Testing the speed of modern stream ciphers
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2018, Vol 3, Issue 11
Abstract
The paper is a continuation of numerous studies of a candidate for encryption national standard of Ukraine, the Strumok new symmetric stream cipher. The result of a study is compare the most famous algorithms of stream cipher, which were presented at various contests, such as eSTREAM, NESSIE and the AES symmetric block cipher in mode of stream about usage CPU time for transformation of one octet data.
Authors and Affiliations
Ivan Gorbenko, Yurii Gorbenko, Vladyslav Tymchenko, Olena Kachko
IMPLEMENTING NTRU-similar ALGORITHM ON THE BASIS OF NTRUPrime
The modern attacks uses special structures of the rings in the NTRU similar algorithms. The article was proposed post-quantum parameters NTRUPrime without these structures. Have investigated the possibility of using th...
Methods and results of electronic signatures with appendix and message recovery comparative analysis
The paper deals with the comparative analysis methods of electronic signature mechanisms properties. The existing methods of comparative analysis of electronic signatures based on expert estimations methods – analytic hi...
RESEARCH ALGORITHM OF HIDE THE SPEECH MESSAGING BASED ON THE SPREAD SPECTRUM METHOD
In the work the approach, which makes it possible to modify the method of expanding the spectrum for the realization of the reserved coding of voice communication in vocal data, is proposed. The results of investigating...
АВТОМАТИЗОВАНИЙ ПОШУК ВРАЗЛИВОСТЕЙ ПРОГРАМНОГО ЗАБЕЗПЕЧЕННЯ ІЗ ЗАСТОСУВАННЯМ МЕТОДІВ ГЛИБИННОГО НАВЧАННЯ
Наведено теоретичну інформацію про тестування програмного забезпечення методом фаззінгу. Розглянуто технології навчання з підкріпленням та використання інтелектуального фаззінгу в процесі тес-тування програмного забезпеч...
ALGEBRAIC IMMUNITY OF SYMMETRIC CIPHERS
A key component of modern symmetric ciphers are nonlinear blocks (non-linear substitutions, substitution tables, S-boxes) that perform functions of hiding statistical links of plaintext and ciphertext, mixing and dissemi...