Abstract
The paper considers development of cryptographic methods based on the principles of many-valued logic. The results concerning the construction of block and stream cryptographic algorithms based on functions of many-valued logic are presented. The synergy of the principles of many-valued logic and the variable fragmentation of the block made it possible to construct an effective block symmetric cryptographic algorithm. The results of computational experiments confirm its high cryptographic quality and easily scalable number of protection levels. As shown by experiments, the principles of many-valued logic are an excellent basis for the construction of gamma generators (the basis of stream ciphers), which are based on the use of triple sets of ternary bent-sequences. The paper outlines the scope of the tasks, the solution of which is necessary for the further development in this direction of cryptography.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shannon, C.E.: A Mathematical Theory of Cryptography. Bell System Technical Memo. MM 45-110-02 (1945)
Goyal, R., Khurana, M.: Cryptographic security using various encryption and decryption method. Int. J. Math. Sci. Comput. (IJMSC) 3(3), 1–11 (2017). https://doi.org/10.5815/ijmsc.2017.03.01
Zhdanov, O.N., Sokolov, A.V.: The encryption algorithm with variable block fragmentation, collection of scientific papers on the results of international scientific-practical conference. Probl. Achiev. Sci. Technol. 2, 153–159 (2015). [Original text in Russian]
Zakharova, K.O.: Research of statistical parameters of the encryption algorithm with different block fragmentation. In: Materials of the XXI International Scientific and Practical Conference, Dedicated to the Memory of the General Designer Of Rocket-Space Systems Academician M.F. Reshetnev, Krasnoyarsk, Part 2, pp. 400–401 (2017)
Mitrashchuk, V.V.: Protocol of secure data exchange based on encryption algorithm with alternating block fragmentation. Mod. Sci. Technol. Innov. 16, 299–301 (2017)
Fang, Z., Liu, Y.: Ternary Error Correcting Codes, Chinese Science Abstracts Series A, p. 54 (1995)
Gnatyuk, S.O., Zhmurko, T.O., Kinzeryavy, V.M., Siyilova, N.A.: Method for quality evaluation of trit pseudorandom sequence to cryptographic applications. Inf. Technol. Secur. 3(2), 108–116 (2015)
Arshad Ali, M., Ali, E., Ahsan Habib, M., Nadim, M., Kusaka, T., Nogami, Y.: Pseudo random ternary sequence and its autocorrelation property over finite field. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 9(9), 54–63 (2017). https://doi.org/10.5815/ijcnis.2017.09.07
Zhdanov, O.N., Sokolov, A.V.: Block symmetric cryptographic algorithm based on principles of variable block length and many-valued logic. Far East J. Electron. Commun. 16(3), 573–589 (2016)
Mazurkov, M.I., Sokolov, A.V., Barabanov, N.A.: Synthesis method for bent sequences in the Vilenkin-Chrestenson basis. Radioelectr. Commun. Syst. 59(11), 510–517 (2016)
Zui, H.N., Moldovyan, N.A., Fakhrutdinov, R.S.: New class of controlled elements f 2/3 for the synthesis of high-speed block ciphers. Probl. Inf. Secur. 1, 10–18 (2011). [Original text in Russian]
Kumaresan, G., Gopalan, N.P.: An Analytical study of cellular automata and its applications in cryptography. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 9(12), 45–54 (2017). https://doi.org/10.5815/ijcnis.2017.12.06
Nandi, S., Roy, S., Dansana, J., Karaa, W.B.A., Ray, R., Chowdhury, S.R., Chakraborty, S., Dey, N.: Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 6(11), 1–12 (2014). https://doi.org/10.5815/ijcnis.2014.11.01
Stakhov, A.: Brousentsov’s ternary principle, Bergman’s number system and ternary mirror-symmetrical arithmetic. Comput. J. 45(2), 221–236 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Sokolov, A., Zhdanov, O. (2019). Prospects for the Application of Many-Valued Logic Functions in Cryptography. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds) Advances in Computer Science for Engineering and Education. ICCSEEA 2018. Advances in Intelligent Systems and Computing, vol 754. Springer, Cham. https://doi.org/10.1007/978-3-319-91008-6_33
Download citation
DOI: https://doi.org/10.1007/978-3-319-91008-6_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-91007-9
Online ISBN: 978-3-319-91008-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)