THE IMPLEMENTATION OF STRICT STABLE CRYPTOGRAPHIC CODING OPERATIONS

Main Article Content

Volodymyr Rudnytskyi
https://orcid.org/0000-0003-3473-7433
Ivan Opirskyy
https://orcid.org/0000-0002-8461-8996
Olga Melnyk
https://orcid.org/0000-0002-9671-108X
Mykhaylo Pustovit
https://orcid.org/0000-0001-5313-1459

Abstract

According to the results of the study, it was established that the implementation of strict, stable cryptographic coding operations at the hardware and software levels does not cause difficulties, and in its simplicity and speed of implementation meets the requirements for implementation in stream encryption systems. Installed features and differences in various embodiments. In the hardware implementation, permutations will be performed between the bits to be processed, and in the software implementation, between the bits of the bytes of the same name that are processed. Regardless of the implementation option, according to the results of the operation, exactly half of the bits that took part in the conversion will be inverted, which ensures the maximum uncertainty of the encryption results.

Article Details

How to Cite
Rudnytskyi, V., Opirskyy, I., Melnyk, O., & Pustovit, M. (2019). THE IMPLEMENTATION OF STRICT STABLE CRYPTOGRAPHIC CODING OPERATIONS. Advanced Information Systems, 3(3), 109–112. https://doi.org/10.20998/2522-9052.2019.3.15
Section
Methods of information systems protection
Author Biographies

Volodymyr Rudnytskyi, Cherkasy State Technological University, Cherkasy

Doctor of Technical Sciences, Professor, Head of Information Security and Computer Engineering Department

Ivan Opirskyy, Lviv Polytechnic National University, Lviv

Doctor of Technical Sciences, Associate Professor, Associate Professor of Information Protection Department

Olga Melnyk, Cherkasy Institute of Fire Safety named after Chornobyl Heroes, Cherkasy

Candidate of Technical Sciences, Senior Research, Associate Professor of safety of construction and labor protection facilities Department

Mykhaylo Pustovit, Cherkasy Institute of Fire Safety named after Chornobyl Heroes, Cherkasy

Senior Instructor of safety of construction and labor protection facilities Department

References

Venbo, Mao (2005), Modern cryptography: theory and practice, Publishing house «Vylyams», Moscow, 768 p.

Yakovlev, A.V., Bezbogov, A.A., Rodin, V.V. and Shamkin, V.N. (2006), Cryptographic protection of information, Publishing house TGTU, Tambov, 140 p.

Malec, I.O. (2011), “The role and problems of functioning of telecommunication systems in emergency situations”, Bulletin of Lviv Polytechnic National University, vol. 710: Computer Science and Information Technology, pp. 74–78.

Babenko, V.G., Rudnyckyj, S.V. (2012), “Realization of the method of information protection on the basis of matrix operations of cryptographic transformation”, Information Processing Systems, vol. 9 (107), pp. 130–139.

Rudnyckyj, V.M., Myronets, I.V. and Babenko, V.G. (2011), “Systematization of the Complete Set of Logical Functions for the Cryptographic Information Conversion”, Information Processing Systems, vol. 8 (98), pp. 184–188.

Rudnyckyj, V.M., Babenko, V.G. and Zhylyaev, D.A. (2011), “Algebraic structure of the set of logical coding operations”, Science and Technology of the Air Forces of the Armed Forces of Ukraine, vol. 2 (6), pp. 112–114.

Richard, A.M. (2005), Codes: the guide to secrecy from ancient to modern times, Chapman & Hall. CRC, P. 142.

Thomas, W. Cusick and Pantelimon, Stanica (2009), Cryptographic Boolean Functions and Applications, Academic Press, 248 p.

Rudnyckyj, V.M., Shuvalova, L.A. and Nesterenko, O.B. (2016), “Analysis of two-digit operations of cryptographic coding on the criterion of severe avalanche effect”, Scientific works of the Petro Mohyla Black Sea State University, vol. 271, pp. 74–77.

Rudnyckyj, V.M., Shuvalova, L.A. and Nesterenko, O.B. (2016), “Synthesis of operations of cryptographic transformation on the criterion of strictly stable coding”, Bulletin of the Engineering Academy of Ukraine, vol. 3, pp. 105–108.

Rudnyckyj, V.M., Shuvalova, L.A. and Nesterenko, O.B. (2017), “Method of synthesis of operations of cryptographic transformation on the criterion of strictly stable coding”, Bulletin of the Cherkasy State Technological University, vol. 1, pp. 5-10.

Babenko, V.G., Lada, N.V. (2014), “Synthesis and analysis of operations of cryptographic addition by module two”, Information Processing Systems, vol. 2 (118), pp. 116–118.

Babenko, V.G., Lada, N.V. (2016), “The technology of the study of operations by module two”, Smart and Young,

vol. 11-12, pp. 49-54.