2018
DOI: 10.1515/eng-2018-0013
|View full text |Cite
|
Sign up to set email alerts
|

The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network

Abstract: This paper addresses to structures and properties of the cryptographic information protection algorithm model based on NPNs and constructed on an SPnetwork. The main task of the research is to increase the cryptostrength of the algorithm. In the paper, the transformation resulting in the improvement of the cryptographic strength of the algorithm is described in detail. The proposed model is based on an SP-network. The reasons for using the SP-network in this model are the conversion properties used in these ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…Any changes in the input data of an S-box must lead to similar-to-random changes in the output data. The relationship between input and output values should not be linear or easily approximated by linear functions (this particular property is used in the linear cryptanalysis) (Kapalova & Haumen, 2018). It is known that S-boxes are used now in many symmetric encryption algorithms, such as AES, GOST R34.13-2015, DES, Twofish, etc.…”
Section: Mathematical Developmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Any changes in the input data of an S-box must lead to similar-to-random changes in the output data. The relationship between input and output values should not be linear or easily approximated by linear functions (this particular property is used in the linear cryptanalysis) (Kapalova & Haumen, 2018). It is known that S-boxes are used now in many symmetric encryption algorithms, such as AES, GOST R34.13-2015, DES, Twofish, etc.…”
Section: Mathematical Developmentmentioning
confidence: 99%
“…It is known that the cryptostrength of block encryption algorithms depends on the cryptostrength of the S-boxes used in the algorithms. In this context, the linear and differential analyses were performed for the S-boxes used in the proposed algorithm, and the results obtained were compared with the same for the S-boxes of other algorithms (Table 4) (Kapalova & Haumen, 2018).…”
Section: Cryptanalysis Of the S-box In Usementioning
confidence: 99%
“…In recent years, the Institute of Information and Computational Technologies of the Science Committee of the Ministry of Education and Science of the Republic of Kazakhstan has carried out research on the study of symmetrical block encryption algorithms for electronic messages and has developed various modifications, including those based on non-positional polynomial notations (NPNs) [15][16][17][18][19][20][21]. These works, in turn, will contribute to the creation of domestic cryptographic information protection facilities.…”
Section: Literature Reviewmentioning
confidence: 99%
“…As is known, ciphers are based on reversible transformations of plaintext. When working on ciphers, care must be exercised that every operation performed is both cryptographically robust and reversible under a known key [3].…”
Section: Introductionmentioning
confidence: 99%