Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс:
http://repository.hneu.edu.ua/handle/123456789/24831
Название: | Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum period |
Авторы: | Yevseiev S. P. Korolyov R. V. Tkachov A. Laptiev O. Opirskyy I. Soloviova O. |
Ключевые слова: | Symmetrical crypto-algorithm cryptographic bookmarks post quantum period a quantum computer |
Дата публикации: | 2020 |
Библиографическое описание: | Yevseiev S. Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum period / S. Yevseiev, R. Korolyov, A. Tkachov et. al. // International Journal of Advanced Trends in Computer Science and Engineering. - Volume 9. - No.5. - September - October 2020. - Pp. 8725-8729. |
Краткий осмотр (реферат): | The entry of mankind into the era of high technology, the rapid growth of computing technology contributes to the expansion of the range of electronic services. To ensure the security of sensitive information, personal data is used cryptographic systems of traditional cryptography (symmetrical cryptosystems) and cryptography with open keys (asymmetric cryptosystems). As a rule, the first provide security services, the second - the distribution of keys. However, in the conditions of totalitarian surveillance in society by the special services of developed countries in cryptographic algorithms "embedded" cryptographic bookmarks, which on the one hand provide "fast" access of special services to confidential information, on the other hand, allow attackers to hack into the cryptosystem and get user data. The article proposes a modification of the wellknown algorithm (OFM) S-box, which provides "elimination" of possible cryptographic bookmarks and increasing crypto resistance in the post-quantum period (the appearance of a full-scale quantum computer, that allows you to hack on the basis of The Grover and Shore algorithms modern symmetrical and asymmetrical cryptosystems). In addition, commercial implementation will ensure the "opposition" of possible crypto-deposits by the special services, that will reduce the risk of hacking by identifying "weak" (vulnerable) places based on cryptographic bookmarks. |
URI (Унифицированный идентификатор ресурса): | http://repository.hneu.edu.ua/handle/123456789/24831 |
Располагается в коллекциях: | Статті (КІТ) |
Файлы этого ресурса:
Файл | Описание | Размер | Формат | |
---|---|---|---|---|
India_Scopus_9.pdf | 146,91 kB | Adobe PDF | Просмотреть/Открыть |
Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.