USSR State Standard GOST 28147-89 Information processing systems. Cryptographic protection. Cryptographic transformation algorithm.
Date of entry into force 07/01/90
KGS code: | П85 |
OKSTU code: | 5017 |
GRNTI rubricator index: | 500509 |
OKS code: | 35.040, 35.060, 35.080, 35.100, 35.140, 35.240 |
Type of standard: | Fundamental standards |
Type of requirements: | The document is marked * The indicators of this ND exceed the indicators of international and foreign ND |
This standard establishes a unified algorithm for cryptographic transformation for information processing systems in networks of electronic computers (ECM), individual computing complexes and ECM, which defines the rules for encrypting data and generating imitation inserts.
The cryptographic transformation algorithm is intended for hardware or software implementation, satisfies cryptographic requirements and, in terms of its capabilities, does not impose restrictions on the degree of secrecy of the information being protected.
The standard is mandatory for organizations, enterprises and institutions that use cryptographic protection of data stored and transmitted in computer networks, in individual computing complexes or in computers.
Terms used in this standard and their definitions
Term |
Definition |
Algorithm | According to GOST 19781 |
Gammating | The process of imposing a cipher gamma on open data according to a certain law |
Cipher gamma | A pseudo-random binary sequence generated by a given algorithm for encryption of open data and decryption of encrypted data |
Data | According to GOST 15971 |
Data encryption | The process of converting open data into encrypted data using a cipher |
Spoofing | Protection of encrypted communication system from imposition of false data |
Spoofing insert | A fixed-length piece of information obtained according to a certain rule from open data and a key, and added to encrypted data to ensure spoofing |
Communication channel | According to GOST 17657 |
Key | A specific secret state of some parameters of the algorithm for cryptographic data transformation, ensuring the selection of one transformation from a set of all possible ones for a given transformation algorithm |
Cryptographic protection | Data protection using cryptographic data transformation |
Cryptographic transformation | Transformation of data using encryption and/or generation of imitative insertion |
Decryption of data | The process of transforming encrypted data into open data using a cipher |
Synchronization package | Values of the initial open parameters of the cryptographic transformation algorithm |
Encryption equation | A ratio expressing the process of forming encrypted data from open data as a result of transformations specified by the cryptographic transformation algorithm |
Decryption equation | A ratio expressing the process of forming open data from encrypted data as a result of transformations specified by the cryptographic transformation algorithm |
Cipher | A set of reversible transformations of a set of possible open data into a set of possible encrypted data, carried out according to certain rules using keys |
Encryption | The process of encryption or decryption |