R. Biyashev, N. Kapalova, R. Khakimov, S. Nyssanbayeva
{"title":"非位置密码算法的软件实现","authors":"R. Biyashev, N. Kapalova, R. Khakimov, S. Nyssanbayeva","doi":"10.1109/ICAICT.2014.7035908","DOIUrl":null,"url":null,"abstract":"The software implementation results of the development for the system of cryptographic protection of information (SCPI) with the given characteristics are presented in the paper. This system is intended for using in systems and networks of information transmission and storage. In the created system of cryptographic protection of information, the nonconventional algorithms of encryption and digital signature formation developed on the basis of nonpositional polynominal notations (NPNs) are implemented. Synonyms of NPNs are notations in residual classes. Given characteristics are the length of the message or the digital signature, as well as cryptostrength of algorithms.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Software implementation of the nonpositional cryptography algorithms\",\"authors\":\"R. Biyashev, N. Kapalova, R. Khakimov, S. Nyssanbayeva\",\"doi\":\"10.1109/ICAICT.2014.7035908\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The software implementation results of the development for the system of cryptographic protection of information (SCPI) with the given characteristics are presented in the paper. This system is intended for using in systems and networks of information transmission and storage. In the created system of cryptographic protection of information, the nonconventional algorithms of encryption and digital signature formation developed on the basis of nonpositional polynominal notations (NPNs) are implemented. Synonyms of NPNs are notations in residual classes. Given characteristics are the length of the message or the digital signature, as well as cryptostrength of algorithms.\",\"PeriodicalId\":103329,\"journal\":{\"name\":\"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)\",\"volume\":\"62 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAICT.2014.7035908\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2014.7035908","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Software implementation of the nonpositional cryptography algorithms
The software implementation results of the development for the system of cryptographic protection of information (SCPI) with the given characteristics are presented in the paper. This system is intended for using in systems and networks of information transmission and storage. In the created system of cryptographic protection of information, the nonconventional algorithms of encryption and digital signature formation developed on the basis of nonpositional polynominal notations (NPNs) are implemented. Synonyms of NPNs are notations in residual classes. Given characteristics are the length of the message or the digital signature, as well as cryptostrength of algorithms.