In order to increase cryptographic proofness of the cryptographic algorithm GOST 28147-89 an approach to the formation of keys schedule for this algorithm is proposed. Two models of the keys schedule formation are considered relatively this approach.
confidentiality, keys schedule, block cipher
"Podkhod k formyrovanyiu raspysanyia kliuchei dlia blochnoho symmetrychnoho kryptoalhorytma HOST 28147-89" ,
Information Processing Systems,