MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY
The algorithms of the exchange of encryption keys between users of computer networks and cryptographic protection of information transmitted over open communications channels. The algorithm is based a modified asymmetric protocol Diffie-Hellman (DH). The essence of the modification amounts to the re...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Kherson State University
2010-07-01
|
Series: | Ìnformacìjnì Tehnologìï v Osvìtì |
Subjects: | |
Online Access: | http://ite.kspu.edu/webfm_send/689 |
id |
doaj-4f1f1dd220174bc1bc89a711a9b5f508 |
---|---|
record_format |
Article |
spelling |
doaj-4f1f1dd220174bc1bc89a711a9b5f5082020-11-24T22:39:57ZengKherson State UniversityÌnformacìjnì Tehnologìï v Osvìtì1998-69392306-17072010-07-017156165MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEYA. BeletskyD. StecenkoThe algorithms of the exchange of encryption keys between users of computer networks and cryptographic protection of information transmitted over open communications channels. The algorithm is based a modified asymmetric protocol Diffie-Hellman (DH). The essence of the modification amounts to the replacement of large prime numbers algorithm DH guaranteed nonsingular n-complete binary matrices of high order. The methods of synthesis of these matrices. Discussed ways to counter attacks on the encryption algorithm.http://ite.kspu.edu/webfm_send/689a cryptographic algorithmdata encryptionprimitive binary matrices |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
A. Beletsky D. Stecenko |
spellingShingle |
A. Beletsky D. Stecenko MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY Ìnformacìjnì Tehnologìï v Osvìtì a cryptographic algorithm data encryption primitive binary matrices |
author_facet |
A. Beletsky D. Stecenko |
author_sort |
A. Beletsky |
title |
MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY |
title_short |
MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY |
title_full |
MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY |
title_fullStr |
MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY |
title_full_unstemmed |
MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY |
title_sort |
matrix algorithms of encryptic protection of information and exchange of encryption key |
publisher |
Kherson State University |
series |
Ìnformacìjnì Tehnologìï v Osvìtì |
issn |
1998-6939 2306-1707 |
publishDate |
2010-07-01 |
description |
The algorithms of the exchange of encryption keys between users of computer networks and cryptographic protection of information transmitted over open communications channels. The algorithm is based a modified asymmetric protocol Diffie-Hellman (DH). The essence of the modification amounts to the replacement of large prime numbers algorithm DH guaranteed nonsingular n-complete binary matrices of high order. The methods of synthesis of these matrices. Discussed ways to counter attacks on the encryption algorithm. |
topic |
a cryptographic algorithm data encryption primitive binary matrices |
url |
http://ite.kspu.edu/webfm_send/689 |
work_keys_str_mv |
AT abeletsky matrixalgorithmsofencrypticprotectionofinformationandexchangeofencryptionkey AT dstecenko matrixalgorithmsofencrypticprotectionofinformationandexchangeofencryptionkey |
_version_ |
1725706779757641728 |