원문정보
초록
영어
In order to organize informational security the juridical documents, technical means and
cryptographically algorithms, systematic, apparatus-systematic or apparatus-technical means
are widely used. And with the advent of high-speed digital lines of information transfer
requirements for cryptographic means of enciphering is growing more and more. In cryptosystem based on stream ciphers the entering information is not late in cryptosystem and
it allows developing high-speed cryptographic hardware. Besides generated pseudo-casual
and truly casual sequences it is widely used in cryptosystems for generation of initial values
of confidential parameters and the secret key in the electronic digital signature.
The idea of working out of algorithm EDC was developed using operations of algebra
parameters. Mathematical model of the digital signature, including parts of formation and
the signature check, satisfying to conditions of demanded firmness in a composition of
algorithm of enciphering and existing complexities of calculations are developed.
In this article also methods of estimation crypto stability of stream cipher algorithm of
enciphering and practical results of an estimation of the new developed algorithm are
resulted. Also the criteria of protection documentary, vocal and information video in
information-communication systems and using cryptographic means are given in this article.
목차
1. Introduction
2. Use of parameter R of the Elliptic Curve as Parameter of Check EDS with Application of Algorithm of Enciphering
3. Cryptographic protection of the information in information telecommunication systems with application of composite models
3.1 Cryptographic protection of the information
3.2 Uses of symmetric algorithms
3.3. Uses of asymmetric algorithms
4. Estimation crypto stability of the stream cipher algorithm
4.1. The developed new stream cipher algorithm
4.2 Crypto stability of the stream cipher algorithm
5. Conclusion
References