Информация о публикации

Просмотр записей
Инд. авторы: Rakitskiy A., Chusovitin A.R.
Заглавие: Efficient stream cipher with theoretically proven properties
Библ. ссылка: Rakitskiy A., Chusovitin A.R. Efficient stream cipher with theoretically proven properties // Труды 14 Междунар. науч.-техн. конф. «Актуальные проблемы электронного приборостроения». - 2018. - Ч.4. - Т.1. - Новосибирск: Изд-во НГТУ. - С.524-526. - ISBN: 978-5-7782-3614-1.
Внешние системы: DOI: 10.1109/APEIE.2018.8545405; РИНЦ: 37313971; SCOPUS: 2-s2.0-85060180657;
Реферат: eng: In this paper we present the new stream cipher based on the Shannon's algorithm, which cryptographic properties have been theoretically proved in 2016 by B. Ryabko. Here we describe the method of applying this algorithm for stream encryption in modern information systems. In addition, the paper presents the results of an experimental study of cryptographic properties of the practical implementation of this method. © 2018 IEEE.
Ключевые слова: Cryptography; Stream Ciphers; Shannon; Cryptographic properties; book stack; Information theory; Electronics industry; stream cipher; information theory; Cryptography; book stack;
Издано: 2018
Физ. характеристика: с.524-526
Конференция: Название: 14 Международная научно-техническая конференция «Актуальные проблемы электронного приборостроения»
Аббревиатура: АПЭП–2018
Город: Новосибирск
Страна: Россия
Даты проведения: 2018-10-02 - 2018-10-06
Цитирование:
1. T. Dierks; E. Rescorla (August 2008). "The Transport Layer Security (TLS) Protocol, Version 1.2 URL: https://tools.ietf.org/html/rfc5246
2. Bakut P.A., Djulina J.V., Ivantchuk N.A. Detection of the moving objects/ Edited by. P.A. Bakut. - M.: Soviet Radio, 1980. - 288 p. (in Russian).
3. Shannon C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656-715 (1949).
4. Ryabko, B. (2018). Properties of two Shannon's ciphers. Designs, Codes and Cryptography, 86(5), 989-995.
5. Bassham III, L. E., Rukhin, A. L., Soto, J., Nechvatal, J. R., Smid, M. E., Barker, E. B.,.. & Heckert, N. A. (2010). Sp 800-22 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications.
6. B. Ya. Ryabko, A. I. Pestunov, ““Book Stack” as a New Statistical Test for Random Numbers”, Probl. Peredachi Inf., 40:1 (2004), 73-78; Problems Inform. Transmission, 40:1 (2004), 66-71
7. Diffie W., Hellman M.E.: Privacy and authentication: an introduction to cryptography. Proc. IEEE 67(3), 397-427 (1979).
8. Rivest, R. (1996). Rc4. Applied Cryptography by B. Schneier, John Wiley and Sons, New York.