Abstract
Encryption of electronic data requires the use of cryptanalysis functions. Information, like any value, is attacked by various scammers. The level of information security depends primarily on the security of the channels through which information from the company's information base can get into the network. To date, there are specially designed software tools that can block these channels and reduce the risk of leakage, theft or unauthorized access to information. The problem is that with an increase in the number of violations, their detection is reduced. The relevance of threats to the integrity and confidentiality of information requires careful attention to the task of protecting it. 20 years ago, the task of ensuring information security was solved with the help of cryptographic protection, the establishment of firewalls, and access control. Now these technologies are not enough, any information that has financial, competitive, military or political value is at risk. An additional risk is the possibility of intercepting the management of critical information infrastructure facilities. Particularly relevant is the increased stability of block algorithms, in particular, RC5, which is part of various open cryptographic libraries - OpenSSL, OpenVPN, etc. Improve the cryptographic stability of block diagrams and cryptographic algorithms by various methods. The article discusses the choice of shift functions for modifying the classic RC5 algorithm to increase the cryptographic stability of RC5 algorithm. For confirmation of efficiency modeling of the cryptographic system realized on the basis of modification of cryptographic algorithm RC5 was carried out and the time and qualitative characteristics of the work of the modified algorithm were obtained.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Ukrainian Scientific Journal of Information Security
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.