METHODS OF ENCRYPTION BASED ON PERMUTATION UNITS WITH VARIABLE LENGTH
DOI:
https://doi.org/10.18372/2410-7840.17.8794Keywords:
permutation, variable length blocks, openmessage, ciphertext, pseudorandom numbers generator.Abstract
One of the main operations performed by the block ciphersregardless to their architecture is permutation.Modern block ciphers perform permutation operationonly inside a separate block or small group of blocks. Inone of the previous articles the method of pseudorandompermutation of blocks inside the entire message was offeredbut modern block ciphers have fixed block lengthso even after permutation the beginning and endingblocks positions remain known. To increase the cryptographicstrength fragmentation the message to variablelength blocks is offered. Ciphering methods based onvariable length blocks permutation were developed, recommendationsconcerning blocks length quantity andtheir range were produced, the rules of pseudorandomblocks length values generating were offered and compared from cryptographic strength providing point ofview.References
Шеннон К. Работы по теории информации и кибернетике. — М.: Изд. иностр. лит., 1963. — 830 с.
Шнайер Б. Прикладная криптография. – М.: Триумф, 2002 – 816 с.
Ковалевский В. Криптографические методы. – М.: "Компьютер Пресс", 1993 – 236 с.
Баричев С. Г., Гончаров В. В. Стандарт AES. Алгоритм Rijndael. – М.: "Горячая линия – Телеком", 2002 – с. 30 – 35.
Лужецький В.А. Метод формування перестановок довільної кількості елементів /В.А.Лужецький, І.С.Горбенко // Захист інформації. – 2013. – №3 – С. 262-267.
Кнут Д. Искусство программирования. Часть 2. –М.: "Мир", 1976 – 788 с.
Downloads
Published
2015-06-08
Issue
Section
Articles
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).