Синтез обернених дворозрядових двохоперандних операцій строгого стійкого криптогорафічного кодування. SYNTHESIS OF THE INVERSE TWO-BIT TWO-OPERAND OPERATIONS OF STRONG CRYPTOGRAPHIC ENCODING

dc.contributor.authorРудницький, В.М.
dc.contributor.authorRudnytskyi, V.M.
dc.contributor.authorЛада, Н.В.
dc.contributor.authorLada, N.V.
dc.contributor.authorФедотова-Півень, І.М.
dc.contributor.authorFedotova-Piven, I.M.
dc.contributor.authorПустовіт, М.О.
dc.contributor.authorPustovit, M.O.
dc.date.accessioned2023-09-21T17:21:53Z
dc.date.available2023-09-21T17:21:53Z
dc.date.issued2018
dc.description.abstractConstruction the new algorithms of stream and block cipher is inextricably linked with the synthesis of new cryptographic transformation operations. Particular attention deserve the operations that in the process of information transformation on the basis of the subdued sequence provide the achievement of strong cryptographic encoding, which means the maximum uncertainty of the cryptographic transformation results. However, it was paid not enough attention to the synthesis of these operations nowadays, and the processes of constructing the inverse operations of strong cryptographic coding were not studied at all. The purpose of the work is to simulate the inverse two-bit two-operand operations of strong cryptographic transformation for usage in stream and block ciphers. For reaching the purpose, the necessity of using one subdued sequence for direct and inverse transformation was taken into account. An approach that allows synthesizing reverse operations for known direct two- bit two-operand operations of strong cryptographic information transformation, based on the technology of combining single-operand operations of strong cryptographic encoding, is proposed. The entire sequence of mathematical transformations, which provides the synthesis of a formalized operation model suitable for practical application in cryptographic primitives, is considered in the article on the example of one operation’s construction. Synthesized operations are implemented on the software level as well as on the hardware level, which provides an ease of reaching the effect of strong cryptographic encoding. Thus, the research made it possible to develop a model of an inverse two-bit two- operand strong cryptographic transformation. The combination of the obtained inverse transformation with the direct at implementation the method of increasing the stability and reliability of stream encryption will provide maximum uncertainty for the results of cryptographic transformation, regardless of the subdued sequences’ quality.uk_UA
dc.identifier.urihttp://elar.naiau.kiev.ua/jspui/handle/123456789/25544
dc.language.isouk_UAuk_UA
dc.subjectкриптографічне кодуванняuk_UA
dc.subjectдекодуванняuk_UA
dc.subjectобернені операціїuk_UA
dc.subjectкриптоперетворенняuk_UA
dc.subjectперестановкиuk_UA
dc.subjectнадійність шифруванняuk_UA
dc.subjectстроге стійке криптографічне кодуванняuk_UA
dc.subjectсинтез операційuk_UA
dc.subjectcryptographic encryptionuk_UA
dc.subjectdecryptionuk_UA
dc.subjectinverse operationsuk_UA
dc.subjectcryptographic transformationsuk_UA
dc.subjectpermutationsuk_UA
dc.subjectreliability of encryptionuk_UA
dc.subjectstrong cryptographic encodinguk_UA
dc.subjectsynthesis of operationsuk_UA
dc.titleСинтез обернених дворозрядових двохоперандних операцій строгого стійкого криптогорафічного кодування. SYNTHESIS OF THE INVERSE TWO-BIT TWO-OPERAND OPERATIONS OF STRONG CRYPTOGRAPHIC ENCODINGuk_UA
dc.typeArticleuk_UA
local.udk004.056.55:004.312.2uk_UA
local.vidНаукові періодичні видання, мультимедійні презентації, засоби контролю знань, спеціалізовані компьютерні програми.uk_UA
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
sstt_2018_4_10.pdf
Size:
291.06 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: