{"id":13376,"date":"2022-08-21T10:59:49","date_gmt":"2022-08-21T07:59:49","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=13376"},"modified":"2022-10-04T08:49:32","modified_gmt":"2022-10-04T05:49:32","slug":"metod-pidvyshhennya-efektyvnosti-symetrychnogo-blokovogo-shyfruvannya","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=13376","title":{"rendered":"\u041c\u0435\u0442\u043e\u0434 \u043f\u0456\u0434\u0432\u0438\u0449\u0435\u043d\u043d\u044f \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u0441\u0438\u043c\u0435\u0442\u0440\u0438\u0447\u043d\u043e\u0433\u043e \u0431\u043b\u043e\u043a\u043e\u0432\u043e\u0433\u043e \u0448\u0438\u0444\u0440\u0443\u0432\u0430\u043d\u043d\u044f"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u041c\u0415\u0422\u041e\u0414 \u041f\u0406\u0414\u0412\u0418\u0429\u0415\u041d\u041d\u042f \u0415\u0424\u0415\u041a\u0422\u0418\u0412\u041d\u041e\u0421\u0422\u0406 \u0421\u0418\u041c\u0415\u0422\u0420\u0418\u0427\u041d\u041e\u0413\u041e \u0411\u041b\u041e\u041a\u041e\u0412\u041e\u0413\u041e \u0428\u0418\u0424\u0420\u0423\u0412\u0410\u041d\u041d\u042f<\/p>\n<p style=\"text-align: center;\">THE METHOD OF INCREASING THE EFFICIENCY OF SYMMETRICAL BLOCK ENCRYPTION<\/p>\n<p><strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 191-197. \u041d\u043e\u043c\u0435\u0440: \u21164, 2022 (311)\u00a0\u00a0<a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2022\/08\/vknu-ts-2022-n4311-191-197.pdf\"> <img loading=\"lazy\" class=\"size-full wp-image-69 alignnone\" src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" alt=\"\" width=\"76\" height=\"32\" \/><\/a>  <\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u041f\u0410\u0422\u041b\u0410\u041d\u042c \u0414. \u0412.<br \/>\n\u0427\u0435\u0440\u043a\u0430\u0441\u044c\u043a\u0438\u0439 \u0434\u0435\u0440\u0436\u0430\u0432\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\n<a href=\"https:\/\/orcid.org\/0000-0003-3773-1619\">https:\/\/orcid.org\/0000-0003-3773-1619<\/a><br \/>\ne-mail: <a href=\"mailto:d.v.patlan.fetr18@chdtu.edu.ua\">d.v.patlan.fetr18@chdtu.edu.ua<\/a><br \/>\n\u041f\u0410\u041b\u0410\u0413\u0406\u041d\u0410 \u041e. \u0410.<br \/>\n\u0427\u0435\u0440\u043a\u0430\u0441\u044c\u043a\u0438\u0439 \u0434\u0435\u0440\u0436\u0430\u0432\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\n<a href=\"https:\/\/orcid.org\/0000-0002-5395-5092\">https:\/\/orcid.org\/0000-0002-5395-5092<\/a><br \/>\ne-mail: <a href=\"mailto:palahina@ukr.net\">palahina@ukr.net<\/a><br \/>\n\u0406\u0412\u0427\u0415\u041d\u041a\u041e \u041e. \u0412.<br \/>\n\u0427\u0435\u0440\u043a\u0430\u0441\u044c\u043a\u0438\u0439 \u0434\u0435\u0440\u0436\u0430\u0432\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\n<a href=\"https:\/\/orcid.org\/0000-0002-6716-1939\">https:\/\/orcid.org\/0000-0002-6716-1939<\/a><br \/>\ne-mail: <a href=\"mailto:sania_ivchenko@ukr.net\">sania_ivchenko@ukr.net<\/a><br \/>\n\u041f\u0410\u041b\u0410\u0413\u0406\u041d \u0412. \u0412.<br \/>\n\u0427\u0435\u0440\u043a\u0430\u0441\u044c\u043a\u0438\u0439 \u0434\u0435\u0440\u0436\u0430\u0432\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\n<a href=\"https:\/\/orcid.org\/0000-0003-1903-6022\">https:\/\/orcid.org\/0000-0003-1903-6022<\/a><br \/>\ne-mail: <a href=\"mailto:palahin@ukr.net\">palahin@ukr.net<\/a><br \/>\nDana PATLAN, Elena PALAHINA, Oleksandr IVCHENKO, Volodymyr PALAHIN<br \/>\nCherkassy State Technological University<br \/>\n<strong>DOI:<\/strong>\u00a0<a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2022-311-4-191-197\">https:\/\/www.doi.org\/10.31891\/2307-5732-2022-311-4-191-197<\/a><\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412 \u0440\u043e\u0431\u043e\u0442\u0456 \u043f\u043e\u043a\u0430\u0437\u0430\u043d\u0430 \u043c\u043e\u0434\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u044f \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0443 \u0431\u043b\u043e\u043a\u043e\u0432\u043e\u0433\u043e \u0441\u0438\u043c\u0435\u0442\u0440\u0438\u0447\u043d\u043e\u0433\u043e \u0448\u0438\u0444\u0440\u0443\u0432\u0430\u043d\u043d\u044f AES (Advanced Encryption Standard). \u041f\u0440\u0438 \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u043d\u0456\u0439 \u0440\u0435\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u0457 \u043c\u043e\u0434\u0438\u0444\u0456\u043a\u043e\u0432\u0430\u043d\u043e\u0433\u043e \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0443 \u043f\u043e\u043a\u0430\u0437\u0430\u043d\u0430 \u043c\u043e\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u043e\u0431\u2019\u0454\u0434\u043d\u0430\u043d\u043d\u044f \u0440\u044f\u0434\u0443 \u043c\u0430\u0442\u0435\u043c\u0430\u0442\u0438\u0447\u043d\u0438\u0445 \u043e\u043f\u0435\u0440\u0430\u0446\u0456\u0439, \u044f\u043a\u0456 \u043c\u0430\u044e\u0442\u044c \u0441\u0445\u043e\u0436\u0438\u0439 \u043f\u0440\u0438\u043d\u0446\u0438\u043f \u043e\u043f\u0440\u0430\u0446\u044e\u0432\u0430\u043d\u043d\u044f \u0435\u043b\u0435\u043c\u0435\u043d\u0442\u0456\u0432, \u0449\u043e \u0434\u043e\u0437\u0432\u043e\u043b\u0438\u043b\u043e \u0441\u043a\u043e\u0440\u043e\u0442\u0438\u0442\u0438 \u0447\u0430\u0441 \u043e\u0431\u0440\u043e\u0431\u043a\u0438 \u0434\u0430\u043d\u0438\u0445 \u043f\u0440\u0438 \u0457\u0445 \u0448\u0438\u0444\u0440\u0443\u0432\u0430\u043d\u043d\u0456 \u0442\u0430 \u0434\u0435\u0448\u0438\u0444\u0440\u0443\u0432\u0430\u043d\u043d\u0456 \u0443 \u043f\u043e\u0440\u0456\u0432\u043d\u044f\u043d\u043d\u0456 \u0437 \u0432\u0456\u0434\u043e\u043c\u043e\u044e \u0440\u0435\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u0454\u044e. \u041a\u0440\u0456\u043c \u0442\u043e\u0433\u043e, \u0432 \u0443\u0434\u043e\u0441\u043a\u043e\u043d\u0430\u043b\u0435\u043d\u0456\u0439 \u0440\u0435\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u0457 \u043e\u043f\u0435\u0440\u0430\u0446\u0456\u044f MixColumns \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0454 \u043f\u043e\u043f\u0435\u0440\u0435\u0434\u043d\u044c\u043e \u043e\u0431\u0447\u0438\u0441\u043b\u0435\u043d\u0456 \u0442\u0430\u0431\u043b\u0438\u0446\u0456 \u043f\u043e\u0448\u0443\u043a\u0443 \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u043e\u0433\u043e \u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044f, \u0449\u043e \u0442\u0430\u043a\u043e\u0436 \u0441\u043f\u0440\u0438\u044f\u0454 \u043f\u0456\u0434\u0432\u0438\u0449\u0435\u043d\u043d\u044e \u0448\u0432\u0438\u0434\u043a\u043e\u0434\u0456\u0457 \u043f\u0435\u0440\u0435\u0442\u0432\u043e\u0440\u0435\u043d\u044c, \u0430\u043b\u0435 \u0437\u0430 \u0440\u0430\u0445\u0443\u043d\u043e\u043a \u0431\u0456\u043b\u044c\u0448\u043e\u0433\u043e \u043e\u0431\u0441\u044f\u0433\u0443 \u043f\u0430\u043c\u2019\u044f\u0442\u0456 \u0434\u043b\u044f \u0440\u043e\u0437\u043c\u0456\u0440\u0443 \u043a\u043e\u0434\u0443.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0431\u043b\u043e\u043a\u043e\u0432\u0438\u0439 \u0448\u0438\u0444\u0440, \u0441\u0438\u043c\u0435\u0442\u0440\u0438\u0447\u043d\u0435 \u043a\u043e\u0434\u0443\u0432\u0430\u043d\u043d\u044f, \u043e\u0431\u2019\u0454\u0434\u043d\u0430\u043d\u043d\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0456\u0439 \u043e\u0431\u0440\u043e\u0431\u043a\u0438 \u0434\u0430\u043d\u0438\u0445, \u043e\u043f\u0442\u0438\u043c\u0456\u0437\u0430\u0446\u0456\u044f \u0447\u0430\u0441\u0443 \u043e\u0431\u0440\u043e\u0431\u043a\u0438 \u0434\u0430\u043d\u0438\u0445.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u00a0\u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>Ensuring data safety and security are relevant in any sphere of human activity, which is directly related to the implementation of modern and advanced symmetric and asymmetric algorithms and methods of cryptographic protection of information. One of the well-known and safe encryption algorithms, known as AES (Advanced Encryption Standard), which is endowed with the properties of ease of practical implementation and high reliability, has found its wide application for block symmetric data encryption. A feature of symmetric encryption is the processing of large amounts of information, the use of the same key for encryption and decryption, high reliability of data protection. This paper proposes to improve this algorithm to provide faster data processing. All modifications of the AES transformations do not reduce the high cryptographic strength of the cipher, and their principles are described in detail in the paper. This practical implementation of the optimized algorithm shows the possibility of combining a number of mathematical operations that have a similar principle of processing elements, which allowed to reduce the processing time. In addition, in the improved implementation the MixColumns operation uses pre-calculated lookup tables of the required value, which also helps to increase the speed of transformations but at the cost of more memory for the code size. A comparative analysis of the practical implementation of the standard and optimized AES cryptoalgorithms has been carried out, and numerical indicators of the processing time of test data have been obtained, which are presented in the form of tables. Graphs of the dependence of the encryption and decryption procedure execution time on the file size for the standard and optimized AES algorithms have been constructed. The results show a significant percentage of optimization &#8211; up to 50% for encryption and up to 75% for decryption of data.<br \/>\n<strong>Keywords:<\/strong> block cipher, symmetric coding, combining data processing operations, optimization of data processing time.<\/p>\n<p style=\"text-align: center;\"><strong>\u041b\u0456\u0442\u0435\u0440\u0430\u0442\u0443\u0440\u0430<\/strong><\/p>\n<ol>\n<li>FIPS PUB 197. Specification for the Advanced Encryption Standard (AES), 2001.<\/li>\n<li>Daoud L., Hussein F., Rafla N.. Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS). EPiC Series in Computing. 2019. V.58, P.36-44.<\/li>\n<li>Soltani A., Sharifian S.. An ultra-high throughput and fully pipelined implementation of AES algorithm on FPGA. <em>Microprocessors and Microsystems<\/em>. 2015. V.39, No.7, P.480-493.<\/li>\n<li>Karthigaikumar P., Anitha Christy N., Siva Mangai N. M.. PSP CO2: an efficient hardware architecture for AES algorithm for high throughput. <em>Wireless Personal Communications<\/em>. 2015. V.85, No.1, P.305\u2013323.<\/li>\n<li>Taufik M., Amin D. E., Saifuddin M. A.. Hardware implementation and optimization of advanced encryption standard (AES) algorithm based on CCSDS. <em>AIP Conference Proceedings. <\/em> V.2226, P.060004<\/li>\n<li>Liu Y., Xu \u0425., Su H.. AES Algorithm Optimization and FPGA Implementation. <em>IOP Conf. Series: Earth and Environmental Science.<\/em> V.267, No.4, P. 042070.<\/li>\n<li>S., Vaishnavi.M., Vinothini.M., Umadevi.V.. Optimization of aes algorithm using hardware and software. <em>International Journal of Scientific &amp; Engineering Research<\/em>. 2015. V.6, No.4, P.965-971<\/li>\n<li>Li M., Gan J., Cheng S., Hu X.,Yu Y., Li J.. Design of Lightweight AES Algorithm Based on Masked Lookup Table. <em>IEEE 7th International Conference on Computer Science and Network Technology (ICCSNT)<\/em>. P.437-441.<\/li>\n<li>James M., Kumar D. S.. An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced Encryption Standard. <em>International Journal of Computational Engineering Research (IJCER). <\/em> V.6, No.3, P. 25-28.<\/li>\n<li>\u0413\u043e\u0440\u0431\u0435\u043d\u043a\u043e \u0414., \u0422\u043e\u0446\u044c\u043a\u0438\u0439 \u041e. \u0421., \u041a\u0430\u0437\u044c\u043ci\u043d\u0430 \u0421. \u0412. \u041f\u0435\u0440\u0441\u043f\u0435\u043a\u0442\u0438\u0432\u043d\u0438\u0439 \u0431\u043b\u043e\u043a\u043e\u0432\u0438\u0439 \u0448\u0438\u0444\u0440 \u00ab\u041a\u0430\u043b\u0438\u043d\u0430\u00bb \u2013 \u043e\u0441\u043d\u043e\u0432\u043di \u043f\u043e\u043b\u043e\u0436\u0435\u043d\u043d\u044f \u0442\u0430 \u0441\u043f\u0435\u0446\u0438\u0444i\u043a\u0430\u0446i\u044f \/\/ \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u0430 \u0440\u0430\u0434i\u043e\u0435\u043b\u0435\u043a\u0442\u0440\u043e\u043di\u043a\u0430. \u2014 \u0425\u0430\u0440\u043ai\u0432\u0441\u044c\u043a\u0438\u0439 \u043d\u0430\u0446i\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043di\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 \u0440\u0430\u0434i\u043e\u0435\u043b\u0435\u043a\u0442\u0440\u043e\u043di\u043a\u0438, 2007.- \u0442.6, \u21162. \u2014 195-208 c.<\/li>\n<li>\u041a\u0430\u043b\u0438\u043d\u0438\u043d \u0414.\u0410., \u041a\u043e\u0437\u0438\u043d\u0430 \u0413.\u041b. \u0411\u044b\u0441\u0442\u0440\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u0448\u0438\u0444\u0440\u043e\u0432 \u00ab\u041a\u0430\u043b\u0438\u043d\u0430\u00bb \u0438 \u00abAES\u00bb. \/\/ \u0420\u0430\u0434\u0456\u043e\u0435\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u0456\u043a\u0430, \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0442\u0438\u043a\u0430, \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f. 2013, \u21161, \u0441.62-65.<\/li>\n<li>Khatri, R. Chhabra, N. Gupta, A. Khanna and D. Gupta, &#8220;Secure modified aes algorithm for static and mobile networks&#8221;,\u00a0<em>International Conference on Innovative Computing and Communications<\/em>, pp. 389-399, 2020.<\/li>\n<li><a href=\"https:\/\/ieeexplore.ieee.org\/author\/37088840236\">Sadi Arman<\/a>;\u00a0<a href=\"https:\/\/ieeexplore.ieee.org\/author\/37088839664\">Tanjila Rehnuma<\/a>;\u00a0<a href=\"https:\/\/ieeexplore.ieee.org\/author\/37088837860\">Mahfuzur Rahman<\/a>. Design and Implementation of a Modified AES Cryptography with Fast Key Generation Technique. <a href=\"https:\/\/ieeexplore.ieee.org\/xpl\/conhome\/9397876\/proceeding\">2020 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE)<\/a>, 26-27 December 2020, 191-195.<\/li>\n<li>Stallings W.. Cryptography and network security: principles and practice; vol. 6. Pearson Education; 2017.<\/li>\n<li>Rijndael MixColumns. URL: <a href=\"https:\/\/en.wikipedia.org\/wiki\/Rijndael_MixColumns\">https:\/\/en.wikipedia.org\/wiki\/Rijndael_MixColumns<\/a><\/li>\n<li>Riyaldhi R., Kurniawan A.. Improvement of advanced encryption standard algorithm with shift row and S. box modification mapping in mix column. <em>Procedia computer science<\/em>. 2017. V.116, P.401-407.<\/li>\n<\/ol>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>FIPS PUB 197. Specification for the Advanced Encryption Standard (AES), 2001.<\/li>\n<li>Daoud L., Hussein F., Rafla N.. Optimization of Advanced Encryption Standard (AES) Using Vivado High Level Synthesis (HLS). <em>EPiC Series in Computing<\/em>. 