Sattarova Feruza Y., Tadjibayev Furkhat A., Seung-Hwan Jeon
언어
영어(ENG)
URL
https://www.earticle.net/Article/A114055
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
원문정보
초록
영어
In order to organize informational security the juridical documents, technical means and cryptographically algorithms, systematic, apparatus-systematic or apparatus-technical means are widely used. And with the advent of high-speed digital lines of information transfer requirements for cryptographic means of enciphering is growing more and more. In cryptosystem based on stream ciphers the entering information is not late in cryptosystem and it allows developing high-speed cryptographic hardware. Besides generated pseudo-casual and truly casual sequences it is widely used in cryptosystems for generation of initial values of confidential parameters and the secret key in the electronic digital signature. The idea of working out of algorithm EDC was developed using operations of algebra parameters. Mathematical model of the digital signature, including parts of formation and the signature check, satisfying to conditions of demanded firmness in a composition of algorithm of enciphering and existing complexities of calculations are developed. In this article also methods of estimation crypto stability of stream cipher algorithm of enciphering and practical results of an estimation of the new developed algorithm are resulted. Also the criteria of protection documentary, vocal and information video in information-communication systems and using cryptographic means are given in this article.
목차
Abstract 1. Introduction 2. Use of parameter R of the Elliptic Curve as Parameter of Check EDS with Application of Algorithm of Enciphering 3. Cryptographic protection of the information in information telecommunication systems with application of composite models 3.1 Cryptographic protection of the information 3.2 Uses of symmetric algorithms 3.3. Uses of asymmetric algorithms 4. Estimation crypto stability of the stream cipher algorithm 4.1. The developed new stream cipher algorithm 4.2 Crypto stability of the stream cipher algorithm 5. Conclusion References
저자
Sattarova Feruza Y. [ Hannam University ]
Tadjibayev Furkhat A. [ Lindenwood University, St. Charles, MO, USA ]
보안공학연구지원센터(IJHIT) [Science & Engineering Research Support Center, Republic of Korea(IJHIT)]
설립연도
2006
분야
공학>컴퓨터학
소개
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업
간행물
간행물명
International Journal of Hybrid Information Technology
간기
격월간
pISSN
1738-9968
수록기간
2008~2016
십진분류
KDC 505DDC 605
이 권호 내 다른 논문 / International Journal of Hybrid Information Technology Vol.2 No.4