Software-modeling complex SCSPS stream encryption algorithm

Authors

  • Анатолій Якович Білецький National Aviation University
  • Денис Олександрович Навроцький National Aviation University
  • Олександр Іванович Семенюк National Aviation University

DOI:

https://doi.org/10.18372/2410-7840.16.6929

Keywords:

cryptographic primitives, stream ciphers, software-modeling complex.

Abstract

Basis stream encryption algorithm SCSPS form Shannonprimitives nonlinear Substitution and Permutations primitives,as well as SP-networks, supplemented by primitivesof “moving coding” and stochastic cyclic Shift. Streamencryption is performed bitwise addition modulo 2 blocksciphered text size is 128, 192 or 256 bits, with equallength blocks of binary pseudorandom numbers (keys orgammas). Flow gammas produced a set of cryptographictransformations underlying secret encryption key. Modelingcomplex is subject to exclusion of one or more entitiesfrom the encryption algorithm. The analysis of efficiencySCSPS algorithm.

Author Biographies

Анатолій Якович Білецький, National Aviation University

Doctor of Science, Professor of DepartmentElectronics of National Aviation University

Денис Олександрович Навроцький, National Aviation University

Postgraduate student of DepartmentElectronics of National Aviation University

Олександр Іванович Семенюк, National Aviation University

Student of Department Electronicsof National Aviation University

References

Asoskov A., Ivanov M., Mirskiy A., Ruzyne A. etc. (2003) "Stream ciphers" M.: KUDITS-OBRAZ, 336 p.

Stream ciphers. The results of foreign-covered cryptology. http://www.ssl.stu.neva.ru/psw/crypto/potok/str_ciph.htm

Stream ciphers A5. http:// ru.wikipedia.org/wiki /A5

Stream ciphers RC4. http:// ru.wikipedia.org/wiki /RC4

Description of the protocols SSL / TLS. Informationalonny document. / Acad LLC "Crypto-Pro" 2002, P. 49. http://www.kryptopro.ru/sites/default/files/docs/TLS

WEP encryption in WI-FI networks. http://kavayii.blogspot.com/2010/01/wep-wi-fi.html

Stream ciphers Rabbit. http:// ru.wikipedia.org/wiki/Rabbit

Advanced Encryption Standard (AES) – FIPS 197 http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

Grey F. (1953) Pulse code communication, Pat. USA, № 2632058.

Beletsky A.Y., Beletsky A.A., Beletsky E.A. (2007) "Gray conversion. Monograph in 2 vols. V.1. Fundamentals of the theory." K.: Book House NAU, 412 p.

Beletsky A.A., Beletsky A.J., Navrotskyi D.A., Semeniuk A.I. (2014) "Software-modeling complex cryptographic primitives like AES-nonlinear substitution" Ukrainian Information Security Research Journal, V.16, №1, P. 12-22.

Ivanov M.A., Chugunkov I.V. (2003) "Theory, application and evaluation of the quality of pseudorandom sequences" M: KUDITS-OBRAZ, 240 p.

Shannon K. (1963) "Works on information theory and cybernetics" Moscow: IL, 829 p.

Knuth D. (1977) "The Art of Computer Programming. Seminumerical algorithms. T. 2." New York: Wiley, 700 p.

Marsaglia G. DIEHART Statistical Test. http://stat.fsu.edu/~geo/diehart/html

Gustafson. H. Statistical Test Suit CRYPT-SX. http://www.istc.qut.edu.au/crypt

Federal Information Processing Standards Publication FIPS PUB 140-1. http://csrc.nist.gov/publications/fips/fips1401.htm

Kravtsov G.O. NIST 800-22. A set of statistical tests of random and pseudo random numbers for cryptographic applications. www.itsway.kiev.ua/ pdf/ Articles180106.pdf

Published

2014-07-25

Issue

Section

Articles