Системи та методики обробки інформації
Permanent URI for this collection
Browse
Browsing Системи та методики обробки інформації by Subject "cryptographic transformations"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Синтез груп двохоперандних операцій криптоперетворення на основі перестановлюваних схем. SYNTHESIS OF GROUPS TWO-OPERAND OPERATIONS OF CRIPTOCONVERSION ON THE BASIS OF PERMUTATION SCHEMES(2018) Козловська, С.Г.; Kozlovska, S.H.Cryptography is one of the most effective means of data protection nowadays. One way of increasing the cryptographic algorithms stability is increasing their variability. Increasing the crypto algorithms variability directly depends on the number of cryptographic transformation operations, used in it. Using permutations in constructing modified operations is one of the effective means of expanding the capabilities of developers in building cryptographic algorithms. However, it was not paid enough attention to synthesis the operations’ mathematical groups on the basis of permutations. The purpose of the work is to construct a complete group of two-operand operations of cryptographic transformation, on the basis of the known, due to the establishment and application of permutational interconnections between the truth tables. The following research results were obtained while achieving the goal. In the course of the research, it was found that the permutation schemes for constructing truth tables of the cryptographic transformation of the two-operation sets of operations of the first mathematical group do not overlap. The complex of sets of truth tables of crypto transformation’s two-operand operations of the first mathematical group creates a complete group of sets of cryptographic transformation’s two-operand operations truth tables. The application of the rearrangement schemes group provides the construction of a cryptographic transformation operations complete group based on any of the operations of this group. The use of a group of permutation schemes allows you to build a complete group of permutation tables, presented both explicitly and in a formalized form. The obtained results allow making a conclusion that the application of rearrangement schemes’ constructed group will provide the construction of a complete group of sets of cryptographic transformation’s two-operand operations of an unknown group, based on one known operation. Rearrangement schemes for synthesis the truth tables of cryptographic transformation’s two-operand operations are constructed. It is established that the constructed schemes are not overlapped and create a complete group of sets for the truth tables synthesis. The application of the rearrangement schemes group provides construction the complete group of a cryptographic transformation’s operations, based on any of the operations, and also provides the construction of a complete group of tables of explicitly represented substitutions as well as formalized substitutions.Item Синтез обернених дворозрядових двохоперандних операцій строгого стійкого криптогорафічного кодування. SYNTHESIS OF THE INVERSE TWO-BIT TWO-OPERAND OPERATIONS OF STRONG CRYPTOGRAPHIC ENCODING(2018) Рудницький, В.М.; Rudnytskyi, V.M.; Лада, Н.В.; Lada, N.V.; Федотова-Півень, І.М.; Fedotova-Piven, I.M.; Пустовіт, М.О.; Pustovit, M.O.Construction the new algorithms of stream and block cipher is inextricably linked with the synthesis of new cryptographic transformation operations. Particular attention deserve the operations that in the process of information transformation on the basis of the subdued sequence provide the achievement of strong cryptographic encoding, which means the maximum uncertainty of the cryptographic transformation results. However, it was paid not enough attention to the synthesis of these operations nowadays, and the processes of constructing the inverse operations of strong cryptographic coding were not studied at all. The purpose of the work is to simulate the inverse two-bit two-operand operations of strong cryptographic transformation for usage in stream and block ciphers. For reaching the purpose, the necessity of using one subdued sequence for direct and inverse transformation was taken into account. An approach that allows synthesizing reverse operations for known direct two- bit two-operand operations of strong cryptographic information transformation, based on the technology of combining single-operand operations of strong cryptographic encoding, is proposed. The entire sequence of mathematical transformations, which provides the synthesis of a formalized operation model suitable for practical application in cryptographic primitives, is considered in the article on the example of one operation’s construction. Synthesized operations are implemented on the software level as well as on the hardware level, which provides an ease of reaching the effect of strong cryptographic encoding. Thus, the research made it possible to develop a model of an inverse two-bit two- operand strong cryptographic transformation. The combination of the obtained inverse transformation with the direct at implementation the method of increasing the stability and reliability of stream encryption will provide maximum uncertainty for the results of cryptographic transformation, regardless of the subdued sequences’ quality.