Инд. авторы: Пестунов Ал.И.
Заглавие: Блочные шифры и их криптоанализ
Библ. ссылка: Пестунов Ал.И. Блочные шифры и их криптоанализ // Вычислительные технологии. - 2007. - Т.12. - № S4. - С.51-59. - ISSN 1560-7534. - EISSN 2313-691X.
Внешние системы: РИНЦ: 15269980;
Реферат: rus: Nowadays block ciphers became the most important way for data protection, therefore there are a number of projects devoted to their investigation Specialists from all over the world are involved in their design and analysis. This paper provides a survey of design principles and methods of checking the security of contemporary block ciphers.
Издано: 2007
Физ. характеристика: с.51-59
Цитирование: 1. Shannon С. Communication Theory of secrecy systems // Bell System Technical J. 1949. Vol. 28. P. 656-715. 2. DIFFIE W., Hellman M. New directions in cryptography // IEEE Trans, on Information Theory. 1976. Vol. 22 (6). P. 644-654. 3. Feistel H. Cryptography and computer privacy // Sci. American. 1973. Vol. 228, N 5. P. 15-23. 4. National Bureau of Standards. Data encryption standard // Federal Information Proc. Standard (FIPS). 1977. Vol. 81. 5. Advanced Encryption Algorithm (AES) Development Effort // 1997-2000. 6. Daemen J., Rumen V. The Rijndael block cipher // AES Submission. 1999. 7. BIHAM E., Shamir A. Differential cryptanalysis of the full 16-round DES // Proc. of Crypto'92, LNCS. В.; N.Y.: Springer-Verl., 1993. Vol. 740. P. 487-496. 8. Matsui M. Linear cryptanalysis method for DES cipher // Proc. of Eurocrypt'93, LNCS. В.; N.Y.: Springer-Verb, 1994. Vol. 765. P. 205-218. 9. Knudsen L. Truncated and higher order differentials // Proc. of Fast Software Encryption'94, LNCS. В.; N.Y.: Springer-Verb, 1995. Vol. 1008. P. 196-211. 10. Wagner D. The boomerang attack // Proc. of Fast Software Encryption'99, LNCS. В.; N.Y.: Springer-Verb, 1999. Vol. 1636. P. 156-170. 11. BIHAM E., BIRYUKOV A., Shamir A. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials // Proc. of Eurocrypt'99, LNCS. В.; N.Y.: Springer-Verb, 1999. Vol. 1592. P. 12-23. 12. Daemen J., Knudsen L., Rumen V. The block cipher square // Proc. of Fast Software Encryption'97, LNCS. В.; N.Y.: Springer-Verl., 1997. Vol. 1267. P. 149-165. 13. Knudsen L., Wagner D. Integral cryptanalysis // Proc. of Fast Software Encryption'02, LNCS. В.; N.Y.: Springer-Verb, 2002. Vol. 2365. P. 629-632. 14. Jakobsen Т., Knudsen L. The interpolation attack on block ciphers // Proc. of Fast Software Encryption'97, LNCS. В.; N.Y.: Springer-Verl., 1997. Vol. 1267. P. 28-40. 15. New European Schemes for Signatures, Integrity, and Encryption // Deliverables of the NESSIE Project. 2003. http://www.cosic.esat.kuleuven.ac.be/nessie 16. CRYPTREC Project // 2000-2002. http://www.ipa.go.jp/security/enc/CRYPTREC