2023
DOI: 10.37394/23209.2023.20.6
|View full text |Cite
|
Sign up to set email alerts
|

Encryption Methods and Algorithms Based on Domestic Standards in Open-Source Operating Systems

Abstract: The paper describes the principles and methods underlying the creation of an application in secure operating systems, which provides reliable data encryption. The research aims to analyze and indicate the specifics of encryption methods and algorithms based on domestic standards in open-source operating systems. Cryptanalysis was used in the article, as this avoids vulnerabilities identified in previously created implementations. In the article, the authors draw attention to the fact that 7-Zip uses CBC encryp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…The ECB and CBC have been foundational, with the ECB's simplicity being offset by its vulnerability to pattern analysis due to identical plaintext blocks producing identical ciphertext blocks [5]. CBC mode improved security by introducing data dependency through the XOR operation with the previous ciphertext block, although it also required careful management of initialization vectors (IVs) to prevent attacks [6]. The advent of CTR mode brought a paradigm shift with operations, highlighting the importance of non-repeating counters for maintaining security [7].…”
Section: Introductionmentioning
confidence: 99%
“…The ECB and CBC have been foundational, with the ECB's simplicity being offset by its vulnerability to pattern analysis due to identical plaintext blocks producing identical ciphertext blocks [5]. CBC mode improved security by introducing data dependency through the XOR operation with the previous ciphertext block, although it also required careful management of initialization vectors (IVs) to prevent attacks [6]. The advent of CTR mode brought a paradigm shift with operations, highlighting the importance of non-repeating counters for maintaining security [7].…”
Section: Introductionmentioning
confidence: 99%