Zaiats, TarasBilenko, VolodymyrHlukhov, Valerii2023-04-212023-04-212022-06-062022-06-06Zaiats T. Features of using large keys in “Kalyna” algorithm / Taras Zaiats, Volodymyr Bilenko, Valerii Hlukhov // Advances in Cyber-Physical Systems. — Lviv : Lviv Politechnic Publishing House, 2022. — Vol 7. — No 1. — P. 55–62.https://ena.lpnu.ua/handle/ntb/57973The information security is playing an increasingly important role nowadays. Therefore, virus can be transmitted through the information in encrypted form. This is also applied to embedded systems. In this regard, the article is assigned to the topic of cryptocurrency protection in embedded systems. The article is focused on the algorithm of symmetric block transformation “Kalyna”. The algorithm has been developed in cooperation with the State Special Communications Service and leading Ukrainian scientists. The experience and results of international and open national competition of cryptographic algorithms have been taken into account. The algorithm is intended for gradual replacement of the interstate standard DSTU GOST 28147: 2009. Its differences from other data encryption standards used, both in Ukraine and in the world, have been analyzed. The stability of the “Kalyna” algorithm has been also analyzed using a high-bit key (512 bits) and its speed has been compared with other cryptographic protection algorithms.55-62enblock ciphercryptographic information protectiondata encryption standardsymmetric block transformation algorithmFeatures of using large keys in “Kalyna” algorithmArticle© Національний університет „Львівська політехніка“, 2022© Zaiats T., Bilenko V., Hlukhov V., 20228https://doi.org/10.23939/acps2021.01.055Zaiats T., Bilenko V., Hlukhov V. (2022) Features of using large keys in “Kalyna” algorithm. Advances in Cyber-Physical Systems (Lviv), vol. 7, no 1, pp. 55-62.