Download Now Free registration required
In order to organize informational security the juridical documents, technical means and cryptographically algorithms, systematic, apparatus-systematic or apparatus-technical means are widely used. And with the advent of high-speed digital lines of information transfer requirements for cryptographic means of enciphering is growing more and more. In cryptosystem based on stream ciphers the entering information is not late in cryptosystem and it allows developing high-speed cryptographic hardware. Besides generated pseudo-casual and truly casual sequences it is widely used in cryptosystems for generation of initial values of confidential parameters and the secret key in the electronic digital signature. The idea of working out of algorithm EDC was developed using operations of algebra parameters.
- Format: PDF
- Size: 506.11 KB