×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Implementation of algebraic attacks on cipher GOST R 34.12-2015

    The main maintenance of a diversification of production as activity of subjects of managing is considered. being shown in purchase of the operating enterprises, the organizations of the new enterprises, redistribution of investments in interests of the organization and development of new production on available floor spaces. The most important organizational economic targets of a diversification of management are presented by innovative activity of the industrial enterprise.

    Keywords: encryption algorithm, a symmetric block cipher, substitution box, the algebraic method of cryptanalysis, eXtended Linearization

  • Algebraic Analysis of Cryptographic Security Systems

    The research of algebraic cryptanalysis method was carried out in this work. Systems of the equations for tables of various sizes of nonlinear transformations of substitution for simplified model of GOST28147-89 algorithm are received, also we solve a one of this systems by a XL method. During this work we produced a program, which has realised a generation and solving of system of equations describing nonlinear transformations of substitution. We analysed a nonlinear systems of equations and calculated a value of complexity of XL method for eight blocks of substitution.

    Keywords: Algebraic cryptanalysis, XL method, nonlinear transformations of substitution, linearization nonlinear systems, Gauss elimination method, a cryptographic key, GOST28147-89 encryption algorithm