Будь ласка, використовуйте цей ідентифікатор, щоб цитувати або посилатися на цей матеріал: https://repository.hneu.edu.ua/handle/123456789/24831
Повний запис метаданих
Поле DCЗначенняМова
dc.contributor.authorYevseiev S. P.-
dc.contributor.authorKorolyov R. V.-
dc.contributor.authorTkachov A.-
dc.contributor.authorLaptiev O.-
dc.contributor.authorOpirskyy I.-
dc.contributor.authorSoloviova O.-
dc.date.accessioned2021-03-04T09:24:18Z-
dc.date.available2021-03-04T09:24:18Z-
dc.date.issued2020-
dc.identifier.citationYevseiev S. Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum period / S. Yevseiev, R. Korolyov, A. Tkachov et. al. // International Journal of Advanced Trends in Computer Science and Engineering. - Volume 9. - No.5. - September - October 2020. - Pp. 8725-8729.ru_RU
dc.identifier.urihttp://repository.hneu.edu.ua/handle/123456789/24831-
dc.description.abstractThe entry of mankind into the era of high technology, the rapid growth of computing technology contributes to the expansion of the range of electronic services. To ensure the security of sensitive information, personal data is used cryptographic systems of traditional cryptography (symmetrical cryptosystems) and cryptography with open keys (asymmetric cryptosystems). As a rule, the first provide security services, the second - the distribution of keys. However, in the conditions of totalitarian surveillance in society by the special services of developed countries in cryptographic algorithms "embedded" cryptographic bookmarks, which on the one hand provide "fast" access of special services to confidential information, on the other hand, allow attackers to hack into the cryptosystem and get user data. The article proposes a modification of the wellknown algorithm (OFM) S-box, which provides "elimination" of possible cryptographic bookmarks and increasing crypto resistance in the post-quantum period (the appearance of a full-scale quantum computer, that allows you to hack on the basis of The Grover and Shore algorithms modern symmetrical and asymmetrical cryptosystems). In addition, commercial implementation will ensure the "opposition" of possible crypto-deposits by the special services, that will reduce the risk of hacking by identifying "weak" (vulnerable) places based on cryptographic bookmarks.ru_RU
dc.language.isoenru_RU
dc.subjectSymmetrical crypto-algorithmru_RU
dc.subjectcryptographic bookmarksru_RU
dc.subjectpost quantum periodru_RU
dc.subjecta quantum computerru_RU
dc.titleModification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum periodru_RU
dc.typeArticleru_RU
Розташовується у зібраннях:Статті (КІТ)

Файли цього матеріалу:
Файл Опис РозмірФормат 
India_Scopus_9.pdf146,91 kBAdobe PDFПереглянути/відкрити


Усі матеріали в архіві електронних ресурсів захищені авторським правом, всі права збережені.