Modification of RC5 cryptoalgorythm for electronic data encryption systems

Authors

  • Tetiana Anatoliivna Zhovnovach Cherkasy State Technological University
  • Andriy Viktorovych Sagun Cherkasy branch of the European University
  • Vladyslav Volodymyrovych Khaidurov Kiev International University
  • Hanna Vadymivna Martyniuk National Aviation University
  • Tetiana Leonidivna Scherbak National Aviation University

DOI:

https://doi.org/10.18372/2225-5036.25.14458

Keywords:

encryption, cryptographic algorithm RC5, block ciphers, bitwise shift function, OpenSSL library, OpenVPN

Abstract

Encryption of electronic data requires the use of cryptanalysis functions. Information, like any value, is attacked by various scammers. The level of information security depends primarily on the security of the channels through which information from the company's information base can get into the network. To date, there are specially designed software tools that can block these channels and reduce the risk of leakage, theft or unauthorized access to information. The problem is that with an increase in the number of violations, their detection is reduced. The relevance of threats to the integrity and confidentiality of information requires careful attention to the task of protecting it. 20 years ago, the task of ensuring information security was solved with the help of cryptographic protection, the establishment of firewalls, and access control. Now these technologies are not enough, any information that has financial, competitive, military or political value is at risk. An additional risk is the possibility of intercepting the management of critical information infrastructure facilities. Particularly relevant is the increased stability of block algorithms, in particular, RC5, which is part of various open cryptographic libraries - OpenSSL, OpenVPN, etc. Improve the cryptographic stability of block diagrams and cryptographic algorithms by various methods. The article discusses the choice of shift functions for modifying the classic RC5 algorithm to increase the cryptographic stability of RC5 algorithm. For confirmation of efficiency modeling of the cryptographic system realized on the basis of modification of cryptographic algorithm RC5 was carried out and the time and qualitative characteristics of the work of the modified algorithm were obtained.

Author Biographies

Tetiana Anatoliivna Zhovnovach, Cherkasy State Technological University

Senior Lecturer of the Department of Mathematical, Informational and Social-Humanitarian Disciplines

Andriy Viktorovych Sagun, Cherkasy branch of the European University

Associate Professor of the Department of Informatics, Information Security and Documentation at Cherkasy State Technological University

Vladyslav Volodymyrovych Khaidurov, Kiev International University

Senior Lecturer of the Department of Computer Science of Kyiv International University

Hanna Vadymivna Martyniuk, National Aviation University

Associate Professor of the Information Security Department

Tetiana Leonidivna Scherbak, National Aviation University

Associate Professor of the Information Security Department

References

[Electronic resource]. Online: http://cseweb. ucsd. edu/~mihir/papers/gb.pdf.

[Electronic resource]. Online: http:// cryptography.ru/wp-content/ uploads/ 2014/11/ varn_ lectures_long.pdf

L. Babenko, Ye. Ishchukova, Sovremennyye algoritmy blochnogo shifrovaniya i metody ikh analiza, M.: Gelios ARV, 2006, 376 p.

O. Logachov, A. Sal'nikov, S. Smyshlyayev, V. Yashchenko, Bulevy funktsii v teorii kodirovaniya i kriptologii. Izdaniye vtoroye, dopolnennoye, MTSNMO, M., 2012.

Published

2019-12-27

Issue

Section

Cryptology