The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network
This paper addresses to structures and properties of the cryptographic information protection algorithm model based on NPNs and constructed on an SP-network. The main task of the research is to increase the cryptostrength of the algorithm. In the paper, the transformation resulting in the improvemen...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2018-05-01
|
Series: | Open Engineering |
Subjects: | |
Online Access: | https://doi.org/10.1515/eng-2018-0013 |
id |
doaj-3c7b1135dd92480193371227fca908d2 |
---|---|
record_format |
Article |
spelling |
doaj-3c7b1135dd92480193371227fca908d22021-09-05T20:44:49ZengDe GruyterOpen Engineering2391-54392018-05-018114014610.1515/eng-2018-0013eng-2018-0013The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-networkKapalova N.0Haumen A.1Institute Information and Computational Technologies Almaty, Almaty, KazakhstanInstitute Information and Computational Technologies Almaty, Almaty, KazakhstanThis paper addresses to structures and properties of the cryptographic information protection algorithm model based on NPNs and constructed on an SP-network. The main task of the research is to increase the cryptostrength of the algorithm. In the paper, the transformation resulting in the improvement of the cryptographic strength of the algorithm is described in detail. The proposed model is based on an SP-network. The reasons for using the SP-network in this model are the conversion properties used in these networks. In the encryption process, transformations based on S-boxes and P-boxes are used. It is known that these transformations can withstand cryptanalysis. In addition, in the proposed model, transformations that satisfy the requirements of the “avalanche effect” are used. As a result of this work, a computer program that implements an encryption algorithm model based on the SP-network has been developed.https://doi.org/10.1515/eng-2018-0013cryptographyencryption algorithmssp-networknon-positional polynomial notationsavalanche effect |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Kapalova N. Haumen A. |
spellingShingle |
Kapalova N. Haumen A. The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network Open Engineering cryptography encryption algorithms sp-network non-positional polynomial notations avalanche effect |
author_facet |
Kapalova N. Haumen A. |
author_sort |
Kapalova N. |
title |
The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network |
title_short |
The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network |
title_full |
The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network |
title_fullStr |
The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network |
title_full_unstemmed |
The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network |
title_sort |
model of encryption algorithm based on non-positional polynomial notations and constructed on an sp-network |
publisher |
De Gruyter |
series |
Open Engineering |
issn |
2391-5439 |
publishDate |
2018-05-01 |
description |
This paper addresses to structures and properties of the cryptographic information protection algorithm model based on NPNs and constructed on an SP-network. The main task of the research is to increase the cryptostrength of the algorithm. In the paper, the transformation resulting in the improvement of the cryptographic strength of the algorithm is described in detail. The proposed model is based on an SP-network. The reasons for using the SP-network in this model are the conversion properties used in these networks. In the encryption process, transformations based on S-boxes and P-boxes are used. It is known that these transformations can withstand cryptanalysis. In addition, in the proposed model, transformations that satisfy the requirements of the “avalanche effect” are used. As a result of this work, a computer program that implements an encryption algorithm model based on the SP-network has been developed. |
topic |
cryptography encryption algorithms sp-network non-positional polynomial notations avalanche effect |
url |
https://doi.org/10.1515/eng-2018-0013 |
work_keys_str_mv |
AT kapalovan themodelofencryptionalgorithmbasedonnonpositionalpolynomialnotationsandconstructedonanspnetwork AT haumena themodelofencryptionalgorithmbasedonnonpositionalpolynomialnotationsandconstructedonanspnetwork AT kapalovan modelofencryptionalgorithmbasedonnonpositionalpolynomialnotationsandconstructedonanspnetwork AT haumena modelofencryptionalgorithmbasedonnonpositionalpolynomialnotationsandconstructedonanspnetwork |
_version_ |
1717785055490736128 |