Skip to main content

2019 | OriginalPaper | Buchkapitel

Prospects for the Application of Many-Valued Logic Functions in Cryptography

verfasst von : Artem Sokolov, Oleg Zhdanov

Erschienen in: Advances in Computer Science for Engineering and Education

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The paper considers development of cryptographic methods based on the principles of many-valued logic. The results concerning the construction of block and stream cryptographic algorithms based on functions of many-valued logic are presented. The synergy of the principles of many-valued logic and the variable fragmentation of the block made it possible to construct an effective block symmetric cryptographic algorithm. The results of computational experiments confirm its high cryptographic quality and easily scalable number of protection levels. As shown by experiments, the principles of many-valued logic are an excellent basis for the construction of gamma generators (the basis of stream ciphers), which are based on the use of triple sets of ternary bent-sequences. The paper outlines the scope of the tasks, the solution of which is necessary for the further development in this direction of cryptography.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shannon, C.E.: A Mathematical Theory of Cryptography. Bell System Technical Memo. MM 45-110-02 (1945) Shannon, C.E.: A Mathematical Theory of Cryptography. Bell System Technical Memo. MM 45-110-02 (1945)
3.
Zurück zum Zitat Zhdanov, O.N., Sokolov, A.V.: The encryption algorithm with variable block fragmentation, collection of scientific papers on the results of international scientific-practical conference. Probl. Achiev. Sci. Technol. 2, 153–159 (2015). [Original text in Russian] Zhdanov, O.N., Sokolov, A.V.: The encryption algorithm with variable block fragmentation, collection of scientific papers on the results of international scientific-practical conference. Probl. Achiev. Sci. Technol. 2, 153–159 (2015). [Original text in Russian]
4.
Zurück zum Zitat Zakharova, K.O.: Research of statistical parameters of the encryption algorithm with different block fragmentation. In: Materials of the XXI International Scientific and Practical Conference, Dedicated to the Memory of the General Designer Of Rocket-Space Systems Academician M.F. Reshetnev, Krasnoyarsk, Part 2, pp. 400–401 (2017) Zakharova, K.O.: Research of statistical parameters of the encryption algorithm with different block fragmentation. In: Materials of the XXI International Scientific and Practical Conference, Dedicated to the Memory of the General Designer Of Rocket-Space Systems Academician M.F. Reshetnev, Krasnoyarsk, Part 2, pp. 400–401 (2017)
5.
Zurück zum Zitat Mitrashchuk, V.V.: Protocol of secure data exchange based on encryption algorithm with alternating block fragmentation. Mod. Sci. Technol. Innov. 16, 299–301 (2017) Mitrashchuk, V.V.: Protocol of secure data exchange based on encryption algorithm with alternating block fragmentation. Mod. Sci. Technol. Innov. 16, 299–301 (2017)
6.
Zurück zum Zitat Fang, Z., Liu, Y.: Ternary Error Correcting Codes, Chinese Science Abstracts Series A, p. 54 (1995) Fang, Z., Liu, Y.: Ternary Error Correcting Codes, Chinese Science Abstracts Series A, p. 54 (1995)
7.
Zurück zum Zitat Gnatyuk, S.O., Zhmurko, T.O., Kinzeryavy, V.M., Siyilova, N.A.: Method for quality evaluation of trit pseudorandom sequence to cryptographic applications. Inf. Technol. Secur. 3(2), 108–116 (2015) Gnatyuk, S.O., Zhmurko, T.O., Kinzeryavy, V.M., Siyilova, N.A.: Method for quality evaluation of trit pseudorandom sequence to cryptographic applications. Inf. Technol. Secur. 3(2), 108–116 (2015)
9.
Zurück zum Zitat Zhdanov, O.N., Sokolov, A.V.: Block symmetric cryptographic algorithm based on principles of variable block length and many-valued logic. Far East J. Electron. Commun. 16(3), 573–589 (2016)CrossRef Zhdanov, O.N., Sokolov, A.V.: Block symmetric cryptographic algorithm based on principles of variable block length and many-valued logic. Far East J. Electron. Commun. 16(3), 573–589 (2016)CrossRef
10.
Zurück zum Zitat Mazurkov, M.I., Sokolov, A.V., Barabanov, N.A.: Synthesis method for bent sequences in the Vilenkin-Chrestenson basis. Radioelectr. Commun. Syst. 59(11), 510–517 (2016)CrossRef Mazurkov, M.I., Sokolov, A.V., Barabanov, N.A.: Synthesis method for bent sequences in the Vilenkin-Chrestenson basis. Radioelectr. Commun. Syst. 59(11), 510–517 (2016)CrossRef
11.
Zurück zum Zitat Zui, H.N., Moldovyan, N.A., Fakhrutdinov, R.S.: New class of controlled elements f 2/3 for the synthesis of high-speed block ciphers. Probl. Inf. Secur. 1, 10–18 (2011). [Original text in Russian] Zui, H.N., Moldovyan, N.A., Fakhrutdinov, R.S.: New class of controlled elements f 2/3 for the synthesis of high-speed block ciphers. Probl. Inf. Secur. 1, 10–18 (2011). [Original text in Russian]
13.
Zurück zum Zitat Nandi, S., Roy, S., Dansana, J., Karaa, W.B.A., Ray, R., Chowdhury, S.R., Chakraborty, S., Dey, N.: Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 6(11), 1–12 (2014). https://doi.org/10.5815/ijcnis.2014.11.01 Nandi, S., Roy, S., Dansana, J., Karaa, W.B.A., Ray, R., Chowdhury, S.R., Chakraborty, S., Dey, N.: Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 6(11), 1–12 (2014). https://​doi.​org/​10.​5815/​ijcnis.​2014.​11.​01
14.
Zurück zum Zitat Stakhov, A.: Brousentsov’s ternary principle, Bergman’s number system and ternary mirror-symmetrical arithmetic. Comput. J. 45(2), 221–236 (2002)CrossRef Stakhov, A.: Brousentsov’s ternary principle, Bergman’s number system and ternary mirror-symmetrical arithmetic. Comput. J. 45(2), 221–236 (2002)CrossRef
Metadaten
Titel
Prospects for the Application of Many-Valued Logic Functions in Cryptography
verfasst von
Artem Sokolov
Oleg Zhdanov
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-91008-6_33