“Strumok” stream cipher
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2018, Vol 1, Issue 9
Abstract
This work presents the main developing results of a new keystream generator, which named “Strumok”, and offered as a candidate for the national symmetric encryption standard of Ukraine. “Strumok” is built on SNOW 2.0-likes schema of the summation generator. Increased secret key length and the initialization vector allow using reliably the stream cipher even taking into account quantum cryptographic analysis methods. Unlike SNOW 2.0, Strumok is designed for use in more powerful 64-bit computing systems. The conducted comparative tests have shown that the “Strumok” on 32-bit computing systems also shows good performance results. There are basic transformation and individual results from the cipher performance research, here is it is shown the generator, which is capable of forming a keystream at speeds exceed of 10 Gbit per sec.
Authors and Affiliations
Ivan Gorbenko, Alexandr Kuznetsov, Yurii Gorbenko, Anton Alekseychuk, Vlad Tymchenko
Hiding data in the file structure
In this paper, the methods of steganography hiding of information in a file system structure is investigated. Namely, the structure of the FAT file system (File Allocation Table) and methods of hiding information message...
The data model "object-event": requirements and synthesis of the model
Requirements imposed to the developed data model are formulated based on the need to find new solutions of the actual problem of timely creation, modernization within the planned budget of databases that have the require...
METHODS OF ENSURING ELECTROMAGNETIC COMPATIBILITY IN MODERN INFORMATION COMMUNICATION SYSTEMS
Requirements are formulated for the choice of complex signals systems – data carriers for use in multi-user broadband telecommunication systems (BTS), which are increased requirements for noise immunity, electromagnetic...
PRACTICAL CLASSIFICATION TOPOLOGICAL STRUCTURES OF COMMUNICATION NETWORKS FOR MULTIPROCESSOR COMPUTER SYSTEMS
Proposed by the working version of practical classification topological structures of communication networks for multiprocessor computer systems. Any n-dimensional non-full mesh structure presented here as the result of...
Code-based schemes for digital signatures
This article is devoted to the features of construction and use of electronic digital signature schemes based on the use of error-correcting codes, namely the most common scheme, which is based on this approach, CFS and...