Babenko V. The methodology for the synthesis of information transformation operations for computer cryptography

Українська версія

Thesis for the degree of Doctor of Science (DSc)

State registration number

0520U100483

Applicant for

Specialization

  • 05.13.05 - Комп'ютерні системи та компоненти

18-09-2020

Specialized Academic Board

Д 73.052.04

Cherkasy State Technological University

Essay

The dissertation is devoted to solving the problem of increasing the efficiency of the use of cryptosystems based on created methodology for the synthesis of operations of cryptographic transformation of information and the construction of cryptographic primitives based on them. The object of the research is the processes of synthesis of information transformation operations. The subject of research is methods and means of synthesizing information transformation operations for computer cryptography. A methodology for the synthesis of operations of cryptographic transformation of information is proposed on the basis of existing and developed methods of the synthesis of operations of direct, reverse and mutual cryptographic transformation by their classification and generalization, which has made it possible to expand the base of operations, the use of which allows to improve existing cryptoalgorithms and crypto primitives and synthesize new ones. The use of the technology for the construction and use of crypto primitives based on synthesized cryptographic transformation operations with affinity and nonlinearity properties has provided the possibility to increase the security due to the variability of operations and the conversion speed due to parallel implementation. A technology for synthesizing operations for multioperational matrix cryptographic primitives of increased security has been developed. This technology has been developed for the synthesis of operations for multioperational matrix cryptographic primitives based on the construction of new groups of operations accurate to permutation by using the proposed tabular model of the cryptographic transformation operation, which has made it possible, due to the variability of operations, to increase the cryptographic security of existing cryptographic primitives. Methods for constructing cryptographic primitives have been improved on the example of sliding encryption primitives based on matrix operations of cryptographic transformation and the obtained generalized recurrent sequences for building models by their parallel implementation, which has provided an increase in encryption speed up to 2 times and security to linear cryptanalysis. The methods of synthesis and analysis of cryptographic algorithms based on a generalized model of the cryptographic algorithm by sequentially-parallel implementation of operations of cryptographic transformation of information at macro and micro levels have been improved, which has made it possible to resolve contradictions between cryptographic security, complexity and speed in order to achieve a given efficiency, based on design tasks. Mathematical models and methods of the synthesis of elementary functions and operations of cryptographic transformations have been further developed on the basis of the group of elementary functions of the extended matrix cryptographic transformation selected from the classification, by improving the mathematical apparatus for synthesizing direct and inverse matrix models of non-affine discrete transformations. Together they have provided the possibility of synthesizing operations of nonlinear cryptographic transformations and confirmed the correctness of the main provisions of the proposed methodology. Variants of implementation at the software and hardware levels of new groups of cryptographic operations of a given bit width with the properties of affinity and nonlinearity, in particular, matrix and extended matrix transformations are proposed. The use of synthesized operations of cryptographic transformation based on the proposed options for combining the use of matrix and extended matrix transformations in the design of algorithms allows to increase the cryptographic security from 2166 to 28157 times in proportion to stream encryption while reducing the encryption time from 1.3 to 8 times. The ability to provide flexible control of the parameters of cryptographic algorithms in the process of their synthesis, based on design problems, has been obtained. Keywords: computer cryptography, cryptographic transformation operations, nonlinearity, variability, parallel implementation, generalized model, cryptographic resistance, transformation speed.

Files

Similar theses