Таблиця 2 Імовірності появи символьних помилок при використанні методів завадостійкого кодування Назва коду Відносна швидкість, R=m/n Надлишковість коду, K=k/n Pc, при дБ N E c 2 / 0 Pc, при дБ N E c 10 / 0 ЛУ-код
This article studied a group of the same type of elementary functions with the same complexity for cryptographic transformations. To understand the physical nature of these functions have been built functional circuit, whose analysis showed that these features provide a permutation of digits depending on the information that is converted. A model of elementary functions, control information for cryptographic transformations, correctness of which is confirmed by specific examples is built. Defined the essence of the method of synthesis of elementary functions permutations, control information, and it is shown that this method is consistent with the results of computational experiment. The possibility of using permutations of elementary functions, the control information, comprising operations for cryptographic conversion permutation bits, bits between bytes, bits between words was proved. Research results can be used to improve existing and create new cryptoprimitives.
cryptographic transformation of information is studied. An attempt has been made to obtain three-bit operations based on two-bit operations of cryptographic information conversion. For this purpose, logical functions are presented in the form of logical operations of two variables corresponding to them in analytical representation. Two-bit elementary functions in the operation of cryptographic information transformation are combined. The study calculates the number of twobit, three-bit and four-bit elementary functions, two-bit, three-bit and four-bit operations. According to the results of the study, it is found that our proposed dependence of the calculation of the number of operations of cryptographic transformation, based on recurrent combination of capacities of sets of operations of lower bit rate and elementary functions, is correct and mathematically describes the process of constructing the sets of new operations. Based on the results of this study, it can be considered that the development of a single technology for the synthesis and investigation of both linear and nonlinear operations of cryptographic transformation of information is possible. This approach allows not only to calculate the number of operations of cryptographic information conversion, but also to construct the operations themselves by combining known cryptographic transformation operations and elementary higher bit functions. The proposed approach creates the preconditions for the development of a single technology for the description and synthesis of both linear and nonlinear crypto-transformation operations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.