STUDY OF THE CRYPTOGRAPHIC STRENGTH OF THE S-BOX OBTAINED ON THE BASIS OF EXPONENTIATION MODULO
Journal Title: Scientific Journal of Astana IT University - Year 2022, Vol 12, Issue 12
Abstract
This article presents one of the main transformations of symmetric block ciphers used to protect confidential information, a new method for obtaining a non-linear S block, and an analysis of the results obtained. The S-box obtained by this method can be used as a nonlinear transformation in block cipher algorithms to protect confidential data transmitted over an open channel. In most well-known works in the field of analysis and synthesis of modern block symmetric ciphers, S-box is used as a mathematical apparatus for cryptographic Boolean functions. In this case, each S-box is represented by a set of composite Boolean functions whose properties characterize the efficiency of the nonlinear substitution node. Substitution nodes for modern symmetric primitives, including key unfolding functions, are usually implemented as replacement tables. Considering that in most modern block symmetric ciphers for introducing round keys, the encryption algorithm uses a linear operation (bitwise addition modulo 2), S-blocks are the only elements responsible for the cryptographic stability of block encryption algorithms. The required number of rounds of block symmetric ciphers is selected taking into account the results of the cryptographic analysis performed, provided that the properties of S-boxes are specified. As the main criteria and performance indicators, the balance and nonlinearity of composite Boolean functions are used; strict avalanche criterion (SAC), propagation criterion; algebraic degree; the value of the autocorrelation function. In this article, a study was made of the nonlinearity and strict avalanche criterion (SAC) of the S-box used in the block symmetric encryption algorithm. The results of the study were compared with the S-boxes of modern cryptographic algorithms and showed good results.
Authors and Affiliations
Ardabek Khompysh, Nursulu Kapalova, Kunbolat Algazy, Kairat Sakan
DEFENDER-ATTACKER MODELS FOR RESOURCE ALLOCATION IN INFORMATION SECURITY
Today, information security in defender-attacker game models is getting more attention from the research community. A game-theoretic approach applied in resource allocation study requires security in information for su...
USE OF VECTOR ALGEBRA TO ENSURE THE INTEGRITY OF THE COMPONENTS OF THE PROJECT-VECTOR MANAGEMENT MULTISYSTEM OF EDUCATIONAL ENVIRONMENTS
The article is devoted to the development of a mathematical model of the projectvector space of educational environments. Mathematical formalization of the project-vector space is performed. The main directions of appli...
SHIFT IN PARADIGM: STARTUP BUSINESS-INCUBATION AT UNIVERSITIES DURING THE EDUCATIONAL DISCIPLINE INSIDE OF CURRICULUM RATHER THAN EXTRACURRICULAR ACTIVITIES OF STUDENTS
Diploma or Dropout - it is argued, whether graduation is more important than a successful startup. Students drop either college or their ideas. A presented exploratory study about the incubation of technological startu...
RESEARCH OF QUANTUM KEY DISTRIBUTION PROTOCOLS: BB84, B92, E91
The proposed article is devoted to the investigation of quantum key distribution protocols. The idiosyncrasy of this theme lies within the truth that present day strategies of key distribution, which utilize classical...
CALS-MODEL FOR FORMING THE ANTI-CRISIS POTENTIAL OF CONSTRUCTION ENTERPRISES
This paper considers the pecularities of the formation of econmic immunity of construction companies. A system has been proposed to improve the mechanisms of preventive protection and securement of enterprises from los...