AASEC 2019 Conference

GOST Enhancement Key Processing with Triple Transposition Key
Robbi Rahim, Suprianto, Mochammad Tanzil Multazam,

Universiti Malaysia Perlis,
Universitas Muhammadiyah Sidoarjo


Abstract

The GOST algorithm is an algorithm that has good encryption and decryption speeds because the encryption and decryption process is simple with the use of keys that are not too good. Security in cryptographic ciphertext results is one of the factors that depends on the use of a good key too, one of the techniques that can be used is the Triple Transposition Key that processes keys as much as 3 x rounds with the transposition function. The Triple Transposition Key and GOST algorithms are combined during the key formation process so that the key obtained from the process of using the Triple Transposition Key algorithm is quite strong and minimizes the brute force attack. The use of the Triple Transposition Key algorithm on GOST can be used as an alternative to increase security on the key so that it does not have to have a combination of 2 or more algorithms that will only consume process resources and also do not significantly affect the speed of encryption and decryption.

Keywords: GOST algorithms, Triple Transposition Key, cryptographic ciphertext

Topic: Computer Science

Link: https://ifory.id/abstract-plain/d2ewDXLz6FYQ

Web Format | Corresponding Author (Mochammad Tanzil Multazam)