Breus R. Generation of pseudo-random sequences of operations of strict stable cryptographic coding based on the transformation of the second operand

Українська версія

Thesis for the degree of Candidate of Sciences (CSc)

State registration number

0421U100320

Applicant for

Specialization

  • 05.13.05 - Комп'ютерні системи та компоненти

09-02-2021

Specialized Academic Board

Д 73.052.04

Cherkasy State Technological University

Essay

The dissertation is devoted to increasing of the speed of streaming encryption at the expense of generating of pseudo - random sequences of a group of two-bit two-operand operations of a strict stable cryptographic coding (further TBTOO of SSCC) based on the transformation of the second operand. The first section provides an overview of publications on the synthesis of operations of cryptographic coding of information. The directions of improvement of cryptographic coding are defined, the purpose and on its basis, the tasks of dissertation research are formulated. The second section is devoted to the synthesis of inverted TBTOO of SSCC based on the transformation of the second operand, the technology of studying the relationship between direct and inverse operations of cryptic transformation is proposed. The third section is devoted to the development of a method for the synthesis of the TBTOO of SSCC group based on the transformation of the second operand of a known operation. The relationship between direct and inverse operations allows the synthesis of inverse operations, and each inverse operation, in its turn, is a direct operation for another inverse operation, i.e. it is possible to synthesize another operation by converting the second operand with a single operand operation. The fourth section is devoted to the development of a method for generating pseudo-random sequences of TBTOO SSCC based on the transformation of the second operand, for this purpose, the results of synthesis of groups of TBTOO of SSCC based on the first operation are generalized. For the first time the method of synthesis of inverse two-bit two-operand operations of strict stable cryptographic coding based on a set of two-bit two-operand operations of strict stable cryptographic coding is developed; the relationships between direct and inverse operations, by transforming the second operand are established; all previously mentioned measures provided the possibility of practical application of these operations. For the first time a method of synthesis of a group of two-bit two-operand operations of strict stable cryptographic coding on the basis of using the known twobit two-operand operation of strict stable cryptographic coding and transformations of the second operand was developed. It was achieved by sequentially performing on this operation a group of two-bit single-operand operations, which provided the opportunity to increase the variability of crypto-primitives in the practical application of these operations. For the first time the method of generation of pseudo-random sequences of two-bit two-operand operations of strict stable cryptographic coding on the basis of use of groups of two-bit two-operand operations of strict stable cryptographic coding and two-bit one-operand operations of strict stable cryptographic coding was developed. It was done by transforming the second operands of direct and inverse two-operand operations, which allowed to increase the speed of streaming encryption by generating pseudo-random sequences of direct and inverse two-bit two-operand operations of strict stable cryptographic coding. The practical value of the work lies in bringing the developed methods to discrete models of operations and algorithms for automatic generation of pseudo-random sequences of operations of strict stable cryptographic coding for streaming computer encryption systems. The variability of cryptographic transformations is expanded by increasing the number of operations from 12 to 24. The developed pseudo-random sequence generator of two-bit two-operand operations of strict stable cryptographic coding provides synthesis of operations 15-20% faster than the tabular method of synthesis when providing a sequence period (24 !)2 . The obtained result provided the speed of implementation of the method of increasing the stability and the reliability of streaming encryption with maximum uncertainty of the conversion results.

Files

Similar theses