SYNTHESIS OF MODEL OF REVERSE NONLINEAR OPERATION OF EXTENDED MATRIX CRYPTOGRAPHIC TRANSFORMATION


Cite item

Full Text

Abstract

The operations used for cryptographic transformations should be strong to linear cryptanalysis, so they must have the property of non-linearity.

To synthesize the operations of extended matrix cryptographic transformation the authors used a particular set of three-digit logical functions obtained on the basis of simulation experiment using special software. A classification of these functions following the arguments that produce the first term was carried out and three basic groups were respectively received.

The main advantage of the extended matrix cryptographic transformation operations is one of their main properties - non-linearity, which causes the difficulty of identifying of reverse transformation operations.

The analysis of generalized matrix model of expanded matrix cryptographic transformation operations formed by the replacement of one line of basic elementary function of extended matrix representation showed that the matrix describing the operation of the extended matrix transformation can be represented as the modulo 2 sum of linear matrix transformation and the nonlinear matrix extensions. The experiment proved that the sequence of extension indices forms the increasing sequence. The authors laid down the main rule of extension synthesis and obtained the basic stages of the process of synthesis of the model of reverse nonlinear operation of cryptographic transformation.

The article presents the model of synthesis of nonlinear operation of extended matrix cryptographic transformation on the base of one substitution, and formulates and proved a theorem on the construction of reverse operation of extended matrix cryptographic transformation using one substitution.

The applying of proposed nonlinear operations of extended matrix cryptographic transformation allows to extend a number of operations for construction of cryptographic information protection systems and to improve their cryptographic strength by additional use of these operations.

About the authors

Vladimir Nikolayevich Rudnicki

Cherkassy State Technological University, Cherkassy

Email: RVN_2008@ukr.net

Doctor of Engineering, Professor

Ukraine

Svetlana Valentinovna Pivneva

Togliatti State University, Togliatti

Author for correspondence.
Email: tlt.swetlana@rambler.ru

candidate of pedagogic sciences, assistant professor of the Department «Higher Mathematics and Mathematic Modeling»

Russian Federation

Vera Grigorievna Babenko

Odessa National Academy of Communication named after O.S. Popov, Odessa

Email: zolot_verba@rambler.ru

candidate of technical sciences, doctoral student

Ukraine

Tatiana Anatolievna Stabetskaya

Cherkassy State Technological University, Cherkassy

Email: tatiana_ami@ukr.net

postgraduate student

Ukraine

Kirill Valerievich Korol

Togliatti State University, Togliatti

Email: varkv@yandex.ru

postgraduate student

Russian Federation

References

  1. Babenko V., Melnik O., Melnik R. Сlassification of three-digit elementary functions for cryptographic transformation of the information. Ukrainian Scientific Journal of Information Security, 2013, vol. 19, no. 1, pp. 56–59.
  2. Rudnitsky S.V., Melnik R.P., Veretelnik V.V. Cryptographic transformation of information on the basis three-digit logic functions. Vektor nauki Tolyattinskogo gosudarstvennogo universiteta, 2012, no. 4, pp. 119–122.
  3. Melnik R.P. Application of operations extended matrix cryptographic transformations for information security. Information processing systems, 2012, no. 9, pp. 145–147.
  4. Melnik R.P. Methods and tools for the synthesis of matrix operations advanced cryptographic transformation. Diss. kand. tech. nauk. Cherkasi, 2013, 178 p. (in Ukr.).

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c)



This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies