Please use this identifier to cite or link to this item:
http://repositsc.nuczu.edu.ua/handle/123456789/22445
Title: | The implementation of strict stable cryptographic coding operations |
Authors: | Пустовіт, Михайло Олександрович Рудницький, Володимир Миколайович Мельник, Ольга Григорівна Опірський, Іван |
Keywords: | information security; cryptographic algorithm; cryptographic coding operations; strict robust coding |
Issue Date: | 15-Jul-2019 |
Publisher: | Національний технічний університет «Харківський політехнічний інститут» |
Citation: | Advanced Information Systems |
Series/Report no.: | 3;3 |
Abstract: | According to the results of the study, it was established that the implementation of strict, stable cryptographic coding operations at the hardware and software levels does not cause difficulties, and in its simplicity and speed of implementation meets the requirements for implementation in stream encryption systems. Installed features and differences in various embodiments. In the hardware implementation, permutations will be performed between the bits to be processed, and in the software implementation, between the bits of the bytes of the same name that are processed. Regardless of the implementation option, according to the results of the operation, exactly half of the bits that took part in the conversion will be inverted, which ensures the maximum uncertainty of the encryption results |
URI: | http://repositsc.nuczu.edu.ua/handle/123456789/22445 |
ISSN: | 2522-9052 |
Appears in Collections: | ЧІПБ ім. Героїв Чорнобиля |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
THE IMPLEMENTATION OF STRICT STABLE CRYPTOGRAPHIC.pdf | 262,86 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.