2022 14th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) 2022
DOI: 10.1109/icumt57764.2022.9943350
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Strength Study of the Pseudorandom Sequences Generator Based on the Blender Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…Depending on the level of the OSI model, is carried out the information protection from unauthorized access (UAA), the following types of secrecy are distinguished: informational [2], structural [3], and energy [4]. To ensure information secrecy (cryptographic strength) [5], as a rule, cryptographic protocols are used [6]. Structural secrecy [7] is aimed at complicating the recognition of the structure of signal-code constructions and is implemented at the second level of the OSI model.…”
Section: Introductionmentioning
confidence: 99%
“…Depending on the level of the OSI model, is carried out the information protection from unauthorized access (UAA), the following types of secrecy are distinguished: informational [2], structural [3], and energy [4]. To ensure information secrecy (cryptographic strength) [5], as a rule, cryptographic protocols are used [6]. Structural secrecy [7] is aimed at complicating the recognition of the structure of signal-code constructions and is implemented at the second level of the OSI model.…”
Section: Introductionmentioning
confidence: 99%