In developing the software, the ChaCha20 and Poly1305 algorithms were used at several key stages. Initially, the core functions, such as QuarterRound and ChaChaBlock, which perform the transformation of the ChaCha20 state, were implemented. Then, a mechanism for encrypting plain text was created by dividing it into blocks and using XOR to process each block with the generated key stream. In addition, the Poly1305 message authentication function, which generates a tag for verifying data integrity, was implemented. The final stage was the integration of both parts of the system – encryption and authentication, to ensure the confidentiality and integrity of the transmitted data. Testing of the developed software was also conducted, demonstrating its correct operation. The developed application is easily integrated into almost any company’s IT infrastructure, can operate in real-time for encrypting internal correspondence or company network messages. Thanks to the open-source code, the software can be refined under customer conditions (for example, for encrypting documents in various formats for long-term storage and/or transmission over an open communication channel).
References
Горбенко І. Д. Прикладна криптологія: Теорія. Практика. Застосування / І. Д. Горбенко, Ю. І. Горбенко. Харків: Форт, 2013. 80.
Совин Я. Р., Хома В. В., Отенко В. І., Порівняння AEAD-алгоритмів для вбудованих систем інтернету речей. 2019. с. 76-91. URL: https://science.lpnu.ua/sites/default/files/journal-paper/2020/feb/21055/var1ksm-19-78-93.pdf
AES Encrypter/Decrypter [Електронний ресурс]: ECE 5760: Final Project / A. Laxminarayana, A. Ravani, M. Venkatraman. URL: http://people.ece.cornell.edu/land/courses/ece5760/FinalProjects/s2015/ar856/ECE560webpage/ECE5760%20webpage/webpage_file s.html
Bernstein, D.J.: Stronger security bounds for wegman-carter-shoup authenticators. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 164–180. Springer, Heidelberg. 2005. http://cr.yp.to/papers.html#securitywcs, ID2d603727f69542f30f7da2832240c1ad
Nir Y. ChaCha20 and Poly1305 for IETF Protocols [Електронний ресурс] / Y. Nir, A. Langley // Google, Inc. 2018.