PARALLEL IMPLEMENTATION OF NONLINEAR EXTENDED MATRIX CRYPTOGRAPHICAL TRANSFORMATION


Cite item

Full Text

Abstract

In this investigation, parallel implementation of nonlinear extended matrix cryptographical transformation is carried out on the base of research results and classification of basic elementary functions.

The extended matrix transformation allows to increase the number of operations of cryptographical transformation and, as a consequent, to improve cryptosecurity of information safety systems. The research proved that it is caused by the fact that the operations of matrix and extended matrix transformation do not form single group.

Cryptographic coding on the base of extended matrix transformation may be carried out both over matrices and over three bits simultaneously.

The article presents an algorithm of parallel implementation of extended matrix cryptographical transformation.

The results of program implementation of extended matrix transformation were evaluated on the base of statistical tests NIST STS.

The implementation of extended matrix cryptographic transformation meets the requirements of program package of statistical tests NIST STS.

The research proved that practical application of the operation of extended matrix cryptographic transformation is carried out on the base of gamma-sequence.

As the cryptographical transformations may be carried out simultaneously the time of cryptographical transformation will be determined only by the time of forming of gamma-sequence nk bits.  In that case, the increase of cryptographical transformation speed will be determined by ratio of information size coded on the base of operations of extended matrix transformation under control of gamma-sequence to the number of bits subjected to the gamma-process.

Nonlinear extended matrix cryptographical transformation depending on nk and  Kon parameters allows to improve cryptosecurity from 1032 to 10150 times proportionally against the stream coding when reducing time of coding in 1,5–6   times.

About the authors

Vera Grigorievna Babenko

Odessa National Academy of Telecommunications named after A.S. Popov, Odessa

Email: zolot_verba@rambler.ru

сandidate of technical sciences

Украина

Svetlana Valentinovna Pivneva

Togliatti State University, Tolyatti

Author for correspondence.
Email: tlt.swetlana@rambler.ru

candidate of pedagogic sciences, Assistant Professor of the Department «Higher Mathematics and Mathematic Modeling»

Россия

Olga Grigorievna Melnik

Academy of Fire Safety n. a. Heroes of Chernobyl, Cherkassy

Email: melnyk_olja_2012@mail.ru

сandidate of technical sciences, Assistant Professor of the Department of Engineering Structures

Украина

Ruslan Pavlovich Melnik

Academy of Fire Safety n. a. Heroes of Chernobyl, Cherkassy

Email: indigo211212@gmail.com

candidate of technical sciences, Assistant Professor of the Department of Fire Prevention Activities

Украина

References

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c)



This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies