ALGEBRAIC IMMUNITY OF SYMMETRIC CIPHERS
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2017, Vol 4, Issue 8
Abstract
A key component of modern symmetric ciphers are nonlinear blocks (non-linear substitutions, substitution tables, S-boxes) that perform functions of hiding statistical links of plaintext and ciphertext, mixing and disseminating data, and introducing nonlinearity into the encryption procedure to counter various crypto-analytical and statistical attacks. The effectiveness of a symmetric cipher, its resistance to the majority of known cryptographic attacks and the level of information technology security provided by it directly depend on the performance of nonlinear nodes (balance, nonlinearity, autocorrelation, correlation immunity etc.). In this paper various methods for calculating algebraic immunity are examined, their interrelation is studied, and the results of comparative studies of the algebraic immunity of nonlinear blocks of the most well-known modern symmetric ciphers are presented.
Authors and Affiliations
Alexandr Kuznetsov, Roman Serhiienko, Dmytro Prokopovych-Tkachenko, Yuri Tarasenko, Ivan Belozertsev
THE GOLDEN SECTION, FIBONACCI NUMBERS, MATHEMATICS OF HARMONY AND “GOLDEN” SCIENTIFIC REVOLUTION
The Publishing House “World Scientific” recently published two fundamental books: Alexey Stakhov “The Mathematics of Harmony” (2009) and Alexey Stakhov and Samuil Aranson “The “Golden” Non-Euclidean Geometry” (2016). In...
MATHEMATICAL MODEL FOR THE FINGERPRINT MINUTIAE DISTORTION
This paper involves the research of biometric fingerprint images, minutiae and the mathematical probabil-istic model of their distortion. The suggested model is based on heuristic analysis of the fingerprint scanning res...
Code-based schemes for digital signatures
This article is devoted to the features of construction and use of electronic digital signature schemes based on the use of error-correcting codes, namely the most common scheme, which is based on this approach, CFS and...
DESCRIPTION AND APPLICATIONS OF BINOMIAL NUMERAL SYSTEMS
We develop a new class of positional numeral systems, namely the binomial ones, which form a subclass of generalized positional numeral systems (GPNS). The binomial systems have wide range of applications in the infor-ma...
NTRU Prime IIT Ukraine encryption algorithm with consideration known attacks analysis
The paper deals with the modern cryptographic transformations of the asymmetric end-to-end encryption type, namely – NTRU-like cryptographic systems. A new cryptographic system NTRU Prime IIT Ukraine was created based on...