STREAM ENCRYPTION ALGORITHMS AND THE BASIS OF THEIR CREATION

  • Rahmatullayev Ilhom Raxmatullayebich Senior teacher, Samarkand branch of Tashkent University of Information Technologies named after Muhammad al-Khwarizmi
Keywords: XOR, SVS, SSL, OFB, SET, LFSR, Hardware

Abstract

This article analyzes stream encryption algorithms belonging to the family of symmetric encryption algorithms and their creation bases, as well as types of pseudorandom number generators and their development bases. Pseudo-random generators created on the basis of a systematic-theoretical approach, pseudo-random generators based on the approach based on computational complexity and combinations, and stream encryption algorithms created on their basis are reviewed.

References

1. Schneier B. Applied cryptography. Protocols, algorithms, source texts in C language. - M., Ed. TRIUMPH, 2003. - 816 p.
2. Kharin Yu.S., Bernik V.I., Matveev G.V., Agievich S.V. Mathematical and computer bases of cryptology: Textbook. - Minsk, LLC "New Knowledge", 2003. - 382 p.
3. Asoskov A.V., Ivanov M.A. Stream ciphers, M: Kudits-Obraz, 2003. - 336 p.
4. Akbarov D.Ye. Cryptographic methods of information security and their application. - Tashkent, "Mark of Uzbekistan" publishing house, 2009. - 432 p.
5. http://www.cryptography.ru
6. Musayev A.I. Research the basics of existing stream encryption algorithms and create new crypto-resistant algorithms. Master's dissertation in the field of information security. Tashkent, 2008. - 81 p.
7. Suwais K., Samsudin A. New Classification of Existing Stream Ciphers. Universiti Sains Malaysia(USM), Malaysia 2010
Published
2022-12-19
How to Cite
Rahmatullayev Ilhom Raxmatullayebich. (2022). STREAM ENCRYPTION ALGORITHMS AND THE BASIS OF THEIR CREATION. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 3(12), 165-173. Retrieved from https://cajmtcs.centralasianstudies.org/index.php/CAJMTCS/article/view/310
Section
Articles