The Code is based on random numbers with irregular distribution
Abstract
There is a proposition of a new principle of construction of cryptographic systems. This innovative principle is utilizing encryption system that based on random numbers with an uneven/irregular distribution. It has been noted, this encryption method has the highest degree of resistance to traditional cryptographic attacks, including: selection of all key variations, known original text and the specially selected original texts.
Prombles in programming 2011; 4: 90-95
Full Text:
PDF (Русский)References
Фергюсон Н., Шнайдер Б. Практическая криптография.: Пер. с англ. – М.: Издательский дом «Вильямс», 2005. – 424 с.
ANSI X3.92, "American National Standard for Data Encryption Algorithm (DEA)," American National Standards Institute, 1981.
Авдошин С.М., Савельева А.А. Криптографические методы защиты информационных систем // Известия АИН им. А.М. Прохорова. Бизнес-информатика. – 2006. – Т. 17. – С. 91–99.
Courtois N., Pieprzyk J. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations // Advances in Cryptology – ASIACRYPT 2002 8th International Conference on the Theory Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings. Lecture Notes in Computer Science (2501). – Springer, 2002. – P. 267–287.
Osvik D. A., Shamir A. and Tromer E. Cache Attacks and Countermeasures: the Case of AES // Topics in Cryptology - CT-RSA 2006, The Cryptographers’ Track at the RSA Conference. – Springer-Verlag, 2005. – P. 1–20.
Saha D., Mukhopadhyay D., RoyChowdhury D. A Diagonal Fault Attack on the Advanced Encryption Standar // Cryptology ePrint Archive. – 2009.
Gabriel C., Wittmann C., Sych D. Dong R., Mauerer W., Andersen U. L., Marquard C. and Leuchs G. A Generator for Unique Quantum Random Numbers Based on Vacuum States // Nature Photonics.– 2010. – № 4. – P. 711 – 715.
Fairfield R.C., Mortenson R.L. and Koulthart K.B. An LSI Random Number Generator, Advances in Cryptology: Proceedings of CRYPTO 84, Springer Verlag.– 1985. – P. 203 – 230.
Richter M. Fin Rauschgenerator zur Gewinnung won quasi-idealen Zufallszahlen fur die stochastische Simulation.: Ph.D. dissertation, Aechen University of Technology, 1992.
Schneier B. Applied Cryptography, Second Edition, Protocols, Algorithms, and Source Code in C. - John Wiley & Sons, Inc., 1996.
Davis D., Ihaka R., Fenstermacher P. Cryptographic Randomnes from Air Turbulence in Disk Drives. – In: Desmedit Y. G. (ed). Advances in Cryptology – CRYPTO 94. Lecture Notes in Computer Science. Springer-Verlag. – 1994. – Vol. 839. – P. 114–120.
Ковалев А.В. Реализация генераторов случайных чисел. – М.: Научная сессия МИФИ, 2007. – Том 12. – C. 176–177.
Михерский Р.М., Попов О.И. Генерация случайных чисел с помощью оптического манипулятора // Международный научно-технический журнал «Проблемы управления и информатики». – 2011. – № 4. – C. 152–155.
Корн Г., Корн Т. Справочник по математике (для научных работников и инженеров): Пер. с англ. – М.: Наука, 1973. – 832 с.
Refbacks
- There are currently no refbacks.
 





