SYNTHESIS OF REVERSE TWO-BIT DUAL-OPERATED STRICTLY STRAIGHT CRYPTOGRAPHIC CODING ON THE BASIS OF ANOTHER OPERATION

Main Article Content

Volodymir Rudnitsky
https://orcid.org/0000-0003-3473-7433
Rat Berdibayev
https://orcid.org/0000-0002-8341-9645
Roksolana Breus
Nataliia Lada
https://orcid.org/0000-0002-7682-2970
Mykhailo Pustovit
https://orcid.org/0000-0001-5313-1459

Abstract

Based on the analysis of a group of two-bit two-operand operations of strict stable cryptographic coding, the relations between direct and inverse operations are established and formalized and their correctness is proved. Applying the technology of combining single-operand strict rigorous cryptographic coding into two-operand operations and using established interconnections, we propose a method of synthesis of inverse operations for known direct operations. This method provides the construction of the inverse operation by converting the second operand of two-bit two-operand operations of strict stable cryptographic coding. The article examines the entire sequence of mathematical transformations that provides the synthesis of a formalized operation model, suitable for practical application in crypto primitives, by constructing models of the relationships between operations and the synthesis of a reverse operation model. The synthesized operations are implemented both at the software and hardware levels and provide the ease of achieving the effect of strictly stable cryptographic coding.

Article Details

How to Cite
Rudnitsky, V., Berdibayev, R., Breus, R., Lada, N., & Pustovit, M. (2019). SYNTHESIS OF REVERSE TWO-BIT DUAL-OPERATED STRICTLY STRAIGHT CRYPTOGRAPHIC CODING ON THE BASIS OF ANOTHER OPERATION. Advanced Information Systems, 3(4), 109–114. https://doi.org/10.20998/2522-9052.2019.4.16
Section
Methods of information systems protection
Author Biographies

Volodymir Rudnitsky, Cherkasy State Technological University, Cherkasy

Doctor of Technical Sciences, Professor, Head of the Department of Information Security and Computer Engineering

Rat Berdibayev, Almaty University of Power Engineering and Telecommunications, Almaty

Candidate of Political Sciences, Associate Professor, Head of the Department of Information Security Systems

Roksolana Breus, Cherkasy State Technological University, Cherkasy

Assistant of the Department of Information Security and Computer Engineering

Nataliia Lada, Cherkasy State Technological University, Cherkasy

Candidate of Technical Sciences, Assistant of the Department of Information Security and Computer Engineering

Mykhailo Pustovit, Cherkasy Institute of Fire Safety named after Chornobyl Heroes, Cherkasy

Senior Instructor of Department

References

Babenko, V.G., Melnyk, R.P. and Gonchar, S.V. (2014), “Evaluation of the efficiency of using cryptographic transformation operations”, Bulletin of the Academy of Engineering of Ukraine, Vol. 2, pp. 39–41.

Golub, S.V., Babenko, V.G., Rudnitsky, S.V. and Melnyk R.P. (2012), “Improvement of the method of synthesis of operations of cryptographic transformation on the basis of discrete-algebraic representation of operations”, Control, navigation and communication systems, PNTU, Poltava, No. 2 (22), pp. 163–168.

Babenko, V.G., Mironets, I.V. and Rudnitsky, S.V. (2011), “Decoding of information in a group of two-bit operations of cryptographic transformation”, Control, navigation and communication systems, PNTU, Poltava, Vol. 4 (20), pp. 208–212.

Rudnitsky, V.M., Shuvalova, L.A. and Nesterenko, O.B. (2017), “Analysis of two-bit operations of a cryptographic coding on the criterion of a strict avalanche effect”, Scientific works: Scientific and Methodological Journal, pp. 74–77.

Nesterenko, O.B., Rudnitsky, V.M. and Shuvalova, L.A. (2017), “Synthesis of cryptographic transformation operations according to the criterion of strict stable coding”, Bulletin of the Academy of Engineering of Ukraine, Vol. 3, pp. 105–108.

Rudnitsky, V.M., Shuvalova, L.A. and Nesterenko, O.B. (2017), “Method of synthesis of operations of cryptographic transformation by criterion of strict stable coding”, Cherkasy State Technological University Bulletin, Vol. 1, pp. 5–10.

Lada, N.V. and Kozlovskaya, S.G. (2018), “Application of operations of cryptographic addition module two with precision to permutation in streaming ciphers”, Control, navigation and communication systems, PNTU, Poltava, Vol. 1 (47), pp. 127–130, DOI: https://doi.org/10.26906/SUNZ.2018.1.127

Babenko, V.G. and Lada, N.V. (2018), “Synthesis and analysis of cryptographic addition operations module two”, Information processing systems, KhNUPS, Kharkiv, Vol. 2 (118), pp. 116–118.

Rudnitsky, V.M., Lada, N.V., Fedotova-Piven, I.M. and Pustovit, M.O. (2018), “Synthesis of inverted two-bit two-operand operations of strict stable cryptographic coding”, Information processing systems and methods, State Scientific Research Institute of the Ministry of Internal Affairs of Ukraine, Kyiv, Vol.4 (55), pp. 76–81.

Rudnitsky, V.M., Opirsky, I.M., Melnyk, O.G. and Pustovit M.A. (2018), “Synthesis of a group of strict stable cryptographic coding operations for constructing streaming ciphers”, Information security, Vol. 24, No. 3.

Rudnitsky, V.M., Lada, N.V., Fedotova-Piven, I.M., Pustovit, M.O. and Nesterenko, O.B. (2018), “Construction of two-bit two-operand operations of strict stable cryptographic coding”, Control, navigation and communication systems, PNTU, Poltava, Vol. 6 (52), pp. 113–115, DOI: https://doi.org/10.26906/SUNZ.2018.6.113