![The Encryption Algorithms GOST28147a89aIDEA8a4 and GOST28147a89aRFWKIDEA8a4](https://gjcst.com/public/journals/1/3-the-encryption-algorithms-gost28147-thumbnail.jpg)
Keywords
feystel network
lai–massey scheme
round function
round keys
output transformation
multiplication
addition
s–box
lai–massey scheme
round function
round keys
output transformation
multiplication
addition
s–box
How to Cite
Gulom Tuychiev. (2017). The Encryption Algorithms GOST28147a89aIDEA8a4 and GOST28147a89aRFWKIDEA8a4. Global Journal of Computer Science and Technology, 16(C5), 29–36. Retrieved from https://gjcst.com/index.php/gjcst/article/view/808
Abstract
In the paper created a new encryption algorithms GOST28147 89 IDEA8 4 and GOST28147 89 RFWKIDEA8 4 based on networks IDEA8 4 and RFWKIDEA8 4 with the use the round function of the encryption algorithm GOST 28147 89 The block length of created block encryption algorithm is 256 bits the number of rounds is 8 12 and 16![Creative Commons License](http://i.creativecommons.org/l/by/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright (c) 2016 Authors and Global Journals Private Limited
Similar Articles
- Mehraj Ali. U, Enhancement of Map Function Image Processing System using DHRF Algorithm on Big Data in the Private Cloud Tool , Global Journal of Computer Science and Technology: Vol. 14 No. B2 (2014): GJCST-B Cloud & Distributed: Volume 14 Issue B2
- Ikechukwu Innocent Umeh PhD, A 3 Tier Open ICT Ecosystem Network Design (3TOIEND) to Enhance Utilization of Local ICT Infrastructure VIA Campus WLAN , Global Journal of Computer Science and Technology: Vol. 22 No. E2 (2022): GJCST-E Network, Web & Security: Volume 22 Issue E2
- Gulom Tuychiev, The Encryption Algorithms AES-PES16-1 and AES-RFWKPES16-1 based on Networks PES16-1 and RFWKPES16-1 , Global Journal of Computer Science and Technology: Vol. 15 No. E4 (2015): GJCST-E Network, Web & Security: Volume 15 Issue E4
- Nanda P, Gateway Placement in Mesh Network using Traffic Offloading through 2G/3G Networks , Global Journal of Computer Science and Technology: Vol. 16 No. E6 (2016): GJCST-E Network, Web & Security: Volume 16 Issue E6
- Prachi Agarwal, Dr. Anil Kumar Sharma, Adesh Kumar, Synthesis Approach of 2D Mesh Network Inter Communication (2D-2D) using Network on Chip , Global Journal of Computer Science and Technology: Vol. 13 No. E12 (2013): GJCST-E Network, Web & Security: Volume 13 Issue E12
- Tuychiev Gulom, The Encryption Algorithms GOST-IDEA16-2 and GOST-RFWKIDEA16-2 , Global Journal of Computer Science and Technology: Vol. 16 No. E3 (2016): GJCST-E Network, Web & Security: Volume 16 Issue E3
- Gorti VNKV Subba Rao, An Efficient Secure Message Transmission in Mobile Ad Hoc Networks using Enhanced Homomorphic Encryption Scheme , Global Journal of Computer Science and Technology: Vol. 13 No. E9 (2013): GJCST-E Network, Web & Security: Volume 13 Issue E9
- Sridhara S B, Dr. Ramesh B, Qos Provisioning for Energy Efficiency in Mobile Ad-Hoc Network , Global Journal of Computer Science and Technology: Vol. 15 No. E5 (2015): GJCST-E Network, Web & Security: Volume 15 Issue E5
- Narendra Panwar, Cryptanalysis and Further Improvement of a Dynamic ID and Smart Card based Remote user Authentication Scheme , Global Journal of Computer Science and Technology: Vol. 16 No. E4 (2016): GJCST-E Network, Web & Security: Volume 16 Issue E4
- Rajdeep S. Shaktawat, Gaurav Jain, Kalpana Jain, Identity Mapping Scheme with CBDS Approach to Secure MANET , Global Journal of Computer Science and Technology: Vol. 15 No. E7 (2015): GJCST-E Network, Web & Security: Volume 15 Issue E7
You may also start an advanced similarity search for this article.