GENERATING A SEQUENCE OF ASYMMETRIC CET OPERATIONS WITH AN ACCURACY OF UP TO THE PERMUTATION OF THE SECOND OPERAND

Authors

DOI:

https://doi.org/10.32689/maup.it.2025.1.28

Keywords:

low-resource cryptography, CET encryption, modeling of CET operations, investigation of CET operations, asymmetric cryptographic transformations, stream encryption

Abstract

The article is devoted to the construction of asymmetric CET operations suitable for cryptographic information transformation, namely CET encryption. The use of CET operations in the construction of streaming ciphers guarantees bidirectional transmission of information between subscribers. The specific feature of asymmetric CET operations is that they provide different ciphers in the process of encrypting the same information using the same key sequences. To improve stream ciphers, it is of great importance to be able to use several asymmetric two-operand CET operations with the same properties instead of one. That is why the problems of synthesizing groups of CET operations with permutation accuracy are extremely relevant. After all, their solution will allow us to build generators of pseudo-random sequences of CET operations with the same properties to ensure the construction of new generation of cryptographic algorithms of stream encryption. The purpose of the article is to study the possibility of using the method of generating groups of asymmetric CET operations with an accuracy of up to the permutation of the second operand to build low-resource asymmetric stream encryption systems. Methodology. The paper shows that it is expedient to generate groups of operations of strictly stable coding on the basis of modifying the CET operation of strictly stable coding with an accuracy of permutation of the second operand. To synthesize models of CET operations, both direct and reverse, one of the ways to implement their construction method is presented, which consists in generating a sequence of asymmetric two-operand CET operations with an accuracy of permutation of the second operand. The correctness of the obtained models for the synthesis of groups of direct and reverse asymmetric two-operand CET operations is verified on specific examples, which is confirmed by the results of a computational experiment for 2Ci-quantum asymmetric two-operand CET operations. In the course of the study, the methods and principles of information and coding theory, Boolean algebra, discrete mathematics, the theory of synthesis and modeling of operations, and cryptography were used. Scientific novelty. The scientific novelty of the work is to analyze the practical aspects of using groups of asymmetric CET operations with an accuracy of up to the permutation of the second operand to build low-resource cryptography algorithms by ensuring the generation of direct and reverse asymmetric two-operand CET operations by using only direct one-operand CET operations, which significantly reduces the complexity of the cryptographic algorithm and the complexity of the cryptographic system implementation. Conclusion. As a result of the study, the following was found: all asymmetric CET operations belonging to the synthesized group with an accuracy of up to the permutation of the second operand have the same cryptographic properties, since they implement the same sets of substitution tables in the same way by chance; the ability to generate groups of forward and reverse asymmetric CET operations with an accuracy of up to the permutation of the second operand on the basis of any two-operand CET operation will provide both encryption and decryption of information for building streaming encryption systems.

References

Бабенко В. Г., Лада Н. В. Синтез і аналіз операцій криптографічного додавання за модулем два. Системи обробки інформації. 2014. Вип. 2 (118). С. 116–118.

Бабенко В. Г., Лада Н. В. Технологія дослідження операцій за модулем два. Smart and Young: щомісячний наук. журн. 2016. № 11–12. Ч. 1. С. 49–54.

Бабенко В. Г., Лада Н. В. Аналіз результатів виконання модифікованих операцій додавання за модулем два з точністю до перестановки. The scientific potential of the present: рroceedings of the Internat. sci. conf., (St. Andrews, Scotland, UK, December, 1, 2016) / ed. N. P. Kazmyna. NGO «European Scientific Platform». Vinnytsia: PE Rogalska I. O., 2016. С. 108–111.

Лада Н. В., Бреус Р. В., Лада С. В. Генерація моделей прямих і обернених двохрозрядних двохоперандних операцій строгого стійкого криптографічного кодування. Science and Education a New Dimension Natural and Technical science. 2020. V. 224. P. 31–37.

Лада Н. В., Козловська С. Г., Рудницька Ю. В. Дослідження і синтез групи симетричних модифікованих операцій додавання за модулем чотири. Центральноукраїнський науковий вісник. Технічні науки. 2019. Вип. 2 (33). С. 181–189. https://doi.org/10.32515/2664-262X.2019.2(33).181-189.

Лада Н. В., Рудницький С. В., Зажома В. М., Рудницька Ю. В. Дослідження і синтез групи симетричних модифікованих операцій правостороннього додавання за модулем чотири. Системи управління, навігації та зв’язку. 2020. № 1 (59). С. 93–96. https://doi.org/10.26906/SUNZ.2020.1.093.

