STUDY OF THE CRYPTOGRAPHIC STRENGTH OF THE S-BOX OBTAINED ON THE BASIS OF EXPONENTIATION MODULO

Journal Title: Scientific Journal of Astana IT University - Year 2022, Vol 12, Issue 12

Abstract

This article presents one of the main transformations of symmetric block ciphers used to protect confidential information, a new method for obtaining a non-linear S block, and an analysis of the results obtained. The S-box obtained by this method can be used as a nonlinear transformation in block cipher algorithms to protect confidential data transmitted over an open channel. In most well-known works in the field of analysis and synthesis of modern block symmetric ciphers, S-box is used as a mathematical apparatus for cryptographic Boolean functions. In this case, each S-box is represented by a set of composite Boolean functions whose properties characterize the efficiency of the nonlinear substitution node. Substitution nodes for modern symmetric primitives, including key unfolding functions, are usually implemented as replacement tables. Considering that in most modern block symmetric ciphers for introducing round keys, the encryption algorithm uses a linear operation (bitwise addition modulo 2), S-blocks are the only elements responsible for the cryptographic stability of block encryption algorithms. The required number of rounds of block symmetric ciphers is selected taking into account the results of the cryptographic analysis performed, provided that the properties of S-boxes are specified. As the main criteria and performance indicators, the balance and nonlinearity of composite Boolean functions are used; strict avalanche criterion (SAC), propagation criterion; algebraic degree; the value of the autocorrelation function. In this article, a study was made of the nonlinearity and strict avalanche criterion (SAC) of the S-box used in the block symmetric encryption algorithm. The results of the study were compared with the S-boxes of modern cryptographic algorithms and showed good results.

Authors and Affiliations

Ardabek Khompysh, Nursulu Kapalova, Kunbolat Algazy, Kairat Sakan

Keywords

Related Articles

APPLICATION OF INFORMATION SYSTEMS AND TOOLS IN BIOINFORMATICS

The pace at which scientific data is produced and disseminated has never been as high as it is currently. Modern sequencing technologies make it possible to obtain the genome of a specific organism in a few days, and t...

DEEP LEARNING-BASED FACE MASK DETECTION USING YOLOV5 MODEL

Based on the background of rapid transmission of novel coronavirus and various pneumonia, wearing masks becomes the best solution to effectively reduce the probability of transmission. For a series of problems arising fr...

APPLICATION INFORMATION MODELING AND MACHINE LEARNING ALGORITHM FOR CLASSIFICATION OF WASTE USING SUPPORT VECTOR MACHINE

The ecological state of the world is deteriorating for the worse every year. One of the main problems is inadequate waste disposal and inadequate sorting by waste type, which has led to inadequate treatment of bulk was...

FUZZY INFERENCE SYSTEMS BASE ON POLYNOMIAL CONSEQUENTS OF FUZZY RULES

Various fuzzy inference systems that operate on the basis of polynomial consequents of fuzzy rules. As well as inference methods for such systems, in particular, Takagi-Sugeno fuzzy inference systems, their differences...

PROJECT MANAGEMENT FIGHTING AGAINST ENTROPY OF THE ORGANIZATION

This study examined the informational entropy of project-oriented organizations within the framework of the energy-entropy concept. The relationship between energy entropy and informational (structural) entropy of projec...

Download PDF file
  • EP ID EP713379
  • DOI 10.37943/12DZLQ4553
  • Views 72
  • Downloads 0

How To Cite

Ardabek Khompysh, Nursulu Kapalova, Kunbolat Algazy, Kairat Sakan (2022). STUDY OF THE CRYPTOGRAPHIC STRENGTH OF THE S-BOX OBTAINED ON THE BASIS OF EXPONENTIATION MODULO. Scientific Journal of Astana IT University, 12(12), -. https://europub.co.uk/articles/-A-713379