SYNTHESIS OF SETS OF NON-SYMMETRIC TWO-OPERAND TWO-BIT CRYPTO OPERATIONS WITHIN THE PERMUTATION ACCURACY
- 1. Cherkasy State Technological Universit
- 2. herkasy branch of the private higher educational institution "European University"
- 3. Department of the State Emergency Service of Ukraine in Cherkassy region, 1, prykordonnyka Lazarenka 0000-0002-7682-2970
Description
The object of research is the processes of building operations for cryptographic protection of information, as the requirements for information security are constantly increasing. Increasing the stability of cryptographic transformations directly depends on the complexity and variability of the crypto algorithm. It is possible to increase variability by increasing the range of crypto operations. Significantly increasing the number of crypto operations is possible through the synthesis of asymmetric operations. This paper is devoted to the creation of methodological support for the synthesis and analysis of sets of two-operand two-bit cryptographic operations with precision permutation. The conducted researches are based on the results of a computational experiment, which consists in the synthesis of two-operand two-bit crypto operations based on single-operand, with the subsequent search for pairs of operations of direct and correct inverse crypto transformation on the basis of complete search. In the course of the computational experiment, pairs of two-operand operations were presented, represented by tuples of four single-operand operations. The formalization of the results provided a mathematical representation of operations, suitable for practical implementation. To simplify the complexity of practical implementation, the synthesized operations are divided into 24 sets of 24 operations. Separation of operations occurred due to the use of templates of tables of truth of sets of operations with precision to permutation of operands. It is established that the entire set of operations can be constructed with the precision of permutation based on the use of the template of any operation. In addition, the analysis of the synthesized sets showed that the sets of symmetric and asymmetric operations do not intersect. 20 sets of asymmetric two-operand two-bit operations, as well as 4 sets of symmetric operations are obtained. Further investigation of each synthesized set of asymmetric crypto operations will allow for the relationship between the operands of the operation and between the operations as a whole. The use of synthesized asymmetric operations will improve the reliability of crypto algorithms for streaming encryption of information by significantly increasing the variability of cryptographic transformations. In turn, the use of synthesized sets of operations will simplify practical implementation in computer cryptography
Files
Synthesis of sets of non-symmetric two-operand two-bit crypto operations within the permutation accuracy.pdf
Files
(171.4 kB)
Name | Size | Download all |
---|---|---|
md5:335dde51fbe825528fad136bcbd94869
|
171.4 kB | Preview Download |
Additional details
References
- Rudnytskyi, V. M., Opirskyi, I. R., Melnyk, O. H., Pustovit, M. O. (2018). Syntez hrupy operatsii strohoho stiikoho kryptohrafichnoho koduvannia dlia pobudovy potokovykh shyfriv. Bezpeka informatsii, 24 (3), 195–200
- Pustovit, M. O., Melnyk, O. H., Sysoienko, S. H. (2017). Syntez operatsii obernenoho hrupovoho matrychnoho kryptohrafichnoho peretvorennia informatsii. Visnyk Cherkaskoho derzhavnoho tekhnolohichnoho universytetu. Seriia: Tekhnichni nauky, 4, 118–124.
- Bernstein, D., Buchmann, J., Dahmen, E. (2009). Post-quantum cryptography. Berlin: Springer, 246. doi: http://doi.org/10.1007/978-3-540-88702-7
- Lada, N. V., Kozlovska, S. H. (2018). Applying cryptographic addition operations by module twowith accuracy of permutation in stream ciphers. Control, Navigation and Communication Systems. Academic Journal, 1 (47), 127–130. doi: http://doi.org/10.26906/sunz.2018.1.127
- Adki, V., Hatkar, S. (2016). A Survey on Cryptography Techniques. International Journal of Advanced Research in Computer Science and Software Engineering, 6 (6), 469–475.
- Rudnytskyi, V., Opirskyy, I., Melnyk, O., Pustovit, M. (2019). The implementation of strict stable cryptographic coding operations. Advanced Information Systems, 3 (3), 109–112. doi: http://doi.org/10.20998/2522-9052.2019.3.15
- Ferguson, N., Schneier, B. (2003). Practical Cryptography: Designing and Implementing Secure Cryptographic Systems. Wiley, 432.
- Kozlovska, S. H. (2018). Syntez hrup dvokhoperandnykh operatsii kryptoperetvorennia na osnovi perestanovochnykh skhem. Suchasna spetsialna tekhnika, 4 (55), 44–50.
- Rudnitsky, V., Berdibayev, R., Breus, R., Lada, N., Pustovit, M. (2019). Synthesis of reverse two-bit dual-operated strictly straight cryptographic coding on the basis of another operation. Advanced Information Systems, 3 (4), 109–114. doi: http://doi.org/10.20998/2522-9052.2019.4.16
- Rudnytskyi, V. M., Lada, N. V., Babenko, V. H. (2018). Kryptohrafichne koduvannia: syntez operatsii potokovoho shyfruvannia z tochnistiu do perestanovky. Kharkiv: TOV «DISA PLIuS», 184.
- Lada, N., Kozlovska, S., Rudnitskaya, Y. (2019). Researching and Synthesizing a Group of Symmetric Modified Modulo-4 Addition Operations. Central Ukrainian Scientific Bulletin. Technical Sciences, 2 (33), 181–189. doi: http://doi.org/10.32515/2664-262x.2019.2(33).181-189
- Hoffstein, J., Pipher. J., Silverman. J. H. (2008). An Introduction to Mathematical Cryptography. Springer, 523. doi: http://doi.org/10.1007/978-1-4939-1711-2
- Mao, W. (2003). Modern Cryptography: Theory and Practice. Prentice Hall PTR, 648.
- Melnyk, R. P. (2012). Zastosuvannia operatsii rozshyrenoho matrychnoho kryptohrafichnoho peretvorennia dlia zakhystu informatsii. Systemy obrobky informatsii, 9 (107), 145–147.
- Rudnytskyi, V. M. (Ed.) (2018). Kryptohrafichne koduvannia: obrobka ta zakhyst informatsii. Kharkiv: TOV «DISA PLIuS», 139.