Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс: http://repository.hneu.edu.ua/handle/123456789/24831
Полная запись метаданных
Поле DCЗначениеЯзык
dc.contributor.authorYevseiev S. P.-
dc.contributor.authorKorolyov R. V.-
dc.contributor.authorTkachov A.-
dc.contributor.authorLaptiev O.-
dc.contributor.authorOpirskyy I.-
dc.contributor.authorSoloviova O.-
dc.date.accessioned2021-03-04T09:24:18Z-
dc.date.available2021-03-04T09:24:18Z-
dc.date.issued2020-
dc.identifier.citationYevseiev S. Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum period / S. Yevseiev, R. Korolyov, A. Tkachov et. al. // International Journal of Advanced Trends in Computer Science and Engineering. - Volume 9. - No.5. - September - October 2020. - Pp. 8725-8729.ru_RU
dc.identifier.urihttp://repository.hneu.edu.ua/handle/123456789/24831-
dc.description.abstractThe entry of mankind into the era of high technology, the rapid growth of computing technology contributes to the expansion of the range of electronic services. To ensure the security of sensitive information, personal data is used cryptographic systems of traditional cryptography (symmetrical cryptosystems) and cryptography with open keys (asymmetric cryptosystems). As a rule, the first provide security services, the second - the distribution of keys. However, in the conditions of totalitarian surveillance in society by the special services of developed countries in cryptographic algorithms "embedded" cryptographic bookmarks, which on the one hand provide "fast" access of special services to confidential information, on the other hand, allow attackers to hack into the cryptosystem and get user data. The article proposes a modification of the wellknown algorithm (OFM) S-box, which provides "elimination" of possible cryptographic bookmarks and increasing crypto resistance in the post-quantum period (the appearance of a full-scale quantum computer, that allows you to hack on the basis of The Grover and Shore algorithms modern symmetrical and asymmetrical cryptosystems). In addition, commercial implementation will ensure the "opposition" of possible crypto-deposits by the special services, that will reduce the risk of hacking by identifying "weak" (vulnerable) places based on cryptographic bookmarks.ru_RU
dc.language.isoenru_RU
dc.subjectSymmetrical crypto-algorithmru_RU
dc.subjectcryptographic bookmarksru_RU
dc.subjectpost quantum periodru_RU
dc.subjecta quantum computerru_RU
dc.titleModification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum periodru_RU
dc.typeArticleru_RU
Располагается в коллекциях:Статті (КІТ)

Файлы этого ресурса:
Файл Описание РазмерФормат 
India_Scopus_9.pdf146,91 kBAdobe PDFПросмотреть/Открыть


Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.