This paper represents a developed cryptographic information protection algorithm based on an substitution-permutation network. We describe the cryptographic transformations used in the developed algorithm. One of the features of the algorithm is the simplicity of its modification with regard to different security levels. The algorithm uses a pre-developed S-box tested against differential and linear cryptanalysis. The S-box is consistent with the one of known standards AES and GOST R 34.12-2015. We provide the findings of an avalanche-effect investigation and statistical properties of cipher texts. The algorithm actually meets the avalanche-effect criterion even after the first round
Currently, the Republic of Kazakhstan is developing a new standard for symmetric data encryption. On...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
This paper represents a developed cryptographic information protection algorithm based on a substitu...
This article presents one of the main transformations of symmetric block ciphers used to protect con...
Currently, the Republic of Kazakhstan is developing a new standard for symmetric data encryption. On...
The paper summarizes research on the cryptographic strength of a new symmetric block cipher based on...
The development of modern cryptography is associated with the emergence of computing machines. Since...
This description is about a new 256-bit block symmetric substitution-permutation cipher, called a ma...
To solve the problems of data security in modern electronic communication environments and applicati...
The paper presents a general framework for improving the security of the cryptosystem based on the s...
In this paper, we propose a practical algorithm that can be used to analyze the block cipher structu...
In most modern symmetric ciphers, substitution boxes are non-linear core components that provide rob...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
Block ciphers play a key role in many cryptographic protocols that provide communications security i...
Currently, the Republic of Kazakhstan is developing a new standard for symmetric data encryption. On...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
This paper represents a developed cryptographic information protection algorithm based on a substitu...
This article presents one of the main transformations of symmetric block ciphers used to protect con...
Currently, the Republic of Kazakhstan is developing a new standard for symmetric data encryption. On...
The paper summarizes research on the cryptographic strength of a new symmetric block cipher based on...
The development of modern cryptography is associated with the emergence of computing machines. Since...
This description is about a new 256-bit block symmetric substitution-permutation cipher, called a ma...
To solve the problems of data security in modern electronic communication environments and applicati...
The paper presents a general framework for improving the security of the cryptosystem based on the s...
In this paper, we propose a practical algorithm that can be used to analyze the block cipher structu...
In most modern symmetric ciphers, substitution boxes are non-linear core components that provide rob...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
Block ciphers play a key role in many cryptographic protocols that provide communications security i...
Currently, the Republic of Kazakhstan is developing a new standard for symmetric data encryption. On...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the re...