IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS
DOI:
https://doi.org/10.30837/ITSSI.2022.20.035Keywords:
cryptographic encoding, lightweight cryptography, synthesis of symmetric operation groupsAbstract
The object of the study is the processes of building groups of symmetric double-operand operations of cryptographic coding of information. The subject of the study are features of the implementation of a generalized method of synthesis groups of symmetric two-operand operations of cryptographic coding information for "lightweight cryptography". The purpose of this work is to investigate the process of building and implementing a method of synthesis of groups of symmetric multibit double-operand operations of information cryptographic coding to provide automation for finding ways to increase the variability, and stability of lightweight cryptoalgorithms. The following tasks are solved in the article: to determine the mathematical group of single-operand operations, on the basis of which the realization of the method of synthesis of groups of symmetric double-operand operations of cryptographic coding will be presented; to offer the search technology of symmetric double-operand operations; to evaluate power of synthesized groups of operations, and their influence on variability and stability of " lightweight cryptography" algorithms. The following results were obtained: the technology for determining symmetric double-operand operations, which will be the basis for the synthesis of a group of symmetric double-operand operations, was proposed. A method for synthesizing groups of symmetric double-operand cryptographic information coding operations for block encryption systems was proposed and implemented. On the example of module-two addition with correction and the use of three-digit single-operand operations, the practical implementation of this method was shown. Based on the synthesized operations and the given quantitative characteristics of the set of single-operand operations, the power of synthesized groups of operations and their influence on the variability and stability of "lightweight cryptography" algorithms were evaluated. Conclusions: the proposed and implemented method of synthesis of groups of symmetric double-operand operations of cryptographic coding information allows to provide the possibility of increasing the variability of lightweight crypto-algorithms. Synthesis of symmetric cryptographic coding operations belonging to different mathematical groups provides increase of algorithm's crypto stability. Application of synthesized cryptographic coding operations leads to significant increase of variability of cryptoalgorithms and their complexity.
References
Horbenko, I. D., Horbenko, Yu. I. (2012), Applied cryptology: monograph [Prykladna kryptolohiia: monohrafiia], Kharkiv: Kharkiv National University of Radio Electronics, LLC "Fort", 868 p.
Bevz, O. M., Kvєtnii, R. N. (2010), Data Encryption Based on Highly Nonlinear Boolean Functions and Maximum Distance Codes: monograph [Shyfruvannia danykh na osnovi vysoko neliniinykh bulevykh funktsii ta kodiv z maksymalnoiu vidstanniu: monohrafiia], Vinnytsia: Vinnytsia National University of Technology, 96 p.
Manifavas, C., Hatzivasilis, G., Fysarakis, K., Rantos, K. (2012), "Lightweight cryptography for embedded systems a comparative analysis", In: 6th International Workshop on Autonomous and Spontaneous Security SETOP 2012, Springer, LNCS, 8247, Р. 333–349. DOI: https://doi.org/10.1007/978-3-642-54568-9_21
Gildas Avoine, Julio Hernandez-Castro (2021), "Security of Ubiquitous Computing Systems", Selected Topics. Springer, Р. 265 DOI: https://doi.org/10.1007/978-3-030-10591-4
Biryukov Alex and Perrin Leo (2017), "State of the art in lightweight symmetric cryptography", Cryptology ePrint Archive, Report 2017/511, available at: http://eprint.iacr.org/2017/511, https://eprint.iacr.org/2017/511.pdf
Mitsuru Matsui (1997), "New block encryption algorithm MISTYС", In Eli Biham, editor, Fast Software Encryption – FSE’97, pringer, volume 1267 of Lecture Notes in Computer Science, Haifa, Israel, January 20–22, Р. 54–68, available at: https://link.springer.com/chapter/10.1007/BFb0052334
Hatzivasilis George, Fysarakis Konstantinos, Ioannis (2018), "Papaefstathiou, and Charalampos Manifavas. A review of lightweight block ciphers", Cryptographic Engineering, No. 8 (2), Р. 141–184. DOI: https://doi.org/10.1007/s13389-017-0160-y
Kerry A. McKay, Larry Bassham, Meltem Sоnmez Turan, and Nicky Mouha (2016), "Nistir 8114 - report on lightweight cryptography". DOI: https://doi.org/10.6028/NIST.IR.8114
Rudnytsky, V. M., Lada, N. V., Babenko, V. G. (2018), Cryptographic coding: synthesis of stream encryption operations with accuracy to permutation: monograph [Kryptohrafichne koduvannia: syntez operatsii potokovoho shyfruvannia z tochnistiu do perestanovky: monohrafiia], Monograph, Kharkiv: LLC "DISA PLUS", 184 р.
