350 rub
Journal Science Intensive Technologies №1 for 2016 г.
Article in number:
New key established algorithms for symmetric key cryptosystems
Authors:
Hoang Van Viet - Master of Engineering, researcher, Le Quy Don Technical University E-mail: viethv76@gmail.com Bui The Truyen - Dr.Sc., teacher, Le Quy Don Technical University E-mail: buithetruyen@gmail.com Tong Minh Duc - Dr.Sc., teacher, Le Quy Don Technical University E-mail: tmduc08@gmail.com Luu Hong Dung - Dr.Sc., teacher, Le Quy Don Technical University E-mail: luuhongdung@gmail.com
Abstract:
In today-s digital world, the demand for secret information transmitted between two parties over insecure channel is more and more popular. This paper proposed two new key established algorithms for symmetric key cryptosystems. The most advantage of the two new algorithms is the secret key is established requires only a single round of transportation. Moreover, the secret key can be authenticated the origin so it can effectively resistant to spoofing attacks. The article also presents the analysis and assessment of the security level of the new proposed algorithms, indicating its potential application in practice is very positive.
Pages: 13-18
References

 

  1. W. Diffie & M. Hellman. New Directions in Cryptography // IEEE Trans. On Info. Theory. 1976. IT-22(6):644-654.
  2. R.L. Rivest, A. Shamir, and L.M. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems // Commun. of the ACM. 1978. V. 21. №. 2. P. 120−126.
  3. T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms // IEEE Transactions on Information Theory. 1985. V. IT-31.№. 4. P. 469−472.
  4. A. Menezes, P. van Oorschot and S. Vanstone. Handbook of Applied Cryptography / Boca Raton. Florida: CRC Press. 1997.
  5. D.R Stinson. Cryptography: Theory and Practice / CRC Press. 1995.
  6. Wenbo Mao. Modern Cryptography: Theory and Practice / Prentice Hall PTR. 2003.