Fast algorithm of generation of substations of multiple-alphabetic replacement

Authors

  • Геннадій Миколайович Гулак State University of Telecommunications
  • Володимир Леонідович Бурячок State University of Telecommunications
  • Павло Миколайович Складанний State University of Telecommunications

DOI:

https://doi.org/10.18372/2410-7840.19.11767

Keywords:

сryptology, encryption, imitostability, a method of non-repetitive typing, substitution matrix

Abstract

An actual model of the cyber-security offender for automated control systems of the technological processes (APS TP), using global networks as a transport was proposed in this article. Basing on the threats to confidentiality and integrity of information, an analysis of methods of counteracting network manipulation and basic methods were made, that methods ensured the conversion of pseudo-random sequences into substitution sequences of the appropriate degree for the implementation of the multi-alphabetical replacement cipher. Within the framework of the work, a fast algorithm for realizing the multi-alphabetical replacement cipher with the use of the cipher sequence from the block cipher in the OFB mode was proposed, the correctness of the corresponding procedure was proved, and the possibility of forming any substitution from the symmetric permutation group .. The simulation modeling of the algorithm was performed, it allowed to confirm the necessary of the statistical qualities of the matrix of the cipher transition probabilities, which will ensure a high level of encryption and imitation resistance of commands and service information, circulating in the mentioned APS TP.

 

Author Biographies

Геннадій Миколайович Гулак, State University of Telecommunications

PhD, Assistant Professor, State University of Telecommunications

Володимир Леонідович Бурячок, State University of Telecommunications

Doctor of technical sciences, professor, State University of Telecommunications

Павло Миколайович Складанний, State University of Telecommunications

graduate student, State University of Telecommunications

References

Г. Гулак, В. Мухачев, В. Хорошко, Ю. Яремчук, Основи криптографічного захисту інформації: підручник, Вінниця: ВНТУ, 2011, 198 с.

Г. Гулак, Л. Ковальчук "Різні підходи до визна-чення випадкових послідовностей", Науково-технічний збірник «Правове, нормативне та метрологічне забезпечення системи захисту інформації в Україні», вип. 3, С. 127-133, 2001.

А. Бабаш, Г. Шанкин, Криптография, СОЛОН-Р, 2002, 512 с.

С. Айвазян Прикладна статистика: Основи моделлю-вання та первинна обробка даних, М.: Финанси та ста-тистика, 1983, 471 с.

Published

2017-06-26

Issue

Section

Articles