ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

The analysis of symmetric cryptographic algorithms of data from the point of view of a possibility of their polymorphic implementation

Journal: Scientific review, Науковий огляд, Научное обозрение (Vol.26, No. 5)

Publication Date:

Authors : ;

Page : 142-149

Keywords : symmetric cryptographic algorithm of data; secret key; reconstruction of key elements; differential analysis; polymorphic implementation; stochasticity; cycle;

Source : Downloadexternal Find it from : Google Scholarexternal


The conducted researches, the opportunities of use of program polymorphism for protection of key elements of cryptographic algorithms of the symmetric encoding against unauthorized reconstruction directed to study by results of measurement and the analysis of dynamics of consuming of power in the course of execution of these algorithms on microcontrollers and smart cards, and also development of methods of implementation of polymorphism with their specification for GOST 28.147-89 standardized in Ukraine and the international standard of new generation of Rijndael. The method of implementation of polymorphism at the level of processed units in combination with polymorphism of program implementation of processing of one unit is considered.

Last modified: 2016-07-02 18:00:54