Testing the speed of modern stream ciphers
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2018, Vol 3, Issue 11
Abstract
The paper is a continuation of numerous studies of a candidate for encryption national standard of Ukraine, the Strumok new symmetric stream cipher. The result of a study is compare the most famous algorithms of stream cipher, which were presented at various contests, such as eSTREAM, NESSIE and the AES symmetric block cipher in mode of stream about usage CPU time for transformation of one octet data.
Authors and Affiliations
Ivan Gorbenko, Yurii Gorbenko, Vladyslav Tymchenko, Olena Kachko
МЕТОДЫ ФОРМИРОВАНИЯ И ОБРАБОТКИ OFDM СИГНАЛОВ В СОВРЕМЕННЫХ БЕСПРОВОДНЫХ ДИСКРЕТНЫХ КОММУНИКАЦИОННЫХ СИСТЕМАХ
Рассмотрены технологии формирования сигналов, используемых в системах связи и телекоммуникаций, а также приводится краткий анализ перспективных технологий, которые могут найти применение в беспроводных системах связи шир...
Essence and conditions of implementation of the attack based on related keys relatively electronic signatures IBS-1 and IBS-2 DSTU ISO/IEC 14888-3
The paper deals with the state of protection electronic signatures based on the pairing of points of an elliptic curve against attacks based on the signing data with related keys. It is defined conditions and possibiliti...
Investigation of geometry of placement of points of pseudo-random codes in Euclidean space
Analysis of the reasons of crisis of error-correcting coding. Grounded prospects for application of pseudorandom codes and developed their mathematical model. Considered comparative probabilistic characteristics of equal...
Principles of formation, processing and properties of OFDM signals
The article discusses the technology of forming signals used in mobile, information and telecommunication systems, and also provides an analysis of promising technologies that can be used in wireless communication system...
KEY SCHEDULE OF BLOCK SYMMETRIC CIPHERS
We investigate combinatorial properties of the block symmetric ciphers key schedule in the assumption that the cyclic (round) keys are generated randomly, with equal probability and independently of each other. The model...