1. Science
  2. Publications
  3. Information Processing Systems
  4. 1(108)'2013
  5. The approach to the modification of subkeys for cryptoalgorithm GOST 28147-89 in dependence of transformed data

The approach to the modification of subkeys for cryptoalgorithm GOST 28147-89 in dependence of transformed data

I.V. Lysenko
Annotations languages:

In order to increase cryptographic proofness of the cryptographic algorithm GOST 28147-89 an approach to the formation of keys schedule for this algorithm is proposed. This approach eliminates the need for a user session key for each session of their interaction.
Keywords: subkeys, confidentiality, cyclic shift
Reference:
Lыsenko, Y.V. (2013), "Podkhod k modyfytsyrovanyiu podkliuchei dlia kryptoalhorytma HOST 28147-89 v zavysymosty ot preobrazuemыkh dannыkh" , Information Processing Systems, Vol. 1(108), pp. 192-193.