Development of encryption and archiving algorithms in accordance with GOST 28147-89 in open source operating systems

Authors

  • Nizomiddin Ochilov Najmiddin ugli

Keywords:

lossless compression, cryptanalysis, concatenation of ciphertext blocks, initialization vector.

Abstract

Operating systems belonging to the Linux family are somewhat more secure due to the limited access to system files. However, due to the fact that unlimited access is created when logged in using the system administrator (root), it requires special encryption methods to keep some data confidential. According to the level of data confidentiality, only the GOST 28147-89 standard is a highly durable encryption algorithm.

References

Qi Luo, Advancing Computing, Communication, Control and Management, Springer Science & Business Media, 2009 г., p.290

Алгоритм криптографического преобразования ГОСТ 28147-89, ИПК Издательство Стандартов, Москва, 1996 г.

Qi Luo, Advancing Computing, Communication, Control and Management, Springer Science & Business Media, 2009., p.290.

Algorithm for cryptographic transformation GOST 28147-89, IPK Standards Publishing House, Moscow, 1996.

Mao, V. Modern cryptography: theory and practice: trans. from English / B. Mao. - M .: Publishing House "Williams", 2005.

Stallings, V. Cryptography and protection of networks: principles and practice: trans. from English / V. Stallings. - M .: Publishing House "Williams", 2001.

Ferguson, N. Practical cryptography: trans. from English / N. Ferguson, B. Schneier. - M .: Publishing House "Williams", 2005.

Shannon, K. Communication theory in secret systems // Works on information theory and cybernetics: trans. from English / K. Shannon. - M .: Publishing house of foreign literature, 1963. S. 333-369.

Schneier, B. Applied cryptography: protocols, algorithms, source texts in C: per. from English / B. Schneier. - M .: Triumph, 2012.

GOST 28147—89 “Information processing systems. Cryptographic protection. Algorithm for cryptographic transformation ".

GOST R 34.13—2015 “Information technology. Cryptographic information protection. Modes of Operation of Block Ciphers ".ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers.

FIPS PUB 197. Federal Information Processing Standards Publication. Advanced Encryption Standard (AES). November 26,2001.

Downloads

Published

2023-11-30

How to Cite

Ochilov, N. (2023). Development of encryption and archiving algorithms in accordance with GOST 28147-89 in open source operating systems. Acta of Turin Polytechnic University in Tashkent, 13(3), 12–19. Retrieved from https://acta.polito.uz/index.php/journal/article/view/168

Issue

Section

Technical Science and Engineering