Рудницька Ю. В. Рудницький С. В. Моделювання симетричних операцій криптографічного кодування. Проблеми інформатизації: Десята міжнар. наук.-техн. конф.: тези доп., (24 – 25 листоп. 2022 р. Черкаси), 2022. Т. 2. С. 10.

Рудницький В. М., Лада Н. В., Кучук Г. А., Підласий Д. А. Архітектура CET-операцій і технології потокового шифрування. Architecture of CET-operations and stream encryption technologies: монографія. Черкаси: видавець Пономаренко Р.В., 2024. 374 с. ISBN 978-966-2554-81-6 URL: https://dndivsovt.com/index.php/monograph/issue/view/22/22

Borky J. M., Bradley T. H. Protecting Information with Cybersecurity. In: Effective Model-Based Systems Engineering. Springer, Cham. 2019, pp. 345–404. https://doi.org/10.1007/978-3-319-95669-5_10

Dandin T.J.E., Krishnaveni D., Chandrasekhar K. Light Weight Cryptography and Its Application in Resource Constrained Environment Using Reversible Logic. In: Gunjan, V.K., Zurada, J.M. (eds) Proceedings of the 2nd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications. Lecture Notes in Networks and Systems. Springer, Singapore, 2022. Vol. 237, pp. 473–489. https://doi.org/10.1007/978-981-16-6407-6_43

Eldem T. Global Cyberspace Security and Critical Information Infrastructure Protection. In: Farazmand, A. (eds) Global Encyclopedia of Public Administration, Public Policy, and Governance. Springer, Cham. 2021, pp. 1–11. https://doi.org/10.1007/978-3-319-31816-5_3987-1

Keshattiwar P., Lokulwar P., Saraf P. Empowering Data Defender’s Comprehensive Security Measures for Robust Information Protection in Robust-Cloud Environments. 2024 International Conference on Innovations and Challenges in Emerging Technologies (ICICET), Nagpur, India, 2024, pp. 1–6. https://doi.org/10.1109/ICICET59348.2024.10616293

Massey J. L. An introduction to contemporary cryptology. In Proceedings of the IEEE, 1988. Vol. 76, no. 5, pp. 533–549. URL: https://scispace.com/pdf/an-introduction-to-contemporary-cryptology-60eevadgo7.pdf

Nadji B. Data Security, Integrity, and Protection. In: McClellan, S. (eds) Data, Security, and Trust in Smart Cities. Signals and Communication Technology. Springer, Cham. 2024, pp. 59–83. https://doi.org/10.1007/978-3-031-61117-9_4

Pandey S., Bhushan B. Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks. Wireless Netw, 2024. Vol. 30, pp. 2987–3026. https://doi.org/10.1007/s11276-024-03714-4

Preyaa Atri. Enhancing Big Data Security through Comprehensive Data Protection Measures: A Focus on Securing Data at Rest and In-Transit. International Journal of Computing and Engineering. 2024. 5(4), pp. 44–55. https://doi.org/10.47941/ijce.1920

Rudnytskyi V., Babenko V., Lada N., Tarasenko Ya., Rudnytska Yu. Constructing symmetric operations of cryptographic information encoding. CEUR Workshop Proceedings, 2022. Vol. 3187, pp. 182–194. URL: https://ceur-ws.org/Vol-3187/paper17.pdf

Rudnytskyi V., Lada N., Pochebut M., Melnyk O., Tarasenko Ya. Increasing the cryptographic strength of CET encryption by ensuring the transformation quality of the information block. 13th International Conference on Dependable Systems, Services and Technologies (DESSERT), October 13-15, 2023, Athens, Greece, 2023, pp. 1–6. https://doi.org/10.1109/DESSERT61349.2023.10416546.

Yasmin N., Gupta R. Modified lightweight cryptography scheme and its applications in IoT environment. Int. j. inf. tecnol. 2023, 15, pp. 4403–4414. https://doi.org/10.1007/s41870-023-01486-2

Zakaria A., Azni A., Ridzuan F., Zakaria N., Maslina H. Daud Systematic literature review: Trend analysis on the design of lightweight block cipher. IEEE Journal of King Saud University – Computer and Information Sciences, 2023. Vol. 35, Is. 5, 101550. https://doi.org/10.1016/j.jksuci.2023.04.003

Published

2025-05-28

How to Cite

РУДНИЦЬКИЙ, В., БАБЕНКО, В., РУДНИЦЬКИЙ, С., & КОРОТКИЙ, Т. (2025). GENERATING A SEQUENCE OF ASYMMETRIC CET OPERATIONS WITH AN ACCURACY OF UP TO THE PERMUTATION OF THE SECOND OPERAND. Information Technology and Society, (1 (16), 221-226. https://doi.org/10.32689/maup.it.2025.1.28