2016
DOI: 10.1515/eng-2016-0025
|View full text |Cite
|
Sign up to set email alerts
|

Development of the model of protected cross-border information interaction

Abstract: This article investigates a proposed model of cross-border exchange and information security in the cross-border interaction in the integration system. A structural scheme of protected cross-border information exchange is proposed. Cross-border interaction of sides for information exchange in the integrated system is provided by the creation and use of the integration segment and national segments. The main tasks of a trusted third party are formulated. The model of sides' interaction scheme of the integration… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 4 publications
(7 reference statements)
0
0
0
Order By: Relevance
“…Round keys are directly added to the original encryption data to hide the dependency between input and output in a particular round. Therefore, the statistical properties of the key schedule scheme are important for obtaining random ciphertexts in each round [4], [5]. When developing an encryption algorithm, it is impossible to test all combinations of master keys.…”
Section: Introductionmentioning
confidence: 99%
“…Round keys are directly added to the original encryption data to hide the dependency between input and output in a particular round. Therefore, the statistical properties of the key schedule scheme are important for obtaining random ciphertexts in each round [4], [5]. When developing an encryption algorithm, it is impossible to test all combinations of master keys.…”
Section: Introductionmentioning
confidence: 99%