The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

DOI: 10.14569/IJACSA.2021.0120765
PDF

Applying Custom Algorithms in Windows Active Directory Certificate Services

Author 1: Alaev Ruhillo

International Journal of Advanced Computer Science and Applications(IJACSA), Volume 12 Issue 7, 2021.

  • Abstract and Keywords
  • How to Cite this Article
  • {} BibTeX Source

Abstract: The article presents a solution to the problem of not recognizing the O’zDst 1092:2009 algorithm by the operating system and the problem of using digital certificates generated using the O’zDst 1092:2009 algorithm and O’zDst 1106:2009 algorithm. These algorithms were adopted in 2009. But these algorithms are still not recognized by the operating system. For other cryptographic algorithms used in Windows, cryptographic service providers have been developed that provide cryptographic operation functions to other software. These cryp-tographic service providers do not support the above algorithms. From here it becomes necessary to develop the cryptographic provider supporting the O’zDSt 1106:2009 hashing algorithm and the O’zDSt 1092:2009 signature algorithm. But to work with digital certificates, one cryptographic provider is not enough. Special extensions are also required to encode and decode digital certificate data. Therefore, the development of an extension for cryptographic providers is given. Also, for managing digital cer-tificates and key lifecycle, a method of integrating cryptographic providers with Windows Active Directory Certificate Services is presented. Developed cryptographic providers are composed of 3 types of providers such as hash provider, signature provider, and key storage provider. The architecture of the key storage provider, a method for secure storage of cryptographic keys, as well as key access control are proposed. The description of the O’zDst 1092:2009 algorithm and the implementation of the functions of the Key storage provider interface are shown.

Keywords: O’zDSt 1106:2009 hashing algorithm; the O’zDSt 1092:2009 signature algorithm; active directory certificate services; digital certificate; key access control; key storage provider

Alaev Ruhillo, “Applying Custom Algorithms in Windows Active Directory Certificate Services” International Journal of Advanced Computer Science and Applications(IJACSA), 12(7), 2021. http://dx.doi.org/10.14569/IJACSA.2021.0120765

@article{Ruhillo2021,
title = {Applying Custom Algorithms in Windows Active Directory Certificate Services},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2021.0120765},
url = {http://dx.doi.org/10.14569/IJACSA.2021.0120765},
year = {2021},
publisher = {The Science and Information Organization},
volume = {12},
number = {7},
author = {Alaev Ruhillo}
}



Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

IJACSA

Upcoming Conferences

IntelliSys 2025

28-29 August 2025

  • Amsterdam, The Netherlands

Future Technologies Conference 2025

6-7 November 2025

  • Munich, Germany

Healthcare Conference 2026

21-22 May 2026

  • Amsterdam, The Netherlands

Computing Conference 2026

9-10 July 2026

  • London, United Kingdom

IntelliSys 2026

3-4 September 2026

  • Amsterdam, The Netherlands

Computer Vision Conference 2026

15-16 October 2026

  • Berlin, Germany
The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org