SYNTHESIS OF REVERSE TWO-BIT DUAL-OPERATED STRICTLY STRAIGHT CRYPTOGRAPHIC CODING ON THE BASIS OF ANOTHER OPERATION
Main Article Content
Abstract
Based on the analysis of a group of two-bit two-operand operations of strict stable cryptographic coding, the relations between direct and inverse operations are established and formalized and their correctness is proved. Applying the technology of combining single-operand strict rigorous cryptographic coding into two-operand operations and using established interconnections, we propose a method of synthesis of inverse operations for known direct operations. This method provides the construction of the inverse operation by converting the second operand of two-bit two-operand operations of strict stable cryptographic coding. The article examines the entire sequence of mathematical transformations that provides the synthesis of a formalized operation model, suitable for practical application in crypto primitives, by constructing models of the relationships between operations and the synthesis of a reverse operation model. The synthesized operations are implemented both at the software and hardware levels and provide the ease of achieving the effect of strictly stable cryptographic coding.
Article Details
References
Babenko, V.G., Melnyk, R.P. and Gonchar, S.V. (2014), “Evaluation of the efficiency of using cryptographic transformation operations”, Bulletin of the Academy of Engineering of Ukraine, Vol. 2, pp. 39–41.
Golub, S.V., Babenko, V.G., Rudnitsky, S.V. and Melnyk R.P. (2012), “Improvement of the method of synthesis of operations of cryptographic transformation on the basis of discrete-algebraic representation of operations”, Control, navigation and communication systems, PNTU, Poltava, No. 2 (22), pp. 163–168.
Babenko, V.G., Mironets, I.V. and Rudnitsky, S.V. (2011), “Decoding of information in a group of two-bit operations of cryptographic transformation”, Control, navigation and communication systems, PNTU, Poltava, Vol. 4 (20), pp. 208–212.
Rudnitsky, V.M., Shuvalova, L.A. and Nesterenko, O.B. (2017), “Analysis of two-bit operations of a cryptographic coding on the criterion of a strict avalanche effect”, Scientific works: Scientific and Methodological Journal, pp. 74–77.
Nesterenko, O.B., Rudnitsky, V.M. and Shuvalova, L.A. (2017), “Synthesis of cryptographic transformation operations according to the criterion of strict stable coding”, Bulletin of the Academy of Engineering of Ukraine, Vol. 3, pp. 105–108.
Rudnitsky, V.M., Shuvalova, L.A. and Nesterenko, O.B. (2017), “Method of synthesis of operations of cryptographic transformation by criterion of strict stable coding”, Cherkasy State Technological University Bulletin, Vol. 1, pp. 5–10.
Lada, N.V. and Kozlovskaya, S.G. (2018), “Application of operations of cryptographic addition module two with precision to permutation in streaming ciphers”, Control, navigation and communication systems, PNTU, Poltava, Vol. 1 (47), pp. 127–130, DOI: https://doi.org/10.26906/SUNZ.2018.1.127
Babenko, V.G. and Lada, N.V. (2018), “Synthesis and analysis of cryptographic addition operations module two”, Information processing systems, KhNUPS, Kharkiv, Vol. 2 (118), pp. 116–118.
Rudnitsky, V.M., Lada, N.V., Fedotova-Piven, I.M. and Pustovit, M.O. (2018), “Synthesis of inverted two-bit two-operand operations of strict stable cryptographic coding”, Information processing systems and methods, State Scientific Research Institute of the Ministry of Internal Affairs of Ukraine, Kyiv, Vol.4 (55), pp. 76–81.
Rudnitsky, V.M., Opirsky, I.M., Melnyk, O.G. and Pustovit M.A. (2018), “Synthesis of a group of strict stable cryptographic coding operations for constructing streaming ciphers”, Information security, Vol. 24, No. 3.
Rudnitsky, V.M., Lada, N.V., Fedotova-Piven, I.M., Pustovit, M.O. and Nesterenko, O.B. (2018), “Construction of two-bit two-operand operations of strict stable cryptographic coding”, Control, navigation and communication systems, PNTU, Poltava, Vol. 6 (52), pp. 113–115, DOI: https://doi.org/10.26906/SUNZ.2018.6.113