1. Science
  2. Publications
  3. Information Processing Systems
  4. 1(108)'2013
  5. The approach to the modification of subkeys for cryptoalgorithm GOST 28147-89 in dependence of transformed data

The approach to the modification of subkeys for cryptoalgorithm GOST 28147-89 in dependence of transformed data

I.V. Lysenko
Annotations languages:

In order to increase cryptographic proofness of the cryptographic algorithm GOST 28147-89 an approach to the formation of keys schedule for this algorithm is proposed. This approach eliminates the need for a user session key for each session of their interaction.
Keywords: subkeys, confidentiality, cyclic shift