Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Ardabek Khompysh"'
Publikováno v:
Scientific Journal of Astana IT University, Pp 107-119 (2024)
One of the most important issues in the design of cryptographic algorithms is studying their cryptographic strength. Among the factors determining the reliability of cryptographic algorithms, a good pseudorandom sequence generator, which is used for
Externí odkaz:
https://doaj.org/article/95df9b56189b4f04b1dcfc5c10655572
Publikováno v:
Scientific Journal of Astana IT University, Vol 12, Pp 81-88 (2022)
This article presents one of the main transformations of symmetric block ciphers used to protect confidential information, a new method for obtaining a non-linear S block, and an analysis of the results obtained. The S-box obtained by this method can
Externí odkaz:
https://doaj.org/article/dbeacd4e7d31402685cccab4959df994
Publikováno v:
Computers, Vol 13, Iss 1, p 26 (2024)
The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used. This means that if the
Externí odkaz:
https://doaj.org/article/b4db2549d71e48c39f8660fb27cd064e
Publikováno v:
Cogent Engineering, Vol 9, Iss 1 (2022)
This paper considers a new method for obtaining an S-box, which is one of the nonlinear transformations used in modern block-symmetric cipher systems. This method is based on modular arithmetic, that is, exponentiation modulo polynomial in extended G
Externí odkaz:
https://doaj.org/article/d00f1f4f73a24c59b4d6d33df3d6c06a
Publikováno v:
Cogent Engineering, Vol 7, Iss 1 (2020)
This paper proposes a new block encryption algorithm for cryptographic information protection. It describes a new transformation method EM (Exponentiation Module), which is part of the algorithm, and a method of S-box obtaining. The paper also consid
Externí odkaz:
https://doaj.org/article/b0190c2d9c0242b6915b6c977e5f4ff1
Autor:
Kairat Sakan, Saule Nyssanbayeva, Nursulu Kapalova, Kunbolat Algazy, Ardabek Khompysh, Dilmukhanbet Dyusenbayev
Publikováno v:
Eastern-European Journal of Enterprise Technologies; Vol. 2 No. 9 (116) (2022): Information and controlling system; 60-73
Eastern-European Journal of Enterprise Technologies; Том 2 № 9 (116) (2022): Інформаційно-керуючі системи; 60-73
Eastern-European Journal of Enterprise Technologies; Том 2 № 9 (116) (2022): Інформаційно-керуючі системи; 60-73
This paper proposes the new hash algorithm HBC-256 (Hash based on Block Cipher) based on the symmetric block cipher of the CF (Compression Function). The algorithm is based on the wipe-pipe construct, a modified version of the Merkle-Damgard construc
Publikováno v:
Cogent Engineering, Vol 7, Iss 1 (2020)
This paper proposes a new block encryption algorithm for cryptographic information protection. It describes a new transformation method EM (Exponentiation Module), which is part of the algorithm, and a method of S-box obtaining. The paper also consid