Skip to main content

Object modeling of cryptographic algorithms with UML

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1438))

Included in the following conference series:

Abstract

This article describes Object-Oriented modeling of cryptographic primitives and algorithms. Instead of just designing an Object-Oriented cryptographic interface the primitives and algorithms themselves are modeled and assigned to class hierarchy. Models are based on abstract classes or interfaces which define concept of functions manipulating data. Manipulation is done in buffers which also are classes. Models are further used to define new primitives and algorithms. A package of pipe classes is introduced to face the problem of different block sizes of different primitives. A pipe is a sequence of primitives which together manipulate data. Mismatches in buffer sizes within pipes are balanced by valves. Introduced techniques are tested in software library called Secure Tools (ST). Finally, some future directions are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneier, B.: Applied Cryptography, Second Edition, (1996), John Wiley & Sons, Inc.

    Google Scholar 

  2. Menezes A. J., van Oorschot P. C., Vanstone S. A. Handbook of Applied Cryptography, (1997), CRC Press, Inc.

    Google Scholar 

  3. Fowler M., Scott K.: UML Distilled: Applying the standard object modeling language, (1997) Addison-Wesley

    Google Scholar 

  4. Lee R., Tepfenhart W.: UML and C++ A Practical Guide to Object-Oriented Development, (1997) Prentice Hall, New Jersey.

    Google Scholar 

  5. Wei Dai: Crypto++: a C++ Class Library of Cryptographic Primitives Version 2.1. (1996) (http://www.eskimo.com/weidai/)

    Google Scholar 

  6. Java Security API for Java Development Kit 1.1 (1996). Sun Microsystems, Inc. (http://sun.java.com/)

    Google Scholar 

  7. Microsoft Cryptographic API, Version 1.0. Microsoft Corporation. (http://www.microsoft.com/)

    Google Scholar 

  8. Stroustrup B.: The C++ Programming Language, 2nd Edition (Corrected 1995). Addison-Wesley.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Colin Boyd Ed Dawson

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kaksonen, R., MÄhönen, P. (1998). Object modeling of cryptographic algorithms with UML. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053733

Download citation

  • DOI: https://doi.org/10.1007/BFb0053733

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64732-4

  • Online ISBN: 978-3-540-69101-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics