Advertisement

Prospects for the Application of Many-Valued Logic Functions in Cryptography

  • Artem Sokolov
  • Oleg Zhdanov
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 754)

Abstract

The paper considers development of cryptographic methods based on the principles of many-valued logic. The results concerning the construction of block and stream cryptographic algorithms based on functions of many-valued logic are presented. The synergy of the principles of many-valued logic and the variable fragmentation of the block made it possible to construct an effective block symmetric cryptographic algorithm. The results of computational experiments confirm its high cryptographic quality and easily scalable number of protection levels. As shown by experiments, the principles of many-valued logic are an excellent basis for the construction of gamma generators (the basis of stream ciphers), which are based on the use of triple sets of ternary bent-sequences. The paper outlines the scope of the tasks, the solution of which is necessary for the further development in this direction of cryptography.

Keywords

Cryptography Many-valued logic Variable block fragmentation 

References

  1. 1.
    Shannon, C.E.: A Mathematical Theory of Cryptography. Bell System Technical Memo. MM 45-110-02 (1945)Google Scholar
  2. 2.
    Goyal, R., Khurana, M.: Cryptographic security using various encryption and decryption method. Int. J. Math. Sci. Comput. (IJMSC) 3(3), 1–11 (2017). https://doi.org/10.5815/ijmsc.2017.03.01Google Scholar
  3. 3.
    Zhdanov, O.N., Sokolov, A.V.: The encryption algorithm with variable block fragmentation, collection of scientific papers on the results of international scientific-practical conference. Probl. Achiev. Sci. Technol. 2, 153–159 (2015). [Original text in Russian]Google Scholar
  4. 4.
    Zakharova, K.O.: Research of statistical parameters of the encryption algorithm with different block fragmentation. In: Materials of the XXI International Scientific and Practical Conference, Dedicated to the Memory of the General Designer Of Rocket-Space Systems Academician M.F. Reshetnev, Krasnoyarsk, Part 2, pp. 400–401 (2017)Google Scholar
  5. 5.
    Mitrashchuk, V.V.: Protocol of secure data exchange based on encryption algorithm with alternating block fragmentation. Mod. Sci. Technol. Innov. 16, 299–301 (2017)Google Scholar
  6. 6.
    Fang, Z., Liu, Y.: Ternary Error Correcting Codes, Chinese Science Abstracts Series A, p. 54 (1995)Google Scholar
  7. 7.
    Gnatyuk, S.O., Zhmurko, T.O., Kinzeryavy, V.M., Siyilova, N.A.: Method for quality evaluation of trit pseudorandom sequence to cryptographic applications. Inf. Technol. Secur. 3(2), 108–116 (2015)Google Scholar
  8. 8.
    Arshad Ali, M., Ali, E., Ahsan Habib, M., Nadim, M., Kusaka, T., Nogami, Y.: Pseudo random ternary sequence and its autocorrelation property over finite field. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 9(9), 54–63 (2017). https://doi.org/10.5815/ijcnis.2017.09.07Google Scholar
  9. 9.
    Zhdanov, O.N., Sokolov, A.V.: Block symmetric cryptographic algorithm based on principles of variable block length and many-valued logic. Far East J. Electron. Commun. 16(3), 573–589 (2016)CrossRefGoogle Scholar
  10. 10.
    Mazurkov, M.I., Sokolov, A.V., Barabanov, N.A.: Synthesis method for bent sequences in the Vilenkin-Chrestenson basis. Radioelectr. Commun. Syst. 59(11), 510–517 (2016)CrossRefGoogle Scholar
  11. 11.
    Zui, H.N., Moldovyan, N.A., Fakhrutdinov, R.S.: New class of controlled elements f 2/3 for the synthesis of high-speed block ciphers. Probl. Inf. Secur. 1, 10–18 (2011). [Original text in Russian]Google Scholar
  12. 12.
    Kumaresan, G., Gopalan, N.P.: An Analytical study of cellular automata and its applications in cryptography. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 9(12), 45–54 (2017). https://doi.org/10.5815/ijcnis.2017.12.06Google Scholar
  13. 13.
    Nandi, S., Roy, S., Dansana, J., Karaa, W.B.A., Ray, R., Chowdhury, S.R., Chakraborty, S., Dey, N.: Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 6(11), 1–12 (2014). https://doi.org/10.5815/ijcnis.2014.11.01Google Scholar
  14. 14.
    Stakhov, A.: Brousentsov’s ternary principle, Bergman’s number system and ternary mirror-symmetrical arithmetic. Comput. J. 45(2), 221–236 (2002)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Odessa National Polytechnic UniversityOdessaUkraine
  2. 2.Siberian State Aerospace University named after Academician Mikhail F. ReshetnevKrasnoyarskRussia

Personalised recommendations