Establishing systems secure from research with implementation in encryption algorithms


Тип публикации: статья из журнала

Год издания: 2018

Идентификатор DOI: 10.6633/IJNS.201801.20(1).05

Ключевые слова: Block ciphers, Cryptography, Indistinguishability, Researcher model

Аннотация: Systems that have a complex technical implementation usually contain many vulnerabilities which cannot be found at the development stage. Security of complex sys- tems can be improved by protecting them from external research. When the operating algorithm of a system re- mains concealed then it will be more difficult to compromise Показать полностьюthe system. The present paper reviews a method of modeling information systems, which allows formalizing the amount of information obtained by a researcher. Two methods of establishing systems protected from research are presented. One method is related to complicating the algorithms and the other one is related to their multiplication. Implementation in encryption systems proves fulfillment of cipher security conditions with their modification. Experimental study of the obtained encryptor demonstrated its effectiveness in protecting from many existing types of attacks aimed at block cipher algorithms. © The Japan Society for Analytical Chemistry.

Ссылки на полный текст


Журнал: International Journal of Network Security

Выпуск журнала: Vol. 20, Is. 1

Номера страниц: 35-40

ISSN журнала: 1816353X

Издатель: Femto Technique Co., Ltd.


  • Styugin M. (Research Department Siberian State Aerospace University, Department of Applied Mathematics and Computer Security, Siberian Federal University, Krasnoyarsk, Russian Federation)

Вхождение в базы данных