Analysis of the Application of Logical Operations to Cryptographic Transformations of Information Security Means

Authors

  • M. M. Madaminov Kokand State Pedagogical Institute
  • A. F. Farhodjonov Kokand State Pedagogical Institute

DOI:

https://doi.org/10.47134/ppm.v2i1.1024

Keywords:

Cryptology, Cryptographic Algorithm, Cryptographic Strength, Symmetric Encryption, Opening Key, Disjunction, Conjunction, Transformations, Microprocessor, Boolean Function

Abstract

In the article, the solution to the problem of determining logical operations that ensure cryptographic stability of the transformation of algorithms of cryptographic methods of information security is justified by the criterion of regularity - equal distribution"0" and "1" in the truth table. A logical operation with a truth table of uniform distribution of "0" and "1" and or blocks of bits has the property of cryptographic resistance.

References

A.V. Frunze "Microcontrollers? It's so simple!" 1-3 Vol. Moscow: LLC "IV SKIMAN", 2002

Akbarov D.E. Akhborot havfsizligini taminlashning cryptographic usullari va ularning qўllanilishi – Toshkent, “Uzbekiston Markasi”, 2009 – 434 bet.

Akbarov D. E., Umarov Sh. A. Hash function algorithm with new basic transformations. // Bulletin of the National Technical University "Kyiv Polytechnic Institute". http//visnykpb.kpi.ua/ru/journal. National Technical University. -№ 1(51). 2016, -pp. 100-108

Akbarov D. E., Umarov Sh. A. Development of a new algorithm for data encryption with a symmetric key. // Journal of Siberian Federal University. Engineering & Technologies -2016, No. 9(2). - p. 214-224. DOI: https://doi.org/10.17516/1999-494X-2016-9-2-214-224

Alferov A. P., Zubov A. Yu., Kuzmin A. S., Cheremushkin A. V. Fundamentals of cryptography: Textbook, 2nd ed. – M.: Helios ARV, 2002.-480 p

Akhmedova, L. S. (2022). Application of logical and mathematical methods for the analysis of environmental information. South of Russia: Ecology, Development, 17(4), 206–211. https://doi.org/10.18470/1992-1098-2022-4-206-211 DOI: https://doi.org/10.18470/1992-1098-2022-4-206-211

Babenko, V. (2024). Information-Driven Permutation Operations for Cryptographic Transformation. CEUR Workshop Proceedings, 3654, 137–149. https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85189137528&origin=inward

Brodin V.B., Kalinin A.V. "Systems on microcontrollers and LSI programmable logic" Moscow: "ECOM" 2002.

K, C. K. V. (2024). A novel deep learning technique with cryptographic transformation for enhancing data security in cloud environments. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-024-18903-8 DOI: https://doi.org/10.1007/s11042-024-18903-8

Mikhalycheva, E. A. (2024). Application of Probabilistic Safety Analysis to the Emergency Scenarios Assessment of a Loss of Coolant Accidents in the VVER-Reactor Plant. Nonlinear Phenomena in Complex Systems, 27(1), 69–77. https://doi.org/10.5281/zenodo.10889768 DOI: https://doi.org/10.29235/1561-8358-2024-69-3-253-264

Moldovyan N.A., Moldovyan A.A., Eremeev M.A. Cryptography: from primitives for the synthesis of algorithms. – SPb.: BHV-Petersburg, 2004. - 448 p.

Pang, C. (2022). Research and Application of Tax Classification Prediction Analysis Method Based on Big Data Technology. Lecture Notes on Data Engineering and Communications Technologies, 102, 413–421. https://doi.org/10.1007/978-981-16-7466-2_46 DOI: https://doi.org/10.1007/978-981-16-7466-2_46

Rasheed, A. M. (2024). Lightweight Cryptographic Algorithms for Medical IoT Devices using Combined Transformation and Expansion (CTE) and Dynamic Chaotic System. International Journal of Advanced Computer Science and Applications, 15(4), 705–715. https://doi.org/10.14569/IJACSA.2024.0150472 DOI: https://doi.org/10.14569/IJACSA.2024.0150472

Ryu, C. H. (2022). Modern applications of scanning electrochemical microscopy in the analysis of electrocatalytic surface reactions. Chinese Journal of Catalysis, 43(1), 59–70. https://doi.org/10.1016/S1872-2067(21)63948-7 DOI: https://doi.org/10.1016/S1872-2067(21)63948-7

Schneier B. Applied cryptography. Protocols, algorithms, source texts in C. –M.: TRIUMF Publishing House, 2003 - 816 p.

Shalyto A.A. Logical control. Methods of hardware and software implementation. – St. Petersburg: , 1999. -779 p.

V.N. Baranov. "Application of AVR microcontrollers: circuits, algorithms, programs". Moscow, 2004. - 288 p.

Yu, Z. (2023). Application of Combinatorics Based on Discrete Analysis in WCET Embedded Software Testing Technology. Lecture Notes in Electrical Engineering, 1063, 27–35. https://doi.org/10.1007/978-981-99-4554-2_4 DOI: https://doi.org/10.1007/978-981-99-4554-2_4

Zenzin O. S., Ivanov M. A. Cryptographic Security Standard – AES. Finite Fields / Edited by M. A. Ivanov – M.: KUDITS-OBRAZ, 2002. - 176 p.

Zhang, H. (2023). Application of Python Scientific computing library and Simulation in Circuit Analysis. Proceedings - 2023 12th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2023, 892–898. https://doi.org/10.1109/CSNT57126.2023.10134600 DOI: https://doi.org/10.1109/CSNT57126.2023.10134600

Downloads

Published

2024-10-31

How to Cite

Madaminov, M. M., & Farhodjonov, A. F. (2024). Analysis of the Application of Logical Operations to Cryptographic Transformations of Information Security Means . Jurnal Pendidikan Matematika, 2(1), 9. https://doi.org/10.47134/ppm.v2i1.1024

Issue

Section

Articles