Rudnitsky, V. M., Milchevich, V. Ya., Babenko, V. G., Melnyk, R. Р., Rudnitsky, S. V., Melnyk O. G. (2014), Cryptographic coding: methods and means of implementation (part 2): monograph [Kriptograficheskoe kodirovanie: metody i sredstva realizacii (chast' 2): monografiya], Monograph, Kharkov: Publishing house "Shchedra sadyba plius", 223р.
Rudnytsky, V. M., ed. (2018), Cryptographic coding: information processing and protection: collective monograph [Kryptohrafichne koduvannia: obrobka ta zakhyst informatsii: kolektyvna monohrafiia], Monograph, Kharkiv: LLC "DISA PLUS", 139р.
Sysoienko, S., Myronets, I., Babenko, V. (2019), "Practical Implementation Effectiveness of the Speed Increasing Method of Group Matrix Cryptographic Transformation", Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), CEUR Workshop Proceedings 2353, CEUR-WS.org, Р. 402–412. (Scopus) available at: http://ceur-ws.org/Vol-2353/, http://ceur-ws.org/Vol-2353/paper32.pdf
Rudnitsky, V., Berdibayev, R., Breus, R., Lada, N. and Pustovit, M. (2019), "Synthesis of reverse two-bit dual-operated strictly straight cryptographic coding on the basis of another operation", Advanced Information Systems, Kharkiv: NTU "KhPI", No. 3 (4), Р. 109–114. DOI: http://doi.org/10.20998/2522-9052.2019.4.16
Lada, N. V., Kozlovska, S. G., Rudnitsky, S. V. (2019), " The symmetric operations’ mathematical group constructing based on module-2 addition " ["Pobudova matematy`chnoyi grupy` sy`metry`chny`x operacij na osnovi dodavannya za modulem dva"]. Modern special technics: scientific and practical journal. Kyiv, No 4 (59), Р.33–41.
Lada, N. V., Kozlovska, S. G. and Rudnitskaya, Y. V. (2019), "Researching and Synthesizing a Group of Symmetric Modified Modulo-4 Addition Operations" ["Doslidzhennia i syntez hrupy symetrychnykh modyfikovanykh operatsii dodavannia za modulem chotyry "], Central Ukrainian Scientific Bulletin. Technical Sciences, No. 2 (33), Р. 181–189. DOI: http://doi.org/10.32515/2664-262x. 2019.2(33)
Lada, N. V., Rudnitsky, S. V., Zazhoma, V. M. and Rudnytska, Y. V. (2020), " Research and synthesis of a group of symmetric modified operations of right-handed addition by module four" ["Doslidzhennia i syntez hrupy symetrychnykh modyfikovanykh operatsii pravostoronnoho dodavannia za modulem chotyry"], Control, Navigation and Communication Systems. Academic Journal. Poltava: PNTU, No. 1 (59), Р. 93–96. DOI: https://doi.org/10.26906/SUNZ.2020.1.093
Rudnitsky, V. M., Babenko, V. G., Rudnitsky, S. V. (2012), " Method of synthesis of matrix models of operations of cryptographic recoding of information" ["Metod syntezu matrychnykh modelei operatsii kryptohrafichnoho perekoduvannia informatsii"], Ukrainian Information Security Research Journal, Vol 14, No. 3 (56), Р. 50–56. DOI: https://doi.org/10.18372/2410-7840.14.3360
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Our journal abides by the Creative Commons copyright rights and permissions for open access journals.
Authors who publish with this journal agree to the following terms:
Authors hold the copyright without restrictions and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-commercial and non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their published work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.