STREAM ENCRYPTION ALGORITHMS AND THE BASIS OF THEIR CREATION
Abstract
This article analyzes stream encryption algorithms belonging to the family of symmetric encryption algorithms and their creation bases, as well as types of pseudorandom number generators and their development bases. Pseudo-random generators created on the basis of a systematic-theoretical approach, pseudo-random generators based on the approach based on computational complexity and combinations, and stream encryption algorithms created on their basis are reviewed.
References
2. Kharin Yu.S., Bernik V.I., Matveev G.V., Agievich S.V. Mathematical and computer bases of cryptology: Textbook. - Minsk, LLC "New Knowledge", 2003. - 382 p.
3. Asoskov A.V., Ivanov M.A. Stream ciphers, M: Kudits-Obraz, 2003. - 336 p.
4. Akbarov D.Ye. Cryptographic methods of information security and their application. - Tashkent, "Mark of Uzbekistan" publishing house, 2009. - 432 p.
5. http://www.cryptography.ru
6. Musayev A.I. Research the basics of existing stream encryption algorithms and create new crypto-resistant algorithms. Master's dissertation in the field of information security. Tashkent, 2008. - 81 p.
7. Suwais K., Samsudin A. New Classification of Existing Stream Ciphers. Universiti Sains Malaysia(USM), Malaysia 2010