The development of modern cryptography is phd thesis on cryptography with the emergence phd thesis computing machines. Since specialized equipment for protection phd thesis on cryptography sensitive information was initially implemented only in hardware, stream ciphers were widespread. Later, other areas of symmetric and asymmetric cryptography were established with the invention of general-purpose processors. In particular, such symmetric cryptographic primitives cryptography block ciphers, message authentication codes MACsauthenticated ciphers and others began to develop rapidly.
Today various cryptographic algorithms are commonly cryptography in everyday life to protect private data. Design and analysis of advanced symmetric cryptographic primitives require a lot of time and resources. This is related to many factors, mainly to the cryptanalysis of prospective encryption algorithms under development. Every cryptography new and modified attacks are phd thesis, leading to a rapid increase in the quantity of requirements and criteria imposed on cryptoprimitives.
Most of this thesis is devoted to analysis and improvement of cryptographic attacks and corresponding criteria for cryptography components. Almost all phd thesis on cryptography cryptoprimitives use nonlinear mappings for protection phd thesis on cryptography advanced attacks.
In cryptography with that a new method was proposed for the generation of random substitutions S-boxes with extreme cryptographic indicators that can be used in the next-generation ciphers to provide phd thesis and ultra-high security levels.
In addition, several criteria imposed on S-boxes used in block ciphers were analyzed and their significance for block ciphers was proven. It this web page worth mentioning a practical method of testing two vectorial Boolean functions and a universal tool phd thesis on cryptography checking properties of arbitrary binary nonlinear components cryptography in papers gathered in this thesis.
Another part of the thesis is dedicated to the cryptanalysis of cryptography functions as well as block and stream ciphers. Moreover, an algebraic approach was used to reconstruct an initial cryptography of the current Russian hash standard GOST phd thesis thesis on cryptography Finally, a backward states tree method has been used to analyze stream ciphers based on the combination principle of linear and nonlinear feedback registers.
JavaScript is disabled for your browser.
Some features phd thesis on cryptography this site may not work without it. Metadata Show full item record. Abstract The development of cryptography cryptography cryptography associated with the emergence of computing machines.
Has part s Paper I: Phd thesis attacks phd thesis on cryptography binary decision diagrams. In Pre-proceedings of BalkanCryptSecpp. Full text not available in BORA. Publisher The University of Bergen.
2018 ©