2025-02-23T00:12:52-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22mcmtechkpnueduua-article-112020%22&qt=morelikethis&rows=5
2025-02-23T00:12:52-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22mcmtechkpnueduua-article-112020%22&qt=morelikethis&rows=5
2025-02-23T00:12:52-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-23T00:12:52-05:00 DEBUG: Deserialized SOLR response

Оптимізація перспективних алгоритмів симетричного блочного перетворення по критеріям швидкодії і стійкості

The principles of construction Rijndael cipher, used by developers that allow this cipher take a leading position in technology design and development of block symmetric ciphers. As a second progressive development marked cipher IDEA NXT. The results of the analysis of the prospects of the decisions...

Full description

Saved in:
Bibliographic Details
Main Author: Лисицький, Костянтин Євгенійович
Format: Article
Language:Ukrainian
Published: Kamianets-Podilskyi National Ivan Ohiienko University 2017
Online Access:http://mcm-tech.kpnu.edu.ua/article/view/112020
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The principles of construction Rijndael cipher, used by developers that allow this cipher take a leading position in technology design and development of block symmetric ciphers. As a second progressive development marked cipher IDEA NXT. The results of the analysis of the prospects of the decisions taken in these developments. It is noted that in spite of their novelty and achieved high performance solutions considered, studies conducted in recent years indicate the possibility of further improvement, the possibility of building a better design encryption transformation. These features included in the proposed new design concept of block symmetric cipher that is based on a number of provisions put forward. Its implementation is demonstrated by the example of the development of a new cipher designs and modifications, based on the principles of controlled use pidstanovlyuvalnyh change. The design of the simplicity and transparency of decisions in terms of evidence-based resistance to attack by differential and linear cryptanalysis, and in terms of performance is not inferior to the acknowledged leader of technology block symmetric encryption cipher Rijndael (AES), and the dynamics coming cipher to a state of random permutation they are superior to almost all known solutions.