Education of the republic of uzbekistan tashkent state technical university named after islam karimov


Table 2. Modes of operation of different block encryption algorithms



Download 17,18 Mb.
Pdf ko'rish
bet151/276
Sana22.07.2022
Hajmi17,18 Mb.
#840106
1   ...   147   148   149   150   151   152   153   154   ...   276
Bog'liq
Сборник журналя Техника Инновэйшн

Table 2.
Modes of operation of different block encryption algorithms 
ECB 
CBC 
CFB 
OFB CTR 
Cryptographic 
libraries 
DES 




 
LibreSSL 
AES 256 




 
LibreSSL 
GOST 28147-89 

 

 

LibreSSL 
GOST 34.12-2015 





Library of GOST 
algorithm 
O’zDSt 1105:2009 
 

 
 
 
Based on 
additional libraries 
CBC (cipher block chaining mode) and CFB (cipher feedback mode) are only well-
parallel decryption procedures. There is no possibility of parallelization in OFB (output 
feedback mode), but it is possible to increase the efficiency of encryption and decryption issues 
by other methods, as shown in Table 2. 
 
 
 
3. Picture. Encryption modes initialization time 
 
0
50
100
150
200
250
300
ECB
CBC
CFB
OFB
CTR
Ин
ициад
из
ац
ия
 вақ
ти,
 мк
с
Encryption mode
In
iti
al
iz
ati
o
n
 ti
me
 in
 μ
s


№3/2021 year 
Technical science and innovation
158 
CONCLUSION.
The analysis of the encryption standard O'zDSt 1105:2009 revealed the 
following: 
1.
O'zDSt 1105:2009 encryption algorithm uses 2 keys - encryption key and functional 
key, each of which is a 256-bit sequence. The interaction of these keys is equivalent to 
the use of a 512-bit encryption key in the encryption algorithm, which in turn prevents 
the possibility of unauthorized decryption of data; 
2.
If high-level security elements are used, the functional key is changed in each session; 
3.
O'zDSt 1105:2009 encryption standard has been confirmed to be resistant to linear and 
differential analysis, which requires more than 4 rounds. 
4.
The following classification of the evaluation of the quality indicators of encryption 
algorithms is proposed and the analysis of encryption modes using parallelization 
problems was performed. During the analysis, the initialization time of the system in 
encryption modes was also studied. In most cases, the initial time deviations of the 
encryption depending on the selected mode are not significant. In CBC and CFB modes, 
the initialization time increases. In SVS mode, the cryptographic tolerance of the 
encryption algorithm increases (Figure 3). Parallelization in encryption of the highest 
index in SVS mode was performed at 0.00025 sec. 

Download 17,18 Mb.

Do'stlaringiz bilan baham:
1   ...   147   148   149   150   151   152   153   154   ...   276




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish