State Standard of the USSR GOST 28147-89

logo11d 4 1

USSR State Standard GOST 28147-89 Information processing systems. Cryptographic protection. Cryptographic transformation algorithm.

Date of entry into force 07/01/90

KGS code: П85
OKSTU code: 5017
GRNTI rubricator index: 500509
OKS code: 35.040, 35.060, 35.080, 35.100, 35.140, 35.240
Type of standard: Fundamental standards
Type of requirements: The document is marked * The indicators of this ND exceed the indicators of international and foreign ND

This standard establishes a unified algorithm for cryptographic transformation for information processing systems in networks of electronic computers (ECM), individual computing complexes and ECM, which defines the rules for encrypting data and generating imitation inserts.

The cryptographic transformation algorithm is intended for hardware or software implementation, satisfies cryptographic requirements and, in terms of its capabilities, does not impose restrictions on the degree of secrecy of the information being protected.

The standard is mandatory for organizations, enterprises and institutions that use cryptographic protection of data stored and transmitted in computer networks, in individual computing complexes or in computers.

Terms used in this standard and their definitions

Term

Definition

Algorithm According to GOST 19781
Gammating The process of imposing a cipher gamma on open data according to a certain law
Cipher gamma A pseudo-random binary sequence generated by a given algorithm for encryption of open data and decryption of encrypted data
Data According to GOST 15971
Data encryption The process of converting open data into encrypted data using a cipher
Spoofing Protection of encrypted communication system from imposition of false data
Spoofing insert A fixed-length piece of information obtained according to a certain rule from open data and a key, and added to encrypted data to ensure spoofing
Communication channel According to GOST 17657
Key A specific secret state of some parameters of the algorithm for cryptographic data transformation, ensuring the selection of one transformation from a set of all possible ones for a given transformation algorithm
Cryptographic protection Data protection using cryptographic data transformation
Cryptographic transformation Transformation of data using encryption and/or generation of imitative insertion
Decryption of data The process of transforming encrypted data into open data using a cipher
Synchronization package Values ​​of the initial open parameters of the cryptographic transformation algorithm
Encryption equation A ratio expressing the process of forming encrypted data from open data as a result of transformations specified by the cryptographic transformation algorithm
Decryption equation A ratio expressing the process of forming open data from encrypted data as a result of transformations specified by the cryptographic transformation algorithm
Cipher A set of reversible transformations of a set of possible open data into a set of possible encrypted data, carried out according to certain rules using keys
Encryption The process of encryption or decryption
    Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
    Принять