Combinatorial polynomially computable characteristics of substitutions and their properties
( Pp. 34-41)

More about authors
Zobov Anton I. research employee of Foundation for the Promotion of Secure Information Technologies. Moscow, Russian Federation. E-mail: zobowai@gmail.com
Foundation for the Promotion of Secure Information Technologies
Moscow, Russian Federation Nikonov Vladimir G. Doctor of Engineering, Professor; member at the Presidium
Russian Academy of Natural Sciences
Moscow, Russian Federation
Abstract:
The construction and selection of a suitable bijective function, that is, substitution, is now becoming an important applied task, particularly for building block encryption systems. Many articles have suggested using different approaches to determining the quality of substitution, but most of them are highly computationally complex. The solution of this problem will significantly expand the range of methods for constructing and analyzing scheme in information protection systems. The purpose of research is to find easily measurable characteristics of substitutions, allowing to evaluate their quality, and also measures of the proximity of a particular substitutions to a random one, or its distance from it. For this purpose, several characteristics were proposed in this work: difference and polynomial, and their mathematical expectation was found, as well as variance for the difference characteristic. This allows us to make a conclusion about its quality by comparing the result of calculating the characteristic for a particular substitution with the calculated mathematical expectation. From a computational point of view, the thesises of the article are of exceptional interest due to the simplicity of the algorithm for quantifying the quality of bijective function substitutions. By its nature, the operation of calculating the difference characteristic carries out a simple summation of integer terms in a fixed and small range. Such an operation, both in the modern and in the prospective element base, is embedded in the logic of a wide range of functional elements, especially when implementing computational actions in the optical range, or on other carriers related to the field of nanotechnology.
How to Cite:
Zobov A.I., Nikonov V.G., (2020), COMBINATORIAL POLYNOMIALLY COMPUTABLE CHARACTERISTICS OF SUBSTITUTIONS AND THEIR PROPERTIES. Computational Nanotechnology, 2 => 34-41.
Reference list:
Agievich S.V., Afonenko A.A. On the properties of exponential substitutions. Vesti NAN Belarusi. 2005. No. 1. Pp. 106-112. (In Russ.)
Agievich S.V., Galinsky B.A., Mikulich N.D., Kharin U.S. Algorithm of block encryption BelT. http://apmi.bsu.by/assets/files/agievich/BelT.pdf (In Russ.)
Barreto P., Rijmen V. The ANUBIS block cipher. NESSIE submission. 2000.
Barreto P., Rijmen V. The KHAZAD block cipher. NESSIE submission. 2000.
Chabaud F., Vaudenay S. Links between differential and linear cryptanalysis. EUROCRYPT, Lect. Notes Comput. Sci. 1994. No. 950. Pp. 356-365.
Daemen J., Rijmen V. Probability distributions of correlations and differentials in block ciphers. J. Math. Crypt. 2007. No. 1. Pp. 221-242.
GOST R 34.12-2015. Information technology. Cryptographic protection of information. Block ciphers. Moscow: Standartinform, 2015. (In Russ.)
Matsui M. The first experimental cryptanalysis of the data encryption standart. Advances of Cryptology - CRYPTO 94. Lect. Notes in Comp Sci. Springer. 1995. Vol. 839. Pp. 1-11.
Skipjack and KEA Algorithm Specifications, Version 2.0. 1998, http://csrc.nist.gov/encryption/skipjack-kea/htm
Kudryavtsev V.A. Summirovanie stepeney chisel natural nogo ryada i chisla Bernulli. L.: Ob ed. nauch.-tekhn. izd-vo NKTP SSSR, 1936. 37 s.
Logachev O.A., Sal nikov A.A., Smyshlyaev S.V., YAshchenko V.V. Bulevy funktsii v teorii kodirovaniya i kriptologii. 2-e izd., dopoln. M.: MTSNMO, 2012. 584 s.
Logachev O.A., Fedorov S.N., YAshchenko V.V. Bulevy funktsii kak tochki na gipersfere v evklidovom prostranstve // Diskretnaya matematika. 2018. № 30:1. Rr. 39-55.
Menyachikhin A.V. Spektral no-lineynyy i spektral no-differentsial nyy metody postroeniya S-bokcov s blizkimi k optimal nym znacheniyami kriptograficheskikh parametrov // Matematicheskie voprosy kriptografii. 2017. T. 8. № 2, S. 97-116.
Nikonov V.G. Metody kompaktnoy realizatsii biektivnykh otobrazheniy, zadannykh regulyarnymi sistemami odnotipnykh bulevykh funktsiy / V.G. Nikonov, A.V. Sarantsev // Vestnik Rossiyskogo un-ta Druzhby Narodov. Seriya: Prikladnaya i promyshlennaya matematika. 2003. T. 2. № 1. S. 94-105.
YAblonskiy S.V. Vvedenie v diskretnuyu matematiku: ucheb. posobie dlya vuzov. 2-e izd., pererab. i dop. M.: Nauka. Gl. red. fiz.-mat. lit. 384 s.
Keywords:
BelT, Hazad, Skipjack, substitution, S-box, Kuznechik, BelT, Hazad, Skipjack.


Related Articles

Information Security Pages: 36-41 DOI: 10.33693/2313-223X-2023-10-2-36-41 Issue №23034
Construction of a Reversible Full-cycle Transformation in a Threshold Basis
substitution threshold function full cycle
Show more
2. MATHEMATICAL MODELING, NUMERICAL METHODS AND COMPLEX PROGRAMS Pages: 132-138 Issue №7537
The usage of equalprobable functions with mutal implicantive covering of straight diameter in the problem of constructing bijective mapping ф:Vr2 → Vr2
equiprobable function functions with full implicative coating bijective mapping substitution
Show more