Skip to content

Cryptography

Alejandro M. Medrano Gil edited this page May 12, 2017 · 5 revisions

Cryptography is represented in an ontology, to enable certain services to use cryptographic techniques at highlevel of abstraction.

Cryptography ontology

Key Exchange

Definition for key exchange algorithms.

Digest

Or Hash, transforms uniformly data into a string of data. The ontology provides some instances like MD2, MD5, SHA, SHA256,SHA384, and SHA512.

Encryption

A generic concept of ofuscating information so only the appropriate key holder is able to read it back.

Symetric Encryption

An encryption method where the sender and receiver use the same key. Instances include AES, DES, and Blowfish.

Asymetric Encryption

An encryption method where the sender and receiver use different keys. Instances include DSA and RSA.

Services

Cryptography Services

Encryption Service

Enables the encryption, and decyphering, of RDF resources; using various methods.

Sign and Verify Service

Enables the use of asymetric encryption keys (and some Digest method) to assure a particular key holder to sign resources, wrapping them into a SignedResource instance. The same service can verify that the key holder has infact signed a particular SignedResource

Digest Service

Enables the use of Digest algorithms on RDF instances.