3 research outputs found

    Differential cryptanalysis of new Qamal encryption algorithm

    Get PDF
    Currently, the Republic of Kazakhstan is developing a new standard for symmetric data encryption. One of the candidates for the role of the standard is the Qamal encryption algorithm developed by the Institute of Information and Computer Technologies (Almaty, Republic of Kazakhstan). The article describes the algorithm. Differential properties of the main operations that make up the Qamal cypher are considered in the questions of stability. We have shown that for a version with a 128-bit data block and the same secret key size for three rounds of encryption it is difficult to find the right pairs of texts with a probability of 2–120, which makes differential cryptanalysis not applicable to the Qamal cyphe

    Development and analysis of symmetric encryption algorithm Qamal based on a substitution-permutation network

    Get PDF
    This paper represents a developed cryptographic information protection algorithm based on an substitution-permutation network. We describe the cryptographic transformations used in the developed algorithm. One of the features of the algorithm is the simplicity of its modification with regard to different security levels. The algorithm uses a pre-developed S-box tested against differential and linear cryptanalysis. The S-box is consistent with the one of known standards AES and GOST R 34.12-2015. We provide the findings of an avalanche-effect investigation and statistical properties of cipher texts. The algorithm actually meets the avalanche-effect criterion even after the first round

    Development of an automated system model of information protection in the cross-border exchange

    No full text
    A model of an automated system for secure cross-border information exchange is considered. This automated system presents as a complex of the following modules which ensure the information security: data encryption, an electronic digital signature (EDS), access control to the stored information based on two-factor authentication, resolution of possible conflict situations. In this paper, models of two modules for an automated system are described: the electronic digital signature and access control to information based on two-factor authentication. The mathematical model of the formation and verification of the digital signature is described in detail. The phased software implementation of this model with the analysis of the results is described. The two-factor authentication algorithm based on the authenticator program and a mobile phone is considered. A secret string generator based on the method of exhaustive search was carried out. A generator of trigonometric functions is described, which is used to calculate a one-time password. The phased software implementation of this model is given. The analyzed results of the algorithm are presented
    corecore