Alternative forms of representation of Boolean functions in Cryptographic Information Security Facilities

نویسنده

  • Kushch Sergii
چکیده

The work offers a new approach to the formation of functions which are used in cryptography and cryptanalysis. It will use alternative forms of representation of Boolean functions, that is, those which are different from the classical form, which is formed in a Boolean basis AND-OR-NOT. An example of this is, in particular, the formation of cryptographic functions with the use of alternative forms of representation, namely Cognate-representation of Boolean functions. This form is, by definition, multivariant and allows you to choose the best variant from a plurality of possible and permissible forms. Moreover, criteria of admissibility can be also selected depending on the particular situation, since it is known that an improvement of one criterion usually leads to deterioration of others. The methods suggested in the project, exemplified by Cognate-form representations of Boolean functions, show that the use of alternative forms of representation of Boolean functions in forming of cryptographic functions, algorithms and devices can significantly improve their parameters and properties. And their use in cryptographic means of protection allow to optimize the process of logical design of cryptographic devices and improve the safety performance of information and communication systems. cryptographic functions, Cognate-forms of Boolean functions representations, alternative forms of representation of Boolean functions, Cognate implementation, cyber security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

Correlation Immunity and Resiliency of Boolean Functions from Haar Domain Perspective

The strength of any conventional cipher system relies on the underlying cryptographic Boolean functions employed in the system. The design of such systems requires that the employed Boolean functions meet specific security criteria. Two of such criteria are the correlation immunity and resiliency of a given Boolean function. To determine whether such criteria are met, a designer needs the help ...

متن کامل

Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...

متن کامل

Haar Spectrum based Construction of Resilient and Plateaued Boolean Functions

Stream cipher systems are considered desirable and secure if composed of Boolean functions (B.Fs) that are characterized by high resiliency. Resiliency is one of the main cryptographic security criteria for a given Boolean function. One of the classes of functions satisfying high resiliency with desirable cryptographic properties include the Plateaued functions whose design construction is of s...

متن کامل

On Boolean Functions with Generalized Cryptographic Properties

By considering a new metric, we generalize cryptographic properties of Boolean functions such as resiliency and propagation characteristics. These new definitions result in a better understanding of the properties of Boolean functions and provide a better insight in the space defined by this metric. This approach leads to the construction of “handmade” Boolean functions, i.e., functions for whi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1510.01083  شماره 

صفحات  -

تاریخ انتشار 2015