Analysis of the Application of Logical Operations to Cryptographic Transformations of Information Security Means
DOI:
https://doi.org/10.47134/ppm.v2i1.1024Keywords:
Cryptology, Cryptographic Algorithm, Cryptographic Strength, Symmetric Encryption, Opening Key, Disjunction, Conjunction, Transformations, Microprocessor, Boolean FunctionAbstract
In the article, the solution to the problem of determining logical operations that ensure cryptographic stability of the transformation of algorithms of cryptographic methods of information security is justified by the criterion of regularity - equal distribution"0" and "1" in the truth table. A logical operation with a truth table of uniform distribution of "0" and "1" and or blocks of bits has the property of cryptographic resistance.
References
A.V. Frunze "Microcontrollers? It's so simple!" 1-3 Vol. Moscow: LLC "IV SKIMAN", 2002
Akbarov D.E. Akhborot havfsizligini taminlashning cryptographic usullari va ularning qўllanilishi – Toshkent, “Uzbekiston Markasi”, 2009 – 434 bet.
Akbarov D. E., Umarov Sh. A. Hash function algorithm with new basic transformations. // Bulletin of the National Technical University "Kyiv Polytechnic Institute". http//visnykpb.kpi.ua/ru/journal. National Technical University. -№ 1(51). 2016, -pp. 100-108
Akbarov D. E., Umarov Sh. A. Development of a new algorithm for data encryption with a symmetric key. // Journal of Siberian Federal University. Engineering & Technologies -2016, No. 9(2). - p. 214-224. DOI: https://doi.org/10.17516/1999-494X-2016-9-2-214-224
Alferov A. P., Zubov A. Yu., Kuzmin A. S., Cheremushkin A. V. Fundamentals of cryptography: Textbook, 2nd ed. – M.: Helios ARV, 2002.-480 p
Akhmedova, L. S. (2022). Application of logical and mathematical methods for the analysis of environmental information. South of Russia: Ecology, Development, 17(4), 206–211. https://doi.org/10.18470/1992-1098-2022-4-206-211 DOI: https://doi.org/10.18470/1992-1098-2022-4-206-211
Babenko, V. (2024). Information-Driven Permutation Operations for Cryptographic Transformation. CEUR Workshop Proceedings, 3654, 137–149. https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85189137528&origin=inward
Brodin V.B., Kalinin A.V. "Systems on microcontrollers and LSI programmable logic" Moscow: "ECOM" 2002.
K, C. K. V. (2024). A novel deep learning technique with cryptographic transformation for enhancing data security in cloud environments. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-024-18903-8 DOI: https://doi.org/10.1007/s11042-024-18903-8
Mikhalycheva, E. A. (2024). Application of Probabilistic Safety Analysis to the Emergency Scenarios Assessment of a Loss of Coolant Accidents in the VVER-Reactor Plant. Nonlinear Phenomena in Complex Systems, 27(1), 69–77. https://doi.org/10.5281/zenodo.10889768 DOI: https://doi.org/10.29235/1561-8358-2024-69-3-253-264
Moldovyan N.A., Moldovyan A.A., Eremeev M.A. Cryptography: from primitives for the synthesis of algorithms. – SPb.: BHV-Petersburg, 2004. - 448 p.
Pang, C. (2022). Research and Application of Tax Classification Prediction Analysis Method Based on Big Data Technology. Lecture Notes on Data Engineering and Communications Technologies, 102, 413–421. https://doi.org/10.1007/978-981-16-7466-2_46 DOI: https://doi.org/10.1007/978-981-16-7466-2_46
Rasheed, A. M. (2024). Lightweight Cryptographic Algorithms for Medical IoT Devices using Combined Transformation and Expansion (CTE) and Dynamic Chaotic System. International Journal of Advanced Computer Science and Applications, 15(4), 705–715. https://doi.org/10.14569/IJACSA.2024.0150472 DOI: https://doi.org/10.14569/IJACSA.2024.0150472
Ryu, C. H. (2022). Modern applications of scanning electrochemical microscopy in the analysis of electrocatalytic surface reactions. Chinese Journal of Catalysis, 43(1), 59–70. https://doi.org/10.1016/S1872-2067(21)63948-7 DOI: https://doi.org/10.1016/S1872-2067(21)63948-7
Schneier B. Applied cryptography. Protocols, algorithms, source texts in C. –M.: TRIUMF Publishing House, 2003 - 816 p.
Shalyto A.A. Logical control. Methods of hardware and software implementation. – St. Petersburg: , 1999. -779 p.
V.N. Baranov. "Application of AVR microcontrollers: circuits, algorithms, programs". Moscow, 2004. - 288 p.
Yu, Z. (2023). Application of Combinatorics Based on Discrete Analysis in WCET Embedded Software Testing Technology. Lecture Notes in Electrical Engineering, 1063, 27–35. https://doi.org/10.1007/978-981-99-4554-2_4 DOI: https://doi.org/10.1007/978-981-99-4554-2_4
Zenzin O. S., Ivanov M. A. Cryptographic Security Standard – AES. Finite Fields / Edited by M. A. Ivanov – M.: KUDITS-OBRAZ, 2002. - 176 p.
Zhang, H. (2023). Application of Python Scientific computing library and Simulation in Circuit Analysis. Proceedings - 2023 12th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2023, 892–898. https://doi.org/10.1109/CSNT57126.2023.10134600 DOI: https://doi.org/10.1109/CSNT57126.2023.10134600
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 M. M. Madaminov, A. F. Farhodjonov

This work is licensed under a Creative Commons Attribution 4.0 International License.