Features of Using Large Keys in "Kalyna" Algorithm
The information security is playing an incre- asingly important role nowadays. Therefore, virus can be transmitted through the information in encrypted form. This is also applied to embedded systems. In this regard, the article is assigned to the topic of cryptocurrency pro- tection in embedded syst...
Gespeichert in:
Veröffentlicht in: | Advances in Cyber-Physical Systems 2022-07, Vol.7 (1), p.55-62 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The information security is playing an incre- asingly important role nowadays. Therefore, virus can be transmitted through the information in encrypted form. This is also applied to embedded systems. In this regard, the article is assigned to the topic of cryptocurrency pro- tection in embedded systems. The article is focused on the algorithm of symmetric block transformation "Kalyna". The algorithm has been developed in cooperation with the State Special Communications Service and leading Ukrainian scientists. The experience and results of interna- tional and open national competition of cryptographic algorithms have been taken into account. The algorithm is intended for gradual replacement of the interstate standard DSTU GOST 28147: 2009. Its differences from other data encryption standards used, both in Ukraine and in the world, have been ana- lyzed. The stability of the "Kalyna" algorithm has been also analyzed using a high-bit key (512 bits) and its speed has been compared with other cryptographic protection algorithms. |
---|---|
ISSN: | 2524-0382 2707-2371 |
DOI: | 10.23939/acps2022.01.055 |