For byte-oriented stream cipher on based with a uniform density the nonlinear substitutions algorithm
DOI:
https://doi.org/10.18372/2410-7840.18.10590Keywords:
synchronous stream encryption algorithms, uniformly dense blocks nonlinear substitution, cryptographic protection of informationAbstract
This article discusses the construction of a new byte-ori-ented synchronous stream encryption algorithm, which encrypts the gamma-stochastic sequence of bitsformed by a set of primitives uniformly dense nonlinear substitution S−blocks). Evenly dense are those entities nonlinear sub-stitution reactions which are evenly distributed on the sur-face of the scattering diagram of the primitive. A variant of the synthesis of uniformly dense S−boxes, which scat-terplot exceed the quality characteristics of the respective scatterplot indicators nonlinear substitution algorithm Rijndael block. A comparative analysis of the effectiveness of cryptographic transformations developed and most popular stream encryption algorithms. The directions of application of the proposed codes in various applications.References
Асосков А. В. Поточные шифры / А. В. Асосков, М. А. Иванов, А. А. Мирский, А. А. Рузин и др. – М.: КУДИЦ-ОБРАЗ, 2003. – 336 с.
Поточные шифры. Результаты зарубежной отк-рытой криптологии. [Электронный ресурс] – Ре-жим доступа: http://www.ssl.stu.neva.ru/psw/ crypto/potok/str_ciph.htm.
Поточный шифр А5. [Электронный ресурс] – Ре-жим доступа: http://ru.wikipedia.org/wiki/A5
Поточный шифр RC4. [Электронный ресурс] – Режим доступа: http://ru.wikipedia. org/wiki/RC4
WEP шифрование в WI-FI сетях. [Электронный ресурс] – Режим доступа: http://kavayii.blogspot. com/2010/01/wep-wi-fi.html
Сушко С. А. Поточные шифры. Лекция 6. [Элек-тронный ресурс] – Режим доступа: fitp.ifmo.ru/ shared/files/201111/1_280.pdf.
A Statistical Test Suite for Random and Psevdoran-dom Number Generators for Cryptographic Appli-cations. NIST Special Publication 800-22? Rev. 1a / Technology Administration, U.S. Department of Commerce. – Washington: NIST. – 2010. – P. 131.
Marsaglia G. DIEHARD Statistical Tests. [Элек-тронный ресурс] – Режим доступа: http://stat.fsu. edu/~geo/diehard.html.
Golomb S. W. Shift Register Sequences. / S. W. Golomb. – San Francisco: Holden Day, 1967 (and also reprint: Aegan Park Press, 1982). – ISBN 978-3-540-44523-4.
Безверхая Г. С. Анализ перспективы развития по-точного шифрования. / Г. С. Безверхая. // Сис-теми обробки інформації, 2009, випуск. 7(81). – С. 54-55.
Белецкий А. А. Программно-моделирующий комплекс криптографических AES-подобных примитивов нелинейной подстановки. / А. А. Бе-лецкий, А. Я. Белецкий, Д. А. Навроцкий, А. И. Семенюк. // Захист інформації. Том 16, № 4. – 2014. – С. 274-283.
National Institute of Standards and Technology (NIST), “Federal Information Processing Standard 197, The Advanced Encryption Standard (AES)”, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, 2001.
Долгов В. И. Подстановочные конструкции современных симметричных блочных шифров / В. И. Долгов, Р. В. Олейников, И. В. Лисицкая, Р. В. Сергиенко и др. // Радіоелектронні і комп’ютерні системи, 2009, № 6 (40). – С. 89-93.
Держспецзв'язку впроваджує нові стандарти кри-птографічного захисту інформації. [Электрон-ный ресурс] – Режим доступа: http://www.kmu. gov.ua/control/publish/article?art_id=247952015
Белый шум и его характеристики. [Электронный ресурс] – Режим доступа: http://nauchebe.net/ 2012/03/belyj-shum-i-ego-xarakteristiki.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).