2020
DOI: 10.30534/ijatcse/2020/261952020
|View full text |Cite
|
Sign up to set email alerts
|

Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum period

Abstract: The entry of mankind into the era of high technology, the rapid growth of computing technology contributes to the expansion of the range of electronic services. To ensure the security of sensitive information, personal data is used cryptographic systems of traditional cryptography (symmetrical cryptosystems) and cryptography with open keys (asymmetric cryptosystems). As a rule, the first provide security services, the second -the distribution of keys. However, in the conditions of totalitarian surveillance in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Thus, based on the proposed methodology, a list of critical threats for each attacker category is constructed. Taking into account the modern approaches proposed in [99][100][101][102][103][104][105][106][107][108] for assessing the layer of possible secret intelligence devices (H 7 ), the time and financial costs of preventive protection measures are significantly reduced.…”
Section: Development Of a Model Of A Terrorist Act And Security Of The Critical Infrastructure Facility Cybersystemmentioning
confidence: 99%
“…Thus, based on the proposed methodology, a list of critical threats for each attacker category is constructed. Taking into account the modern approaches proposed in [99][100][101][102][103][104][105][106][107][108] for assessing the layer of possible secret intelligence devices (H 7 ), the time and financial costs of preventive protection measures are significantly reduced.…”
Section: Development Of a Model Of A Terrorist Act And Security Of The Critical Infrastructure Facility Cybersystemmentioning
confidence: 99%
“…In [11,12] the methodology of construction of the system of information security of banking information in automated banking systems (ABS) is considered, which is based on the first proposed three-level model of strategic management of information technology security. In [13] only information security problems are considered, without taking into account technical problems.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…To find the general solution of the inhomogeneous equation let's use the method of variation of arbitrary constants: 11) where…”
Section: Computer Sciencesmentioning
confidence: 99%