Ìнформаційні технології в освіті (Jul 2010)

MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY

  • A. Beletsky,
  • D. Stecenko

Journal volume & issue
no. 7
pp. 156 – 165

Abstract

Read online

The algorithms of the exchange of encryption keys between users of computer networks and cryptographic protection of information transmitted over open communications channels. The algorithm is based a modified asymmetric protocol Diffie-Hellman (DH). The essence of the modification amounts to the replacement of large prime numbers algorithm DH guaranteed nonsingular n-complete binary matrices of high order. The methods of synthesis of these matrices. Discussed ways to counter attacks on the encryption algorithm.

Keywords