The Evaluation of the Cryptographic Strength of Asymmetric Encryption Algorithms
Title | The Evaluation of the Cryptographic Strength of Asymmetric Encryption Algorithms |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Innokentievich, T. P., Vasilevich, M. V. |
Conference Name | 2017 Second Russia and Pacific Conference on Computer Technology and Applications (RPC) |
Keywords | Algorithm design and analysis, assessment, Asymmetric Encryption, asymmetric encryption algorithm, asymmetric encryption algorithms, Clustering algorithms, compositionality, computer technology, cryptographic strength, cryptography, durability, Elliptic curves, Encryption, GOST R 34.10-2001 algorithm, Human Behavior, method, Metrics, pubcrawl, resilience, Resiliency, Resistance, RSA algorithm, Supercomputers |
Abstract | We propose a method for comparative analysis of evaluation of the cryptographic strength of the asymmetric encryption algorithms RSA and the existing GOST R 34.10-2001. Describes the fundamental design ratios, this method is based on computing capacity used for decoding and the forecast for the development of computer technology. |
URL | https://ieeexplore.ieee.org/document/8168094/ |
DOI | 10.1109/RPC.2017.8168094 |
Citation Key | innokentievich_evaluation_2017 |
- Elliptic curves
- Supercomputers
- RSA algorithm
- Resistance
- Resiliency
- resilience
- pubcrawl
- Metrics
- method
- Human behavior
- GOST R 34.10-2001 algorithm
- encryption
- Algorithm design and analysis
- durability
- Cryptography
- cryptographic strength
- computer technology
- Compositionality
- Clustering algorithms
- asymmetric encryption algorithms
- asymmetric encryption algorithm
- Asymmetric Encryption
- Assessment