References
[1] Luo Q. (ed.) Advancing Computing,
Communication, Control and Management.
Springer Berlin, Heidelberg, 2010.
[2] State Standard 28147-89. Information
Processing Systems. Cryptographic
Protection. Cryptographic Conversion
Algorithm (76907). (Accessed 25 June 2022)
Available online:
https://dnaop.com/html/76907_3.html.
[3] Mao V. Modern Cryptography: Theory and
Practice. M. Sudul (Ed.): Prentice Hall: New
Jersey, USA, 2003.
[4] Stallings V. Cryptography and Protection of
Networks: Principles and Practice, 7th Ed.;
Pearson, NY, 2016.
[5] Ferguson N., Schneier B. Practical
Cryptography. Publishing House "Williams",
1st Ed.; Wiley, 2003.
[6] Shannon C. E. Communication Theory in
Secret Systems. Bell System Technical
Journal, 1949, Vol. 28, No. 4, pp. 656-715.
[7] Ochilov N. Creating Secure File Systems in
Open-Source Operating Systems. WSEAS
Transactions on Systems, Vol. 21, pp. 221-
232, 2022.
https://doi.org/10.37394/23202.2022.21.24
[8] Schneier B. Applied Cryptography: Protocols,
Algorithms, and Source Code in C, 2nd Ed.;
Wiley, 2015.
[9] Algorithm for Cryptographic Transformation
GOST 28147 89. Domestic Data Encryption
Standard. Available online:
https://lawyersegezha.ru/en/ (Accessed 25
June 2022).
[10] ISO/IEC 18033-2, Information Technology
— Security Techniques — Encryption
Algorithms — Part 2: Asymmetric Ciphers.
Available Online: https://www.iso.org/
(Accessed 25 June 2022)
[11] Advanced Encryption Standard (AES).
Federal Information Processing Standards
Publication 197, November 26, 2001.
[12] National Institute of Standards and
Technology. The Keyed-Hash Message
Authentication Code (HMAC). Federal
Information Processing Standards Publication
198-1, July 2008. Available online:
https://csrc.nist.gov/publications/detail/fips/19
8/1/final (accessed 25 June 2022).
[13] National Institute of Standards and
Technology. SHA-3 Standard: Permutation-
Based Hash and Extendable-Output
Functions. Federal Information Processing
Standards Publication 202, August 2015.
Available online:
https://csrc.nist.gov/publications/detail/fips/20
2/final (accessed 25 June 2022).
[14] Dworkin M. Recommendation for Block
Cipher Modes of Operation. Methods and
Techniques. NIST Special Publication 800-
38A 2001 Edition. Available online:
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/n
istspecialpublication800-38a.pdf (accessed 25
June 2022).
[15] Dworkin M. Recommendation for Block
Cipher Modes of Operation: Three
Variants of Ciphertext Stealing for CBC
Mode. Addendum to NIST Special
Publication 800-38A, October 2010.
Available online:
https://nvlpubs.nist.gov/nistpubs/Legacy/S
P/nistspecialpublication800-38a-add.pdf
(accessed 25 June 2022).
[16] Rosulek M. The Joy of Cryptography.
Presents Modern Cryptography at a Level
Appropriate for Undergraduates. Oregon
State University, Corvallis, Oregon, USA,
2021. Available online:
https://joyofcryptography.com/pdf/book.pdf
(accessed 25 June 2022).
[17] Yeomans J. S. A Bicriterion Approach for
Generating Alternatives using Population-
based Algorithms. WSEAS Transactions on
Systems, Vol. 18, pp. 29-34, 2019.
[18] Holden J. The Mathematics of Secrets:
Cryptography from Caesar Ciphers to Digital
Encryption. Princeton University Press,
Illustrated Edition, 2018.
[19] Grimes R. A. Cryptography Apocalypse:
Preparing for the Day When Quantum
Computing Breaks Today’s Crypto. 1st Ed.;
Wiley, 2019.
[20] Bertram L. A., van Dooble, G. Nomenclatura
- Encyclopedia of modern Cryptography and
Internet Security - From AutoCrypt and
Exponential Encryption to Zero-Knowledge-
Proof Keys. 1st Ed.; Books on Demand, 2019.
[21] Easttom W. Modern Cryptography: Applied
Mathematics for Encryption and Information
Security. 1st Ed.; Springer, 2020.
[22] Bock L. Modern Cryptography for
Cybersecurity Professionals. Packt
Publishing, 2021.
[23] Mihailescu M. I., Nita, S. L. Pro
Cryptography and Cryptanalysis with
C++20: Creating and Programming
Advanced Algorithms. Apess: Berkeley,
California, 2021.
WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS
DOI: 10.37394/23209.2023.20.6
Madjit Malikovich Karimov,
Nizomiddin Najmiddin Ugli Ochilov,
Abdiqahhar Egamovich Tangirov