KEY SCHEDULE OF BLOCK SYMMETRIC CIPHERS
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2016, Vol 2, Issue 2
Abstract
We investigate combinatorial properties of the block symmetric ciphers key schedule in the assumption that the cyclic (round) keys are generated randomly, with equal probability and independently of each other. The model of random homogeneous substitution is used for an abstract description of this formation. Analytical expressions allow us to estimate the power of implemented encryption-decryption maps set, obtain estimates of the probability properties of round keys sequences and ratios of the average number of different key sequences to power of different master keys set. The simulation results confirm the accuracy and validity of these analytical expressions.
Authors and Affiliations
Alexandr Kuznetsov, Yuriy Gorbenko, Ievgeniia Kolovanova
METHODS OF ENSURING ELECTROMAGNETIC COMPATIBILITY IN MODERN INFORMATION COMMUNICATION SYSTEMS
Requirements are formulated for the choice of complex signals systems – data carriers for use in multi-user broadband telecommunication systems (BTS), which are increased requirements for noise immunity, electromagnetic...
NTRU Prime IIT Ukraine encryption algorithm with consideration known attacks analysis
The paper deals with the modern cryptographic transformations of the asymmetric end-to-end encryption type, namely – NTRU-like cryptographic systems. A new cryptographic system NTRU Prime IIT Ukraine was created based on...
ЗАСТОСУВАННЯ КРИПТОАЛГОРИТМІВ В ДЕЦЕНТРАЛІЗОВАНИХ МЕРЕЖАХ ТА ПЕРСПЕКТИВИ ЇХ ЗАМІНИ ДЛЯ ПОСТКВАНТОВОГО ПЕРІОДУ
В роботі проведено огляд використовуваних у блокчейн системах електронних підписів та функцій хешування. Наведено криптографічні алгоритми, які використовуються або можуть використовуватися в децентралізованих мережах. П...
The method of a data control in the residual system classes based on use of positional attribute of non-positional code structure
The method of a data control in the residue number system (RNS) are developed in the article, which is based on the use of positional attribute of non-positional code structure. The using variants of the proposed method...
ДИСПЕРСИОННЫЙ АНАЛИЗ СЕТЕВОГО ТРАФИКА ДЛЯ ОБНАРУЖЕНИЯ ВТОРЖЕНИЙ В SMART GRIDS
Рассматриваются системы обнаружения и предотвращения вторжений в современных теле-коммуникационных системах и сетях. Исследуются методы мониторинга событий, состоящие в анализе сетевой активности отдельных служб и информ...