Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Technology Audit and...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Technology Audit and Production Reserves
Article . 2020 . Peer-reviewed
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Technology Audit and Production Reserves
Article
License: CC BY
Data sources: UnpayWall
versions View all 2 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Synthesis of sets of non-symmetric two-operand two-bit crypto operations within the permutation accuracy

Authors: Lada, Nataliia; Dzyuba, Viktoriya; Breus, Roksolana; Lada, Serhii;

Synthesis of sets of non-symmetric two-operand two-bit crypto operations within the permutation accuracy

Abstract

The object of research is the processes of building operations for cryptographic protection of information, as the requirements for information security are constantly increasing. Increasing the stability of cryptographic transformations directly depends on the complexity and variability of the crypto algorithm. It is possible to increase variability by increasing the range of crypto operations. Significantly increasing the number of crypto operations is possible through the synthesis of asymmetric operations. This paper is devoted to the creation of methodological support for the synthesis and analysis of sets of two-operand two-bit cryptographic operations with precision permutation. The conducted researches are based on the results of a computational experiment, which consists in the synthesis of two-operand two-bit crypto operations based on single-operand, with the subsequent search for pairs of operations of direct and correct inverse crypto transformation on the basis of complete search. In the course of the computational experiment, pairs of two-operand operations were presented, represented by tuples of four single-operand operations. The formalization of the results provided a mathematical representation of operations, suitable for practical implementation. To simplify the complexity of practical implementation, the synthesized operations are divided into 24 sets of 24 operations. Separation of operations occurred due to the use of templates of tables of truth of sets of operations with precision to permutation of operands. It is established that the entire set of operations can be constructed with the precision of permutation based on the use of the template of any operation. In addition, the analysis of the synthesized sets showed that the sets of symmetric and asymmetric operations do not intersect. 20 sets of asymmetric two-operand two-bit operations, as well as 4 sets of symmetric operations are obtained. Further investigation of each synthesized set of asymmetric crypto operations will allow for the relationship between the operands of the operation and between the operations as a whole. The use of synthesized asymmetric operations will improve the reliability of crypto algorithms for streaming encryption of information by significantly increasing the variability of cryptographic transformations. In turn, the use of synthesized sets of operations will simplify practical implementation in computer cryptography.

Related Organizations
Keywords

комп’ютерна криптографія; несиметричні операції криптоперетворення; множини операцій; варіативність криптоалгоритмів, УДК 004.056.55:004.312.2, computer cryptography; asymmetric crypto operations; multiple operations; variability of crypto algorithms., компьютерная криптография; несимметричные операции криптопреобразования; множества операций; вариативность криптоалгоритмов.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    1
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
    OpenAIRE UsageCounts
    Usage byUsageCounts
    visibility views 2
    download downloads 2
  • 2
    views
    2
    downloads
    Powered byOpenAIRE UsageCounts
Powered by OpenAIRE graph
Found an issue? Give us feedback
visibility
download
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
views
OpenAIRE UsageCountsViews provided by UsageCounts
downloads
OpenAIRE UsageCountsDownloads provided by UsageCounts
1
Average
Average
Average
2
2
gold