Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс: http://repository.hneu.edu.ua/handle/123456789/24834
Полная запись метаданных
Поле DCЗначениеЯзык
dc.contributor.authorKochan R.-
dc.contributor.authorYevseiev S. P.-
dc.contributor.authorKorolyov R. V.-
dc.contributor.authorMilevskyi S. V.-
dc.contributor.authorIreifidzh I.-
dc.contributor.authorGancarczyk T.-
dc.contributor.authorSzklarczyk R.-
dc.date.accessioned2021-03-04T10:13:00Z-
dc.date.available2021-03-04T10:13:00Z-
dc.date.issued2020-
dc.identifier.citationKochan R. Development of Methods for Improving Crypto Transformations in the Block-Symmetric Code / R. Kochan, S. Yevseiev, R. Korolyov et. al. // The 5th IEEE International Symposium on Smart and Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems, 17-18 September, 2020. - Dortmund, Germany, 2020. - Pp. 130-138.ru_RU
dc.identifier.urihttp://repository.hneu.edu.ua/handle/123456789/24834-
dc.description.abstractThe development of modern technologies and the emergence of full-scale quantum computers requires a critical revision of the requirements for the level of algorithms cryptographic stability, both post-quantum cryptography, and used in cyberspace and information and communication systems algorithms of traditional and asymmetric cryptography. The analysis of possible approaches to increase the level of cryptographic stability of symmetric cryptography algorithms based on Feistel chains. One of the promising algorithms of symmetric cryptosystems in the conditions of post-quantum cryptography (post-quantum period) according to experts is the algorithm GOST 28147-2009 (DSTU GOST 28147: 2009, GOST R-3412 - 2015) the main advantages of which is the simplicity of implementation and high level crypto stability. However, in a full-scale quantum computer, the effectiveness of cryptographic information security based on symmetric cryptosystems (their level of crypto-stability) can be called into question by the possibility of an attack based on Grover's algorithm, which is easy to use to find the encryption key by brute-force. Methods of increasing the cryptographic stability of block-symmetric algorithm GOST 28147-2009 (DSTU GOST 28147: 2009, GOST R-3412 - 2015) are proposed by increasing the key sequence (by increasing the length of S-blocks), and / or by increasing the number of S- blocks, which increases the level of crypto stability and counteracts a "brute force" attack based on a quantum computer. To confirm the proposed methods of increasing the level of crypto-stability of the symmetric algorithm GOST 28147-2009 (DSTU GOST 28147: 2009), the results of the complexity of operations in the integer ring, expressed in the operations of the processor, which confirms the possibility of implementation of this algorithm without significant increase in energy consumption elementary group operations).ru_RU
dc.language.isoenru_RU
dc.subjectBlock-Symmetric Coderu_RU
dc.subjectCryptographic Stabilityru_RU
dc.subjectCryptotransformationsru_RU
dc.titleDevelopment of Methods for Improving Crypto Transformations in the Block-Symmetric Coderu_RU
dc.typeArticleru_RU
Располагается в коллекциях:Статті (КІТ)

Файлы этого ресурса:
Файл Описание РазмерФормат 
Yevsiev.pdf1,11 MBAdobe PDFПросмотреть/Открыть


Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.