A METHOD OF CONSTRUCTING A BLOCK CIPHERS ROUND FUNCTION’S POLYNOMIAL OVER A FINITE FIELD
Journal Title: Современные информационные технологии и ИТ-образование - Year 2018, Vol 14, Issue 3
Abstract
The work outlines the method of construction of round function as a polynomial of one variable over the finite field. The proposed method is based on the calculation of the initial cryptographic transformation at special points of the finite field and the subsequent inversion of Vandermonde matrix. For this class of matrices, there are algorithms for calculating the inverse matrix, which are much more efficient than the standard algorithm of inversion using the Gauss method. In the proposed work, the Traub algorithm is used. The computational complexity of Traub algorithm is proportional to the square of the size of a given matrix. The method is applicable to block iterative ciphers of special type (SP-network). For this type of ciphers, mathematical evaluations of algebraic parameters of polinomials of round functions over the finite fields are provided. Quantative values of estimations are calculated for Russian encryption standard "Kuznechik". The estimates of computational complexity of the proposed method are provided. The article contains practical results of estimations of work time for polynomials notation for finite fields of varying dimensions. The proposed method is used for explicit calculation of the polynomial of one variable over the finite field of round function of block cipher PRESENT.
Authors and Affiliations
Sergey Belov
MATHEMATICAL AND SOFTWARE SOLUTIONS OF STOCHASTIC CELLULAR AUTOMATONS WITH MEMORY
In provided article a model of stochastic cellular automatons with memory is discussed. The analysis of the model shows that the dynamics of state changes in such systems is very complex and non-obvious and requires furt...
ARCHITECTURE OF THE PARALLEL SOFTWARE FOR THE SIMULATION OF MULTIDIMENSIONAL PROBLEMS
The architecture of the parallel software constructed on the basis of a design pattern «Bridge», and intended for simulation of multidimensional tasks (network dynamics; compression of multidimensional data, pattern reco...
ERROR MODEL FOR FUZZY TEXT SEARCH IN THE TASK OF ONLINE SOCIAL NETWORKS MONITORING FOR PROVIDING INFORMATION-PSYCHOLOGICAL SECURITY OF A PERSON
Monitoring of online social networks with the aim of detecting threats to information-psychological security of a person is an urgent task. Threats mean suicide propaganda, propaganda of extremism and terrorism, drug pro...
COMPARISON OF VARIANTS OF MULTITHREADING REALIZATION OF METHOD OF BRANCHES AND BORDERS FOR MULTI-CORE SYSTEMS
Recently, the main way to improve the performance of computing devices has become an increase in the number of processing cores in the processors, wherefore systems with shared memory have become widespread. Therefore, t...
EVALUATION OF EXPERT JUDGEMENTS CONSISTENCY WHEN CONSTRUCTING A MEMBERSHIP FUNCTION OF FUZZY SET USING THE METHOD OF LEVEL SETS
The article deals with one of the expert methods for construction of a membership function of fuzzy set – method of level sets, developed by R. Yager. The feasibility of improving of this method, by adding a procedure fo...