Abstract: The role ofcryptography has become a major part of every modern software and network architecture.Most programming languages, software frameworks and application libraries do not provide a cryptographyhierarchy and do not even implement a basic cryptography model, which makes the development of asoftware system or communication network even harderfrom a security point of view.This paper presents an object-oriented solution for providing all the main classifications of cryptography algorithms via a hierarchy of classes that offer frequently used formats and security features for both in-transit and at-restdata security. It also presents the important role of all three main types of cryptographic algorithms for the security and development of any state-of-the-artsystem.The purpose of the developed and published online practical realization of a cryptography hierarchy, for a language that has no embedded cryptography model, is to emphasize and show the need for such components and their usage forauthentication, integrity verification, secure storage and safe data transfers.This article......
Keywords: cryptography,security,object-oriented hierarchy, cryptography model,at-rest, in-transit, network communication,verification, identification,authentication, authorization, data, hash functions, symmetric encryption, asymmetric encryption, digital signature, authenticated encryption,digital envelope,key exchange, message digestion, digest, salt, secret key, key management, initialization vector, block, mode of operation, padding standard,public key, private key, key pair, MAC, HMAC,KDF, HKDF, PBKDF2, MD5, SHA-1, SHA-2, SHA-3, Whirlpool, Argon2, Bcrypt, AES, CAMELLIA,RSA, DSA.
[1]. A. Menezes, P. van Oorschot, S. Vanstone.Handbook of Applied Cryptography. 1996. ISBN: 9781439821916.
[2]. S. Vaudenay. A Classical Introduction to Cryptography: Applications for Communications Security. 2005. ISBN: 9780387254647.
[3]. J. Katz, Y. Lindell. Introduction to ModernCryptography:Principlesand Protocols. 2007. ISBN: 9781584885511.
[4]. B. Schneire. Applied Cryptography: Protocols, Algorithms, and Source Code in C. 1995. ISBN: 9780471117094.
[5]. J. Fridrich. Steganography in Digital Media: Principles, Algorithms, and Applications. 2009. ISBN: 9780521190190.