Features of Using Large Keys in "Kalyna" Algorithm

The information security is playing an incre- asingly important role nowadays. Therefore, virus can be transmitted through the information in encrypted form. This is also applied to embedded systems. In this regard, the article is assigned to the topic of cryptocurrency pro- tection in embedded syst...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Advances in Cyber-Physical Systems 2022-07, Vol.7 (1), p.55-62
Hauptverfasser: Zaiats, Taras, Bilenko, Volodymyr, Hlukhov, Valerii
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The information security is playing an incre- asingly important role nowadays. Therefore, virus can be transmitted through the information in encrypted form. This is also applied to embedded systems. In this regard, the article is assigned to the topic of cryptocurrency pro- tection in embedded systems. The article is focused on the algorithm of symmetric block transformation "Kalyna". The algorithm has been developed in cooperation with the State Special Communications Service and leading Ukrainian scientists. The experience and results of interna- tional and open national competition of cryptographic algorithms have been taken into account. The algorithm is intended for gradual replacement of the interstate standard DSTU GOST 28147: 2009. Its differences from other data encryption standards used, both in Ukraine and in the world, have been ana- lyzed. The stability of the "Kalyna" algorithm has been also analyzed using a high-bit key (512 bits) and its speed has been compared with other cryptographic protection algorithms.
ISSN:2524-0382
2707-2371
DOI:10.23939/acps2022.01.055