Tytuł artykułu
Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
An implementation of novel cryptographic algorithm "Kalyna"
Języki publikacji
Abstrakty
W pracy opisano sposoby realizacji nowego algorytmu kryptograficznego „Kalyna”, będącego narodowym standardem szyfrowania Ukrainy. Dokonano estymacji wydajności oraz objętości kodu w przypadku realizacji kryptoalgorytmu na 8/16/32-bitowych mikrokontrolerach ogólnego przeznaczenia. Również przeprowadzono analizę porównawczą wymienionych parametrów z innymi nowoczesnymi kryptoalgorytmami.
This paper describes an implementation of novel cryptographic algorithm "Kalyna", which is the national encryption standard of Ukraine. The performance and the code size requirement were estimated for implementation of this algorithm on general purpose 8/16/32-bit microcontrollers. Also, a comparative analysis of these parameters with other modern cryptographic algorithms was made.
Wydawca
Czasopismo
Rocznik
Tom
Strony
157--163
Opis fizyczny
Bibliogr. 19 poz., rys., tab., wykr.
Twórcy
autor
- Opole University of Technology, Department of Electrical Engineering, Automatic Control and Informatics
autor
- Opole University of Technology, Department of Electrical Engineering, Automatic Control and Informatics
autor
- “Lviv Polytechnic” National University, Institute of Computer Technologies, Automation and Metrology, Ukraina
autor
- “Lviv Polytechnic” National University, Institute of Computer Technologies, Automation and Metrology, Ukraina
Bibliografia
- [1] Stallings W. Cryptography and Network Security: Principles and Practice (6th Edition) Prentice Hall Press, 2013, 752 p.
- [2] Sohraby K., l Minoli D., Znati T. „Wireless Sensor Networks: Technology, Protocols, and Applications”, Wiley-Interscience, 2007, 328 p.
- [3] Eisenbarth T., Kumar S., Paar C., Poschmann A., Uhsadel L. A Survey of Lightweight Cryptography Implementations // IEEE Design & Test of Computers – Special Issue on Secure ICs for Secure Embedded Computing Vol. 24, 2007, Nr. 6, 522-533
- [4] Rinne S., Eisenbarth T., Paar C. Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers // ECRYPT Workshop Software Performance Enhancement for Encryption and Decryption, June 11-12, (2007), 33-43
- [5] Schneier B. (1996). Applied cryptography : protocols, algorithms, and source code in C (2. ed.). John Wiley & Sons, Inc. New York, 1995 , 758 p.
- [6] Courtois N. T. Security evaluation of GOST 28147-89 in view of international standardisation. Cryptologia 36.1 (2012): 2-13.
- [7] Takanori Isobe. A Single-Key Attack on the Full GOST Block Cipher // Fast Software Encryption 18th International Workshop (FSE-2011), 290-305, Springer LNCS 6733, 2011
- [8] FIPS-197: Advanced Encryption Standard (AES). Federal Information Processing Standard, National Institute of Standards and Technology, U.S. Dept. of Commerce, November 26, 2001
- [9] Oliynykov R. A New Encryption Standard of Ukraine: The Block Cipher Kalyna // 15th Central European Conference on Cryptology, CECC 2015, 8-10 July 2015, Alpen-Adria- Universität Klagenfurt - Mode of access: www. URL: https://conference.aau.at/event/14/session/2/contribution/14
- [10] State Service of Special Communication and Information Protection of Ukraine. Statement on Public Competition of Cryptographic Algorithms. - Mode of access: www. URL: http://www.dstszi.gov.ua/dstszi/control/ua/publish/printable/artic le?art id=48387, 2006 (in Ukrainian)
- [11] Oliynykov R., Gorbenko I., Kazymyrov O., Ruzhentsev V., Kuznetsov O., Gorbenko Y., Dyrda O., Dolgov V., Pushkaryov A., Mordvinov R., Kaidalov D. A New Encryption Standard of Ukraine: The Kalyna Block Cipher // Norwegian Information Security Conference (NISK-2015), 2015, 113 p.
- [12] National Standard of the Russian Federation GOST R 34.12– 2015 - Mode of access: www. URL: http://tc26.ru/en/standard/gost/GOST_R_34_12_2015_ENG.pd f
- [13] Oliynykov R. Related-key cryptanalysis of perspective symmetric block cipher / R. Oliynykov, D. Kaidalov // Prikladnaya radioelektronika. - 2014. - Т. 13, Nr 3, p. 192-200. - Mode of access: http://nbuv.gov.ua/UJRN/Prre_2014_13_3_5.
- [14] Baranowski Rafał, Mikrokontrolery AVR Atmega, BTC, Warszawa 2005.
- [15] 8-bit AVR Instruction Set - Mode of access: www. URL: www.atmel.com
- [16] User's Guide. MSP430x5xx and MSP430x6xx Family // Texas Instruments, 2014, 1145 p. 15. Yiu J. The Definitive Guide to the ARM Cortex-M3 and ARM Cortex-M4 Processors. Third Edition. – Elsevier, 2014, 1055 p.
- [17] MSP430 - ultra-low-power Microcontrollers. - Mode of access: www. URL: http://www.ti.com/lsds/ti/microcontrollers_16-bit_32- bit/msp/overview.page?DCMP=MCU_other&HQS=msp430
- [18] Yiu J. The Definitive Guide to the ARM Cortex-M3 and ARM Cortex-M4 Processors. Third Edition. – Elsevier, 2014, 1055 p.
- [19] Ambrose J., Ignjatovic A., Parameswaran S. Power Analysis Side Channel Attacks: The Processor Design-level Context. Omniscriptum Gmbh & Company Kg., 2010, 300 p.
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2018).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-5ea75c1a-5f4a-4e66-8a1f-dfb7639ccc27