In order to increase cryptographic proofness of the cryptographic algorithm GOST 28147-89 an approach to the formation of keys schedule for this algorithm is proposed. This approach eliminates the need for a user session key for each session of their interaction.
subkeys, confidentiality, cyclic shift
"Podkhod k modyfytsyrovanyiu podkliuchei dlia kryptoalhorytma HOST 28147-89 v zavysymosty ot preobrazuemыkh dannыkh" ,
Information Processing Systems,