Suscripción a Biblioteca: Guest
Portal Digitalde Biblioteca Digital eLibros Revistas Referencias y Libros de Ponencias Colecciones
Telecommunications and Radio Engineering
SJR: 0.202 SNIP: 0.2 CiteScore™: 0.23

ISSN Imprimir: 0040-2508
ISSN En Línea: 1943-6009

Volumes:
Volumen 78, 2019 Volumen 77, 2018 Volumen 76, 2017 Volumen 75, 2016 Volumen 74, 2015 Volumen 73, 2014 Volumen 72, 2013 Volumen 71, 2012 Volumen 70, 2011 Volumen 69, 2010 Volumen 68, 2009 Volumen 67, 2008 Volumen 66, 2007 Volumen 65, 2006 Volumen 64, 2005 Volumen 63, 2005 Volumen 62, 2004 Volumen 61, 2004 Volumen 60, 2003 Volumen 59, 2003 Volumen 58, 2002 Volumen 57, 2002 Volumen 56, 2001 Volumen 55, 2001 Volumen 54, 2000 Volumen 53, 1999 Volumen 52, 1998 Volumen 51, 1997

Telecommunications and Radio Engineering

DOI: 10.1615/TelecomRadEng.v75.i7.70
pages 643-657

ANALYSIS OF MODERN REQUIREMENTS TO NEW GENERATION OF CRYPTOGRAPHIC PRIMITIVES

E. V. Kotukh
Kharkiv National University of Radio Electronics, 14 Nauka Ave, Kharkiv 61166, Ukraine
V. M. Kartashov
Kharkov National University of Radio Engineering and Electronics, 14, Nauka Ave, Kharkiv, 61166, Ukraine
O. G. Khalimov
Kharkiv National University of Radio Engineering and Electronics, 14, Nauky Ave, Kharkiv, 61166, Ukraine
D. P. Tsapko
Kharkiv National University of Radio Engineering and Electronics, 14, Nauky Ave, Kharkiv, 61166, Ukraine
A. V. Samoilova
Kharkiv National University of Radio Engineering and Electronics, 14, Nauky Ave, Kharkiv, 61166, Ukraine

SINOPSIS

The analysis of the modern design requirements of the SHA-3 competition finalists (Blake, JH, Groestl, Skein, Keccak) is presented. It is shown that the Skein and Keccak universal cryptographic primitives have a number of significant advantages over classical schemes based on the compression function. Some new properties cryptographic primitives are presented. It is shown that support of various combinations of the initial parameters without the use of additional tools and applications allows having flexibility in the implementation of the new generation of cryptographic primitives on different architectures of modern CPUs. It is concluded that the apparent cause of the Keccak function as the winner was its design, which made it possible to substantiate the versatility of the Keccak and realize a provable resistance to a whole class of attacks without increasing the complexity of the implementation.


Articles with similar content:

Guaranteed Estimate of the Features Utility while Statistical Recognition of Two Classes
Journal of Automation and Information Sciences, Vol.42, 2010, issue 10
Leonid S. Fainzilberg
Synthesis of Variable Structure Systems for Stabilization of Ship at Incomplete Controllability
Journal of Automation and Information Sciences, Vol.44, 2012, issue 6
Victor L. Timchenko
SELF-LEARNING METHODS IN THE SPACE OF IMAGE STRUCTURAL SIGN CRITERIONS
Telecommunications and Radio Engineering, Vol.74, 2015, issue 18
V. A. Gorokhovatskiy, A. Ye. Berestovsky, Ye. P. Putyatin
Identification of Slow-Moving Targets Outside Optically Opaque Obstacles
Telecommunications and Radio Engineering, Vol.66, 2007, issue 18
Oleg Sytnik
Technique of Control and Decision Making in Simulation Modeling of Technological Processes of Dangerous Manufacture
Journal of Automation and Information Sciences, Vol.38, 2006, issue 10
Victor S. Smorodin