MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY

The algorithms of the exchange of encryption keys between users of computer networks and cryptographic protection of information transmitted over open communications channels. The algorithm is based a modified asymmetric protocol Diffie-Hellman (DH). The essence of the modification amounts to the re...

Full description

Bibliographic Details
Main Authors: A. Beletsky, D. Stecenko
Format: Article
Language:English
Published: Kherson State University 2010-07-01
Series:Ìnformacìjnì Tehnologìï v Osvìtì
Subjects:
Online Access:http://ite.kspu.edu/webfm_send/689
id doaj-4f1f1dd220174bc1bc89a711a9b5f508
record_format Article
spelling doaj-4f1f1dd220174bc1bc89a711a9b5f5082020-11-24T22:39:57ZengKherson State UniversityÌnformacìjnì Tehnologìï v Osvìtì1998-69392306-17072010-07-017156165MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEYA. BeletskyD. StecenkoThe algorithms of the exchange of encryption keys between users of computer networks and cryptographic protection of information transmitted over open communications channels. The algorithm is based a modified asymmetric protocol Diffie-Hellman (DH). The essence of the modification amounts to the replacement of large prime numbers algorithm DH guaranteed nonsingular n-complete binary matrices of high order. The methods of synthesis of these matrices. Discussed ways to counter attacks on the encryption algorithm.http://ite.kspu.edu/webfm_send/689a cryptographic algorithmdata encryptionprimitive binary matrices
collection DOAJ
language English
format Article
sources DOAJ
author A. Beletsky
D. Stecenko
spellingShingle A. Beletsky
D. Stecenko
MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY
Ìnformacìjnì Tehnologìï v Osvìtì
a cryptographic algorithm
data encryption
primitive binary matrices
author_facet A. Beletsky
D. Stecenko
author_sort A. Beletsky
title MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY
title_short MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY
title_full MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY
title_fullStr MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY
title_full_unstemmed MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY
title_sort matrix algorithms of encryptic protection of information and exchange of encryption key
publisher Kherson State University
series Ìnformacìjnì Tehnologìï v Osvìtì
issn 1998-6939
2306-1707
publishDate 2010-07-01
description The algorithms of the exchange of encryption keys between users of computer networks and cryptographic protection of information transmitted over open communications channels. The algorithm is based a modified asymmetric protocol Diffie-Hellman (DH). The essence of the modification amounts to the replacement of large prime numbers algorithm DH guaranteed nonsingular n-complete binary matrices of high order. The methods of synthesis of these matrices. Discussed ways to counter attacks on the encryption algorithm.
topic a cryptographic algorithm
data encryption
primitive binary matrices
url http://ite.kspu.edu/webfm_send/689
work_keys_str_mv AT abeletsky matrixalgorithmsofencrypticprotectionofinformationandexchangeofencryptionkey
AT dstecenko matrixalgorithmsofencrypticprotectionofinformationandexchangeofencryptionkey
_version_ 1725706779757641728