Hardware effective algorithm for mark formation of the data transmission beginning

Download article in PDF format

Authors: Fayzullin I. R., Fayzullin R. T.

Annotation: Hardware (not software) effective cryptographic algorithm for mark formation of the data transmission beginning. A modification of the algorithm, which allows the data transmitting in the form of errors specially built-in marker, is suggested. It is shown that the problem, on which the algorithm cryptographic firmness is based, does not belong to NP class. The estimation of a number of operations needed for finding a key is given for the best (in the viewpoint of an attacker) case.

Keywords: master-key, marker, cryptographic firmness, memoryless automaton

Editorial office address

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 701-582

  journal@tusur.ru

 

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates