Substitution cipher based on pseudo non-determined gamma generator
DOI:
https://doi.org/10.18372/2225-5036.20.7302Keywords:
gamma generator, secret key, open message, ciphertext, cryptographic security, ciphering speedAbstract
Substitution ciphers replace symbols or other parts of the plaintext to ciphertext similar parts. Ciphers using cryptographic gamma have high security level, but a significant disadvantage is the high complexity of the operations and, consequently, much lower speed encryption versus ciphers based overlay gamma. This paper is dedicated to developed information ciphering method using gamma generator which considers the secret key and the open message. The obtained results allow increasing the ciphering speed compared with the block ciphers in ciphertext feedback and output feedback modes, meanwhile providing the cryptographic persistence which is comparable with the block ciphers persistenceReferences
Нечаев В.И. Элементы криптографии.Основы теории защиты информации. — М.: Высшая школа, 1999.
Шеннон К. Работы по теории информации и кибернетике. — М.: Изд. иностр. лит., 1963. — 830 с.
Шнайер Б. Подстановочные шифры // Прикладная криптография. Протоколы, алгоритмы, исходные тексты на языке Си — М.: Триумф, 2002. — 816 с.
Kelsey J., Schneier B., Wagner D. and Hall C. Cryptanalytic Attacks on Pseudorandom Number Generators — Fast Software Encryption, Fifth
International Workshop Proceedings (March 1998), Springer-Verlag, 1998, pp. 168-188.
NIST Computer Security Division's (CSD) Security Technology Group (STG) (2013). Block cipher modes. Cryptographic Toolkit. NIST. Retrieved April 12, 2013.
Баричев С. Г., Гончаров В. В. Стандарт AES. Алгоритм Rijndael. — М.: Горячая линия — Телеком, 2002 — с. 30-35.
Винокуров А. Описание алгоритма шифрования ГОСТ 28147-89. — М. : Монитор, 1995 — 25 с.
Винокуров А. Serpent. Основные параметры – М. : Монитор, 1999 – 21 с.
Лужецький В.А. Метод формування перестановок довільної кількості елементів / В.А. Лужецький, І.С. Горбенко // Захист інформації.
— 2013. — №3 — С.262-267.
Головашич С. Анализ безопасности режимов блочного симметричного шифрования / С. Головашич, О. Лебедев // Правове, нормативне та
метрологічне забезпечення системи захисту інформації в Україні. — Вип. 2. — 2001.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.