Thuật toán sinh số nguyên tố tất định hiệu quả trên thiết bị nhúng
DOI:
https://doi.org/10.54654/isj.v1i1.170Tóm tắt
Tóm tắt—Trong bài báo này, chúng tôi giới thiệu thuật toán sinh số nguyên tố tất định dùng trong mật mã có thể cài đặt hiệu quả trên các thiết bị nhúng. Đóng góp chính của chúng tôi là làm tường minh về đảm bảo cơ sở lý thuyết và cài đặt thực tế thuật toán nêu trên.
Abstract—In this paper, we introduce a provable prime generation algorithm, which is used in cryptography and can be implemented efficiently on embedded devices. Our main contribution is to make sure that the theoretical backgr clear, correct and implement that algorithm.
Downloads
References
Biham, E. and A. Shamir, “Differential cryptanalysis of DES-like cryptosystems”. Journal of CRYPTOLOGY, 1991. 4(1), pp. 3-72.
Isukova E. A. “Construct and Evaluate an Algorithm for Estimating the Security of Block ciphers by Differential Cryptanalysis”. Thesis, Taganrov tecnichcal institute of south federation universty. 2007, pp. 207.
Shneier B. “Applied Cryptography: Protocols, Algorithms and Open sources in C” – M.: TRIUMF, 2002.
Babenko L. K., Isukova E. A.. “Modern Block ciphers and Cryptanalysis – Matxcova”, «Gelios ARB», 2006.
Trmora A. L., “Modern Applied Cryptography”. 2th edit., - M.: Gelios ARB, 2002.
Nicolas T. Courtois, Theodosis Mourouzis, Michal Misztal, Jean-Jacques Quisquater, Guangyan Song: “Can GOST Be Made Secure Against Differential Cryptanalysis?” Cryptologia 39(2), pp. 145-156 (2015).
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).