The algebraic immunity of nonlinear nodes symmetric ciphers
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2016, Vol 4, Issue 4
Abstract
Researched methods for computing algebraic immunity cryptographic Boolean functions and nonlinear knots of replacements (substitutions) of symmetric ciphers. The presented results of a comparative analysis algebraic immunity of non-linear nodes of symmetric ciphers.
Authors and Affiliations
Alexandr Kuznetsov, Yuriy Gorbenko, Ivan Belozertsev, Alina Andrushkevich, Aleksey Naregniy
IMPLEMENTING NTRU-similar ALGORITHM ON THE BASIS OF NTRUPrime
The modern attacks uses special structures of the rings in the NTRU similar algorithms. The article was proposed post-quantum parameters NTRUPrime without these structures. Have investigated the possibility of using th...
“Strumok” stream cipher
This work presents the main developing results of a new keystream generator, which named “Strumok”, and offered as a candidate for the national symmetric encryption standard of Ukraine. “Strumok” is built on SNOW 2.0-lik...
Code based fuzzy extractor for biometric keys
In this paper methods of forming cryptographic keys from biometric images using fuzzy extractors are considered. A new scheme of a fuzzy extractor based on the McEliece cryptosystem is proposed. It is shown that the new...
THE METHOD OF PSEUDORANDOM CODES DECODING ON THE BASIS OF THE MODIFIED METHOD OF BRANCHES AND BOUNDARIES
Reasons of crisis of error-correcting coding are considered. Underlined the urgency of application of pseudo random codes in modern systems transmission of information. Presented constructive mathematical method of decod...
ЗАСТОСУВАННЯ КРИПТОАЛГОРИТМІВ В ДЕЦЕНТРАЛІЗОВАНИХ МЕРЕЖАХ ТА ПЕРСПЕКТИВИ ЇХ ЗАМІНИ ДЛЯ ПОСТКВАНТОВОГО ПЕРІОДУ
В роботі проведено огляд використовуваних у блокчейн системах електронних підписів та функцій хешування. Наведено криптографічні алгоритми, які використовуються або можуть використовуватися в децентралізованих мережах. П...