The model for constructing a set of symmetric two-operand set operations that allow perversion of operands by combining one-operand operations

Authors

DOI:

https://doi.org/10.30837/2522-9818.2025.3.126

Keywords:

two-operand operations; cryptographic protection; low-resource cryptography; SET-encryption; SET-operations; one-operand operations

Abstract

The subject matter of the article is the scientific and methodological apparatus for constructing and implementing information-driven SET-operations. The goal of the work is to construct a model for the synthesis of symmetric two-operand SET-operations that allow permutation of operands and to determine the restrictions on their use in the development of low-resource stream ciphers. The following tasks are solved in the article: a model for the synthesis of symmetric two-operand SET-operations that allow permutation of operands is developed; restrictions on the use of this model are determined, which guarantee the construction of symmetric two-operand SET-operations that allow permutation of operands; it is shown that a pseudo-random change in the operating modes of the cryptographic system significantly complicates the processes of cryptanalysis of ciphergrams; modeling of SET-operations based on duplication of single-operand two-bit SET operations is carried out; the technology for constructing two-operand SET-operations based on duplication is applied to obtain a set of two-operand SET-operations. Methods of discrete mathematics, Set-theory and situational management have been introduced. Achieved results. Synthesized on the basis of this model of SET-operations allow changing the operating mode of stream cryptographic systems from symmetric to asymmetric when permuting operands in the operation. At present, the forefront of modern world experience in cryptographic science is a low-resource cryptographic system. Low-resource cryptography allows ensuring sufficiently stable cryptosystem performance with significant limitations on computational, mass-dimensional, cost and energy resources of the object of interest. One of the most relevant areas of further development of low-resource cryptography is considered to be cryptographic coding. In the process of cryptographic coding, cryptographic coding operations are implemented. The selection of operations is carried out under the control of a pseudo-random sequence, which is implemented by a cryptographic algorithm. Conclusions. A model for the synthesis of symmetric two-operand SET-operations that allow permutation of operands has been developed. Restrictions on the use of this model have been determined, which guarantee the construction of symmetric two-operand SET-operations that allow permutation of operands. The achieved results can be useful for the construction of low-resource stream encryption systems. Pseudo-random change of the operating modes of the cryptographic system significantly complicates the processes of cryptanalysis of ciphertexts.

Author Biographies

Volodymyr Rudnytskyi, Professor Principal Researcher of State Scientific Research Institute of Armament and Military Equipment Testing and Certification

Doctor of Engineering Science, Professor Principal Researcher of State Scientific Research

Serhii Semenov, University of the National Education Commission

Doctor of Engineering Science, Professor

Nataliia Lada, Research Institute of Armament and Military Equipment Testing and Certification

Candidate of Technical Sciences, Leading Researcher State Scientific

Vira Babenko, Cherkasy State Technological University

Doctor of Engineering Science, Professor

Volodymyr Larin, State Scientific Research Institute of Armament and Military Equipment Testing and Certification

Doctoral Candidate, Candidate of Technical Sciences, Associate Professor

Tymofii Korotkyi, Cherkasy State Technological University

Post-Graduate

References

References

Rudnytskyi, V. M. (2024), "Architecture of CET-operations and stream encryption technologies: monograph" / V. M. Rudnytskyi, N. V. Lada, G. A. Kuchuk, D. A. Pidlasy. Cherkasy: publisher Ponomarenko R.V., 374 р. ISBN 978-966-2554-81-6 URL: https://dndivsovt.com/index.php/monograph/issue/ view/22/22.

Kosenko, V., Persiyanova, E., Malyeyeva, O. (2017), “Methods of managing traffic distribution in information and communication networks of critical infrastructure systems”, Innovative Technologies and Scientific Solutions for Industries, No. 2 (2), P. 48–55. DOI: https://doi.org/10.30837/2522-9818.2017.2.048

Zheng, Z.,Tian, K. & Liu, F. (2023), "Modern Cryptography Volume 2. А Classical Introduction to Informational and Mathematical Principle". Springer: Singapore. DOI: https://doi.org/10.1007/978-981-19-7644-5

Kumar, C., Prajapati, S. & Verma, R. (2022), "A Survey of Various Lightweight Cryptography Block ciphers for IoT devices". IEEE International Conference on Current Development in Engineering and Technology (CCET), Bhopal, India, 2022, Р. 1–6. DOI: https://doi.org/10.1109/CCET56606.2022.10080556

Rudnytskyi, V., Babenko, V., Lada, N., Tarasenko, Ya. & Rudnytska, Yu. (2022), “Constructing symmetric operations of cryptographic information encoding”. Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS II 2021), Oct. 26, 2021. Kyiv, Ukraine: CEUR Workshop Proceedings, 2022, Р. 182–194. ISSN 1613-0073.

Thomas, Xuan Meng, W. (2020), "Buchanan. Lightweight Cryptographic Algorithms on Resource-Constrained Devices". Preprints. DOI: https://doi.org/10.20944/PREPRINTS202009.0302.V1

Semenov, S., Davydov, V., Kuchuk, N. & Petrovskaya, I. (2021), "Software security threat research", 31st International Scientific Symposium Metrology and Metrology Assurance, MMA 2021. DOI: https://doi.org/10.1109/MMA52675.2021.9610877

Khaled, Salah Mohamed (2020), "New Frontiers in Cryptography. Quantum, Blockchain, Lightweight, Chaotic and DNA". Springer International Publishing. Springer, Cham, 104. DOI: https://doi.org/10.1007/978-3-030-58996-7

Yalamuri, G., Honnavalli, P. & Eswaran, S. (2022), "A Review of the Present Cryptographic Arsenal to Deal with Post-Quantum Threats". Procedia Comput. Sci. 215, Р. 834–845. DOI: https://doi.org/10.1016/j.procs.2022.12.086

Lada, N., Kozlovska, S., Rudnytskyi, S. (2019), "Pobudova matematychnoyi hrupy symetrychnykh operatsiy na osnovi dodavannya za modulem dva". ["The symmetric operations’ mathematical group constructing based on modulo-2 addition"]. Modern special equipment: scientific and practical journal. Kyiv, 2019. № 4 (59). P. 33–41. DOI: https://elar.naiau.kiev.ua/items/33ebc0b3-4177-4d6f-87a8-95719bb7fabe

Rudnytska, Yu., Rudnytsky, S. (2022), "Modelyuvannya symetrychnykh operatsiy kryptohrafichnoho koduvannya". ["Modeling symmetric cryptographic coding operations"]. Problems of informatization: Tenth International Scientific and Technical Conference: Abstracts of the Supplementary. Cherkasy – Baku – Bielsko-Biala – Kharkiv, 24 – 25 November 2022. P. 10. available at: https://nure.ua/wp-content/uploads/2022/tom-1.pdf

Larin, V., Trystan, A., Hmyria, V., Strikha, S., Kostashchuk, M., Piontkivskyi, P. (2024), "Forsayt yak innovatsiynyy instrument planuvannya ta realizatsiyi naukovykh tekhnolohiy v oboronno-promyslovomu kompleksi". ["Foresight as an innovative tool for planning and implementing scientific technologies in the defence industry"]. Problems of construction, testing, application and operation of complex information systems, 26 (1), Р. 93–106. DOI: https://doi.org/10.46972/2076-1546.2024.26.08

Jancarczyk, D., Rudnytskyi, V., Breus, R., Pustovit, M., Veselska, O, & Ziubina, R. (2020), "Two-Operand Operations of Strict Stable Cryptographic Coding with Different Operands’ Bits". (2020) IEEE 5th International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS). IEEE; 2020 Sep 17; Р. 247–254. DOI: https://doi.org/10.1109/IDAACS-SWS50031.2020.9297067.

Zakaria, A., Azni, A., Ridzuan, F., Zakaria, N. & Maslina, H. (2023), "Daud Systematic literature review: Trend analysis on the design of lightweight block cipher". IEEE Journal of King Saud University Computer and Information Sciences. 35, Issue 5, May, 101550 р. DOI: https://doi.org/10.1016/j.jksuci.2023.04.003

Gasser, L. (2023), "Post-quantum Cryptography. In: Mulder", V., Mermoud, A., Lenders, V., Tellenbach, B. (eds) Trends in Data Protection and Encryption Technologies. Springer, Cham. DOI: https://doi.org/10.1007/978-3-031-33386-6_10

Zakaria, A., et al. (2023). Systematic literature review: Trend analysis on the design of lightweight block cipher. Journal of King Saud University Computer and Information Sciences, 35(5), 101550 р. DOI: https://doi.org/10.1016/j.jksuci.2023.04.003

Yasmin, N. & Gupta, R. (2023), "Modified lightweight cryptography scheme and its applications in IoT environment". Int. j. inf. tecnol. 15, Р. 4403–4414. DOI: https://link.springer.com/article/10.1007/s41870-023-01486-2

Sabani, M., et al. (2023), "Evaluation and Comparison of Lattice-Based Cryptosystems for a Secure Quantum Computing Era". Electronics, 12(12), 2643 р. DOI: https://doi.org/10.3390/electronics12122643

Downloads

Published

2025-09-25

How to Cite

Rudnytskyi, V., Semenov, S., Lada, N., Babenko, V., Larin, V., & Korotkyi, T. (2025). The model for constructing a set of symmetric two-operand set operations that allow perversion of operands by combining one-operand operations. INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, (3(33), 126–136. https://doi.org/10.30837/2522-9818.2025.3.126