2019. V.58, P.36-44.<\/li>\n<li>Soltani A., Sharifian S.. An ultra-high throughput and fully pipelined implementation of AES algorithm on FPGA. <em>Microprocessors and Microsystems<\/em>. V.39, No.7, P.480-493.<\/li>\n<li>Karthigaikumar P., Anitha Christy N., Siva Mangai N. M.. PSP CO2: an efficient hardware architecture for AES algorithm for high throughput. <em>Wireless Personal Communications<\/em>. 2015. V.85, No.1, P.305\u2013323.<\/li>\n<li>Taufik M., Amin D. E., Saifuddin M. A.. Hardware implementation and optimization of advanced encryption standard (AES) algorithm based on CCSDS. <em>AIP Conference Proceedings. <\/em> V.2226, P.060004<\/li>\n<li>Liu Y., Xu \u0425., Su H.. AES Algorithm Optimization and FPGA Implementation. <em>IOP Conf. Series: Earth and Environmental Science.<\/em> V.267, No.4, P. 042070.<\/li>\n<li>S., Vaishnavi.M., Vinothini.M., Umadevi.V.. Optimization of aes algorithm using hardware and software. <em>International Journal of Scientific &amp; Engineering Research<\/em>. 2015. V.6, No.4, P.965-971<\/li>\n<li>Li M., Gan J., Cheng S., Hu X.,Yu Y., Li J.. Design of Lightweight AES Algorithm Based on Masked Lookup Table. <em>IEEE 7th International Conference on Computer Science and Network Technology (ICCSNT)<\/em>. 2019. P.437-441.<\/li>\n<li>James M., Kumar D. S.. An Optimized Parallel Mixcolumn and Subbytes design in Lightweight Advanced Encryption Standard. <em>International Journal of Computational Engineering Research (IJCER). <\/em> V.6, No.3, P. 25-28.<\/li>\n<li>Gorbenko I. D., Totsky O. S., Kazmina S. V. Promising block cipher &#8220;Kalina&#8221; &#8211; the main provisions of the specification \/\/ Applied Radio Electronics. \u2013 Kharkiv National University of Radio Electronics, 2007.- \u0442.6, \u21162. \u2014 195-208 c.<\/li>\n<li>Kalinin D.A., Kozina G.L. The speed of the Kalina and AES ciphers. \/\/ Radioelectronics, informatics, management, 2013, \u21161, p.62-65.<\/li>\n<li>Khatri, R. Chhabra, N. Gupta, A. Khanna and D. Gupta, &#8220;Secure modified aes algorithm for static and mobile networks&#8221;,\u00a0<em>International Conference on Innovative Computing and Communications<\/em>, pp. 389-399, 2020.<\/li>\n<li><a href=\"https:\/\/ieeexplore.ieee.org\/author\/37088840236\">Sadi Arman<\/a>;\u00a0<a href=\"https:\/\/ieeexplore.ieee.org\/author\/37088839664\">Tanjila Rehnuma<\/a>;\u00a0<a href=\"https:\/\/ieeexplore.ieee.org\/author\/37088837860\">Mahfuzur Rahman<\/a>. Design and Implementation of a Modified AES Cryptography with Fast Key Generation Technique. <a href=\"https:\/\/ieeexplore.ieee.org\/xpl\/conhome\/9397876\/proceeding\">2020 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE)<\/a>, 26-27 December 2020, 191-195.<\/li>\n<li>Stallings W.. Cryptography and network security: principles and practice; vol. 6. Pearson Education; 2017.<\/li>\n<li>Rijndael MixColumns. URL: <a href=\"https:\/\/en.wikipedia.org\/wiki\/Rijndael_MixColumns\">https:\/\/en.wikipedia.org\/wiki\/Rijndael_MixColumns<\/a><\/li>\n<li>Riyaldhi R., Kurniawan A.. Improvement of advanced encryption standard algorithm with shift row and S. box modification mapping in mix column. <em>Procedia computer science<\/em>. 2017. V.116, P.401-407.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[67],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/13376"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13376"}],"version-history":[{"count":6,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/13376\/revisions"}],"predecessor-version":[{"id":14202,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/13376\/revisions\/14202"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}