The analysis of symmetric cryptographic algorithms of data from the point of view of a possibility of their polymorphic implementation
Journal: Scientific review, Науковий огляд, Научное обозрение (Vol.26, No. 5)Publication Date: 2016-07-02
Authors : Hryn Y. V.;
Page : 142-149
Keywords : symmetric cryptographic algorithm of data; secret key; reconstruction of key elements; differential analysis; polymorphic implementation; stochasticity; cycle;
Abstract
The conducted researches, the opportunities of use of program polymorphism for protection of key elements of cryptographic algorithms of the symmetric encoding against unauthorized reconstruction directed to study by results of measurement and the analysis of dynamics of consuming of power in the course of execution of these algorithms on microcontrollers and smart cards, and also development of methods of implementation of polymorphism with their specification for GOST 28.147-89 standardized in Ukraine and the international standard of new generation of Rijndael. The method of implementation of polymorphism at the level of processed units in combination with polymorphism of program implementation of processing of one unit is considered.
Other Latest Articles
- Next Generation Firewall in Modern Network Security
- Security issues in MANET and Counter-Measures
- A New Security Architecture for Privacy-Preserving Aggregation and Access Control in Smart Grids
- Design of digital blocks with minimum energy consumption
- THE STUDY OF NEWLY SYNTHESIZED SAPONITE ? BASED NANOCOMPOSITES INFLUENCEON THE BIOLUMINESCENT BACTERIA DEVELOPMENT
Last modified: 2016-07-02 18:00:54