Use of "rectangular grid" code for permutation key generation
DOI:
https://doi.org/10.18372/2410-7840.15.4783Keywords:
route permutation, "rectangular grid" code, rectangular stencils, random number generation, permutation key generationAbstract
In the complicated algorithms of today are widely used rearranging ciphers that use a rectangular table. The essence of cryptographic transformation in such ciphers are that the symbols of the original message are entered in the cells of the table following a route, and then – the symbols are write out in a different route from it. Such codes are called ciphers of route rearranging. It was determined that "rectangular grid" code is route permutation algorithm, in which a rule placing symbols in the block is given by a rectangular stencil, can be used not only to encrypt the message block, but also for permutation key generation. Using core provisions of the matrix al-gebra the mathematical formulation of the "rectangular grid" cipher for permutation key generation, as well as mathematical formulation of the permutation algorithm of matrix columns of the original message, the number of rows which can be random, were developed.
References
Адаменко М.В. Основы классической криптологии: секреты шифров и кодов / М.В. Адаменко. – М. : Изд-во "ДМК Прес", 2012. – 256 c.
Архипов А.Е. О моделировании некоторых типов случайных последовательностей / А.Е. Архипов // Вестник Киевского политехнического института. – К. : Изд-во Киев. политехн. ин-та, 1988. – Вып. 12. – С. 39-44.
Василенко В.С. Матричні криптографічні перетворення в задачах захисту цілісності інформації / В.С. Василенко, О.В. Дубчак, М.Ю. Василенко // Захист інформації : наук.-практ. журнал. – К. : Вид-во НАУ. – 2012. – № 4. – С. 42-50.
Герасимчук М.В. Шифрування інформації методом переставляння / М.В. Герасимчук, Ю.І. Гри-цюк // Науковий вісник НЛТУ України : зб. на-ук.-техн. праць. – Львів : РВВ НЛТУ України. – 2011. – Вип. 21.4. – С. 329-336.
Захарченко М.В. Розвинення криптології та її місце в сучасному суспільстві : навч. посібн. / М.В. Захарченко, Л.Г. Йона, Ю.В. Щербина, О.В. Онацький. – Одеса : Вид-во ОНАЗ ім. О.С. Попова, 2003. – 180 c.
Рябко Б.Я. Криптографические методы защиты информации : учебн. пособ. [для студ. ВУЗов] / Б.Я. Рябко, Ф.Н. Фионов. – М. : Изд-во "Горячая линия–Телеком", 2005. – 229 с.
Dharwadker Ashay. A new algorithm for finding Hamiltonian circuits / Ashay Dharwadker. [Electronic resource]. – Mode of access http://www.dharwadker.org/hamilton/
Adamenko M.V. Osnovy klassicheskoy kriptologii: sekrety shifrov i kodov / M.V. Adamenko, M. : Izd-vo "DMK Pres", 2012, 256 р.
Arkhipov A.E. O modelirovanii nekotorykh tipov sluchaynykh posledovatelnostey / A.E. Arkhipov // Vestnik Kievskogo politekhnicheskogo instituta, K. : Izd-vo Kiev. politekhn. in-ta, 1988, Vyp. 12, рр. 39-44.
Vasylenko V.S. Matrychni kryptografichni peretvorennya v zadachakh zakhystu tsilisnosti informatsiyi / V.S. Vasylenko, O.V. Dubchak, M.Yu. Vasylenko // Zakhyst informatsiyi : nauk.-prakt. zhurnal. – K. : Vyd-vo NAU, 2012, № 4, рр. 42-50.
Gerasymchuk M.V. SHyfruvannya informatsiyi metodom perestavlyannya / M.V. Gerasymchuk, YU.I. Grytsyuk // Naukovyy visnyk NLTU Ukrayiny : zb. nauk.-tekhn. Prats, Lviv : RVV NLTU Ukrayiny, 2011, Vyp. 21.4, рр. 329-336.
Zakharchenko M.V. Rozvynennya kryptologiyi ta yiyi mistse v suchasnomu suspilstvi : navch. posibn. / M.V. Zakharchenko, L.G. Yona, Yu.V. SCHerbyna, O.V. Onatskyy, Odesa : Vyd-vo ONAZ im. O.S. Popova, 2003, 180 р.
Ryabko B.YA. Kriptograficheskie metody zaschity informatsii : uchebn. posob. [dlya stud. VUZov] / B.YA. Ryabko, F.N. Fionov, M. : Izd-vo "Goryachaya liniya–Telekom", 2005, 229 р.
Dharwadker Ashay. A new algorithm for finding Hamiltonian circuits / Ashay Dharwadker. [Electronic resource]. – Mode of access http://www.dharwadker.org/hamilton/
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).