Tutubalin Pavel Innokentievich, Mokshin Vladimir Vasilevich
{"title":"非对称加密算法的密码强度评估","authors":"Tutubalin Pavel Innokentievich, Mokshin Vladimir Vasilevich","doi":"10.1109/RPC.2017.8168094","DOIUrl":null,"url":null,"abstract":"We propose a method for comparative analysis of evaluation of the cryptographic strength of the asymmetric encryption algorithms RSA and the existing GOST R 34.10-2001. Describes the fundamental design ratios, this method is based on computing capacity used for decoding and the forecast for the development of computer technology.","PeriodicalId":144625,"journal":{"name":"2017 Second Russia and Pacific Conference on Computer Technology and Applications (RPC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"The Evaluation of the cryptographic strength of asymmetric encryption algorithms\",\"authors\":\"Tutubalin Pavel Innokentievich, Mokshin Vladimir Vasilevich\",\"doi\":\"10.1109/RPC.2017.8168094\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose a method for comparative analysis of evaluation of the cryptographic strength of the asymmetric encryption algorithms RSA and the existing GOST R 34.10-2001. Describes the fundamental design ratios, this method is based on computing capacity used for decoding and the forecast for the development of computer technology.\",\"PeriodicalId\":144625,\"journal\":{\"name\":\"2017 Second Russia and Pacific Conference on Computer Technology and Applications (RPC)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Second Russia and Pacific Conference on Computer Technology and Applications (RPC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RPC.2017.8168094\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Second Russia and Pacific Conference on Computer Technology and Applications (RPC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RPC.2017.8168094","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Evaluation of the cryptographic strength of asymmetric encryption algorithms
We propose a method for comparative analysis of evaluation of the cryptographic strength of the asymmetric encryption algorithms RSA and the existing GOST R 34.10-2001. Describes the fundamental design ratios, this method is based on computing capacity used for decoding and the forecast for the development of computer technology.