Currently, the Republic of Kazakhstan is developing a new standard for symmetric data encryption. One of the candidates for the role of the standard is the Qamal encryption algorithm developed by the Institute of Information and Computer Technologies (Almaty, Republic of Kazakhstan). The article describes the algorithm. Differential properties of the main operations that make up the Qamal cypher are considered in the questions of stability. We have shown that for a version with a 128-bit data block and the same secret key size for three rounds of encryption it is difficult to find the right pairs of texts with a probability of 2–120, which makes differential cryptanalysis not applicable to the Qamal cypher
For most cases, people use an ecrypted mode when sending personal information to a server, via an el...
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block ...
Since 1977, DES officially became America encryption algorithm. And then this algorithm spreads over...
Currently, the Republic of Kazakhstan is developing a new standard for symmetric data encryption. On...
This paper represents a developed cryptographic information protection algorithm based on a substitu...
This paper represents a developed cryptographic information protection algorithm based on an substit...
The paper summarizes research on the cryptographic strength of a new symmetric block cipher based on...
The development of modern cryptography is associated with the emergence of computing machines. Since...
This paper considers the security of iterated block ciphers against the differential cryptanalysis i...
Abstract: The cryptosystem is a combination of cryptographic algorithms used to provide security ser...
Data protection is a complex problem affecting many areas including computers and communications. To...
Abstract. Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysi...
Symmetric ciphers are one of the most famous cryptographic paradigms in cryptography. Its simplistic...
The results of the differential and linear properties analysis of the ciphers Rijndael, Serpent, Thr...
For most cases, people use an ecrypted mode when sending personal information to a server, via an el...
For most cases, people use an ecrypted mode when sending personal information to a server, via an el...
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block ...
Since 1977, DES officially became America encryption algorithm. And then this algorithm spreads over...
Currently, the Republic of Kazakhstan is developing a new standard for symmetric data encryption. On...
This paper represents a developed cryptographic information protection algorithm based on a substitu...
This paper represents a developed cryptographic information protection algorithm based on an substit...
The paper summarizes research on the cryptographic strength of a new symmetric block cipher based on...
The development of modern cryptography is associated with the emergence of computing machines. Since...
This paper considers the security of iterated block ciphers against the differential cryptanalysis i...
Abstract: The cryptosystem is a combination of cryptographic algorithms used to provide security ser...
Data protection is a complex problem affecting many areas including computers and communications. To...
Abstract. Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysi...
Symmetric ciphers are one of the most famous cryptographic paradigms in cryptography. Its simplistic...
The results of the differential and linear properties analysis of the ciphers Rijndael, Serpent, Thr...
For most cases, people use an ecrypted mode when sending personal information to a server, via an el...
For most cases, people use an ecrypted mode when sending personal information to a server, via an el...
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block ...
Since 1977, DES officially became America encryption algorithm. And then this algorithm spreads over...