The model for constructing a set of symmetric two-operand set operations that allow perversion of operands by combining one-operand operations
DOI:
https://doi.org/10.30837/2522-9818.2025.3.126Keywords:
two-operand operations; cryptographic protection; low-resource cryptography; SET-encryption; SET-operations; one-operand operationsAbstract
The subject matter of the article is the scientific and methodological apparatus for constructing and implementing information-driven SET-operations. The goal of the work is to construct a model for the synthesis of symmetric two-operand SET-operations that allow permutation of operands and to determine the restrictions on their use in the development of low-resource stream ciphers. The following tasks are solved in the article: a model for the synthesis of symmetric two-operand SET-operations that allow permutation of operands is developed; restrictions on the use of this model are determined, which guarantee the construction of symmetric two-operand SET-operations that allow permutation of operands; it is shown that a pseudo-random change in the operating modes of the cryptographic system significantly complicates the processes of cryptanalysis of ciphergrams; modeling of SET-operations based on duplication of single-operand two-bit SET operations is carried out; the technology for constructing two-operand SET-operations based on duplication is applied to obtain a set of two-operand SET-operations. Methods of discrete mathematics, Set-theory and situational management have been introduced. Achieved results. Synthesized on the basis of this model of SET-operations allow changing the operating mode of stream cryptographic systems from symmetric to asymmetric when permuting operands in the operation. At present, the forefront of modern world experience in cryptographic science is a low-resource cryptographic system. Low-resource cryptography allows ensuring sufficiently stable cryptosystem performance with significant limitations on computational, mass-dimensional, cost and energy resources of the object of interest. One of the most relevant areas of further development of low-resource cryptography is considered to be cryptographic coding. In the process of cryptographic coding, cryptographic coding operations are implemented. The selection of operations is carried out under the control of a pseudo-random sequence, which is implemented by a cryptographic algorithm. Conclusions. A model for the synthesis of symmetric two-operand SET-operations that allow permutation of operands has been developed. Restrictions on the use of this model have been determined, which guarantee the construction of symmetric two-operand SET-operations that allow permutation of operands. The achieved results can be useful for the construction of low-resource stream encryption systems. Pseudo-random change of the operating modes of the cryptographic system significantly complicates the processes of cryptanalysis of ciphertexts.
References
References
Rudnytskyi, V. M. (2024), "Architecture of CET-operations and stream encryption technologies: monograph" / V. M. Rudnytskyi, N. V. Lada, G. A. Kuchuk, D. A. Pidlasy. Cherkasy: publisher Ponomarenko R.V., 374 р. ISBN 978-966-2554-81-6 URL: https://dndivsovt.com/index.php/monograph/issue/ view/22/22.
Kosenko, V., Persiyanova, E., Malyeyeva, O. (2017), “Methods of managing traffic distribution in information and communication networks of critical infrastructure systems”, Innovative Technologies and Scientific Solutions for Industries, No. 2 (2), P. 48–55. DOI: https://doi.org/10.30837/2522-9818.2017.2.048
Zheng, Z.,Tian, K. & Liu, F. (2023), "Modern Cryptography Volume 2. А Classical Introduction to Informational and Mathematical Principle". Springer: Singapore. DOI: https://doi.org/10.1007/978-981-19-7644-5
Kumar, C., Prajapati, S. & Verma, R. (2022), "A Survey of Various Lightweight Cryptography Block ciphers for IoT devices". IEEE International Conference on Current Development in Engineering and Technology (CCET), Bhopal, India, 2022, Р. 1–6. DOI: https://doi.org/10.1109/CCET56606.2022.10080556
Rudnytskyi, V., Babenko, V., Lada, N., Tarasenko, Ya. & Rudnytska, Yu. (2022), “Constructing symmetric operations of cryptographic information encoding”. Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS II 2021), Oct. 26, 2021. Kyiv, Ukraine: CEUR Workshop Proceedings, 2022, Р. 182–194. ISSN 1613-0073.
Thomas, Xuan Meng, W. (2020), "Buchanan. Lightweight Cryptographic Algorithms on Resource-Constrained Devices". Preprints. DOI: https://doi.org/10.20944/PREPRINTS202009.0302.V1
Semenov, S., Davydov, V., Kuchuk, N. & Petrovskaya, I. (2021), "Software security threat research", 31st International Scientific Symposium Metrology and Metrology Assurance, MMA 2021. DOI: https://doi.org/10.1109/MMA52675.2021.9610877
Khaled, Salah Mohamed (2020), "New Frontiers in Cryptography. Quantum, Blockchain, Lightweight, Chaotic and DNA". Springer International Publishing. Springer, Cham, 104. DOI: https://doi.org/10.1007/978-3-030-58996-7
Yalamuri, G., Honnavalli, P. & Eswaran, S. (2022), "A Review of the Present Cryptographic Arsenal to Deal with Post-Quantum Threats". Procedia Comput. Sci. 215, Р. 834–845. DOI: https://doi.org/10.1016/j.procs.2022.12.086
Lada, N., Kozlovska, S., Rudnytskyi, S. (2019), "Pobudova matematychnoyi hrupy symetrychnykh operatsiy na osnovi dodavannya za modulem dva". ["The symmetric operations’ mathematical group constructing based on modulo-2 addition"]. Modern special equipment: scientific and practical journal. Kyiv, 2019. № 4 (59). P. 33–41. DOI: https://elar.naiau.kiev.ua/items/33ebc0b3-4177-4d6f-87a8-95719bb7fabe
Rudnytska, Yu., Rudnytsky, S. (2022), "Modelyuvannya symetrychnykh operatsiy kryptohrafichnoho koduvannya". ["Modeling symmetric cryptographic coding operations"]. Problems of informatization: Tenth International Scientific and Technical Conference: Abstracts of the Supplementary. Cherkasy – Baku – Bielsko-Biala – Kharkiv, 24 – 25 November 2022. P. 10. available at: https://nure.ua/wp-content/uploads/2022/tom-1.pdf
Larin, V., Trystan, A., Hmyria, V., Strikha, S., Kostashchuk, M., Piontkivskyi, P. (2024), "Forsayt yak innovatsiynyy instrument planuvannya ta realizatsiyi naukovykh tekhnolohiy v oboronno-promyslovomu kompleksi". ["Foresight as an innovative tool for planning and implementing scientific technologies in the defence industry"]. Problems of construction, testing, application and operation of complex information systems, 26 (1), Р. 93–106. DOI: https://doi.org/10.46972/2076-1546.2024.26.08
Jancarczyk, D., Rudnytskyi, V., Breus, R., Pustovit, M., Veselska, O, & Ziubina, R. (2020), "Two-Operand Operations of Strict Stable Cryptographic Coding with Different Operands’ Bits". (2020) IEEE 5th International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS). IEEE; 2020 Sep 17; Р. 247–254. DOI: https://doi.org/10.1109/IDAACS-SWS50031.2020.9297067.
Zakaria, A., Azni, A., Ridzuan, F., Zakaria, N. & Maslina, H. (2023), "Daud Systematic literature review: Trend analysis on the design of lightweight block cipher". IEEE Journal of King Saud University Computer and Information Sciences. 35, Issue 5, May, 101550 р. DOI: https://doi.org/10.1016/j.jksuci.2023.04.003
Gasser, L. (2023), "Post-quantum Cryptography. In: Mulder", V., Mermoud, A., Lenders, V., Tellenbach, B. (eds) Trends in Data Protection and Encryption Technologies. Springer, Cham. DOI: https://doi.org/10.1007/978-3-031-33386-6_10
Zakaria, A., et al. (2023). Systematic literature review: Trend analysis on the design of lightweight block cipher. Journal of King Saud University Computer and Information Sciences, 35(5), 101550 р. DOI: https://doi.org/10.1016/j.jksuci.2023.04.003
Yasmin, N. & Gupta, R. (2023), "Modified lightweight cryptography scheme and its applications in IoT environment". Int. j. inf. tecnol. 15, Р. 4403–4414. DOI: https://link.springer.com/article/10.1007/s41870-023-01486-2
Sabani, M., et al. (2023), "Evaluation and Comparison of Lattice-Based Cryptosystems for a Secure Quantum Computing Era". Electronics, 12(12), 2643 р. DOI: https://doi.org/10.3390/electronics12122643
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Our journal abides by the Creative Commons copyright rights and permissions for open access journals.
Authors who publish with this journal agree to the following terms:
Authors hold the copyright without restrictions and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-commercial and non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their published work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.












