Будь ласка, використовуйте цей ідентифікатор, щоб цитувати або посилатися на цей матеріал:
http://repositsc.nuczu.edu.ua/handle/123456789/21409
Повний запис метаданих
Поле DC | Значення | Мова |
---|---|---|
dc.contributor.author | Мельник, Ольга Григорівна | - |
dc.contributor.author | Рудницький, Володимир Миколайович | - |
dc.contributor.author | Лада, Наталія Володимирівна | - |
dc.contributor.author | Почебут, Максим | - |
dc.contributor.author | Тарасенко, Ярослав Володимирович | - |
dc.date.accessioned | 2024-10-30T10:06:28Z | - |
dc.date.available | 2024-10-30T10:06:28Z | - |
dc.date.issued | 2023-10-13 | - |
dc.identifier.citation | 13th International Conference on Dependable Systems, Services and Technologies (DESSERT) | uk_UA |
dc.identifier.uri | http://repositsc.nuczu.edu.ua/handle/123456789/21409 | - |
dc.description.abstract | The article is devoted to the study of the cryptographic algorithms’ correctness, symmetry and quality, as well as to the analysis of ways to increase the cryptographic strength of low-resource cryptographic algorithms based on overcoming the contradiction between the quality of the information blocks transformation and the statistical characteristics of the encryption results. Basing on the formalization of the requirements for the cryptographic algorithm’s correctness, the cryptographic algorithms’ classification is detailed through the processes of direct and inverse transformation, as well as the keys for direct and inverse transformation of information. The causes of the contradiction appearance between the quality of the information blocks transformation and the statistical characteristics of the encryption results, as well as the ways to overcome it, are described and discussed. The conclusion is made about the expediency of additional XOR ciphering of the key sequence. The possibility of increasing the key of a low-resource cryptographic algorithm due to additional XOR ciphering in the encryption process is demonstrated and discussed. Alternative ways of increasing the cryptographic algorithms’ cryptographic strength based on key management are considered. | uk_UA |
dc.language.iso | en | uk_UA |
dc.subject | lightweight cryptography , low-resource cryptographic algorithms , operations’conversion , block cipher , stream encryption , CET-operations | uk_UA |
dc.title | Increasing the cryptographic strength of CETencryption by ensuring the transformation quality of the information block | uk_UA |
Розташовується у зібраннях: | ЧІПБ ім. Героїв Чорнобиля |
Файли цього матеріалу:
Файл | Опис | Розмір | Формат | |
---|---|---|---|---|
1.pdf | 385,55 kB | Adobe PDF | Переглянути/Відкрити |
Усі матеріали в архіві електронних ресурсів захищені авторським правом, всі права збережені.