This article describes approaches to the development soft-hardware data protection system based algorithms belong to the class undisclosed ciphers. The features of the algorithm indirect encryption that would have been implemented in the device based on the DSP. Showing approaches to adaptation undisclosed encryption algorithms for the implementation of the hardware component of the complex data protection. The results of tests carried out with the device created based on the DSP. The basic disadvantages of solutions based on undisclosed ciphers and algorithm indirect encryption and provides possible directions for solving them.
cryptography, indirect encryption, undisclosed encrypt, DSP