Modification of RC5 cryptoalgorythm for electronic data encryption systems
DOI:
https://doi.org/10.18372/2225-5036.25.14458Keywords:
encryption, cryptographic algorithm RC5, block ciphers, bitwise shift function, OpenSSL library, OpenVPNAbstract
Encryption of electronic data requires the use of cryptanalysis functions. Information, like any value, is attacked by various scammers. The level of information security depends primarily on the security of the channels through which information from the company's information base can get into the network. To date, there are specially designed software tools that can block these channels and reduce the risk of leakage, theft or unauthorized access to information. The problem is that with an increase in the number of violations, their detection is reduced. The relevance of threats to the integrity and confidentiality of information requires careful attention to the task of protecting it. 20 years ago, the task of ensuring information security was solved with the help of cryptographic protection, the establishment of firewalls, and access control. Now these technologies are not enough, any information that has financial, competitive, military or political value is at risk. An additional risk is the possibility of intercepting the management of critical information infrastructure facilities. Particularly relevant is the increased stability of block algorithms, in particular, RC5, which is part of various open cryptographic libraries - OpenSSL, OpenVPN, etc. Improve the cryptographic stability of block diagrams and cryptographic algorithms by various methods. The article discusses the choice of shift functions for modifying the classic RC5 algorithm to increase the cryptographic stability of RC5 algorithm. For confirmation of efficiency modeling of the cryptographic system realized on the basis of modification of cryptographic algorithm RC5 was carried out and the time and qualitative characteristics of the work of the modified algorithm were obtained.
References
[Electronic resource]. Online: http://cseweb. ucsd. edu/~mihir/papers/gb.pdf.
[Electronic resource]. Online: http:// cryptography.ru/wp-content/ uploads/ 2014/11/ varn_ lectures_long.pdf
L. Babenko, Ye. Ishchukova, Sovremennyye algoritmy blochnogo shifrovaniya i metody ikh analiza, M.: Gelios ARV, 2006, 376 p.
O. Logachov, A. Sal'nikov, S. Smyshlyayev, V. Yashchenko, Bulevy funktsii v teorii kodirovaniya i kriptologii. Izdaniye vtoroye, dopolnennoye, MTSNMO, M., 2012.