earticle

논문검색

Cryptographic Protection of the Information and Algorithms of Enciphering

초록

영어

In order to organize informational security the juridical documents, technical means and
cryptographically algorithms, systematic, apparatus-systematic or apparatus-technical means
are widely used. And with the advent of high-speed digital lines of information transfer
requirements for cryptographic means of enciphering is growing more and more. In cryptosystem based on stream ciphers the entering information is not late in cryptosystem and
it allows developing high-speed cryptographic hardware. Besides generated pseudo-casual
and truly casual sequences it is widely used in cryptosystems for generation of initial values
of confidential parameters and the secret key in the electronic digital signature.
The idea of working out of algorithm EDC was developed using operations of algebra
parameters. Mathematical model of the digital signature, including parts of formation and
the signature check, satisfying to conditions of demanded firmness in a composition of
algorithm of enciphering and existing complexities of calculations are developed.
In this article also methods of estimation crypto stability of stream cipher algorithm of
enciphering and practical results of an estimation of the new developed algorithm are
resulted. Also the criteria of protection documentary, vocal and information video in
information-communication systems and using cryptographic means are given in this article.

목차

Abstract
 1. Introduction
 2. Use of parameter R of the Elliptic Curve as Parameter of Check EDS with Application of Algorithm of Enciphering
 3. Cryptographic protection of the information in information telecommunication systems with application of composite models
  3.1 Cryptographic protection of the information
  3.2 Uses of symmetric algorithms
  3.3. Uses of asymmetric algorithms
 4. Estimation crypto stability of the stream cipher algorithm
  4.1. The developed new stream cipher algorithm
  4.2 Crypto stability of the stream cipher algorithm
 5. Conclusion
 References

저자정보

  • Sattarova Feruza Y. Hannam University
  • Tadjibayev Furkhat A. Lindenwood University, St. Charles, MO, USA
  • Seung-Hwan Jeon Hannam University

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.