The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network

This paper addresses to structures and properties of the cryptographic information protection algorithm model based on NPNs and constructed on an SP-network. The main task of the research is to increase the cryptostrength of the algorithm. In the paper, the transformation resulting in the improvemen...

Full description

Bibliographic Details
Main Authors: Kapalova N., Haumen A.
Format: Article
Language:English
Published: De Gruyter 2018-05-01
Series:Open Engineering
Subjects:
Online Access:https://doi.org/10.1515/eng-2018-0013
id doaj-3c7b1135dd92480193371227fca908d2
record_format Article
spelling doaj-3c7b1135dd92480193371227fca908d22021-09-05T20:44:49ZengDe GruyterOpen Engineering2391-54392018-05-018114014610.1515/eng-2018-0013eng-2018-0013The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-networkKapalova N.0Haumen A.1Institute Information and Computational Technologies Almaty, Almaty, KazakhstanInstitute Information and Computational Technologies Almaty, Almaty, KazakhstanThis paper addresses to structures and properties of the cryptographic information protection algorithm model based on NPNs and constructed on an SP-network. The main task of the research is to increase the cryptostrength of the algorithm. In the paper, the transformation resulting in the improvement of the cryptographic strength of the algorithm is described in detail. The proposed model is based on an SP-network. The reasons for using the SP-network in this model are the conversion properties used in these networks. In the encryption process, transformations based on S-boxes and P-boxes are used. It is known that these transformations can withstand cryptanalysis. In addition, in the proposed model, transformations that satisfy the requirements of the “avalanche effect” are used. As a result of this work, a computer program that implements an encryption algorithm model based on the SP-network has been developed.https://doi.org/10.1515/eng-2018-0013cryptographyencryption algorithmssp-networknon-positional polynomial notationsavalanche effect
collection DOAJ
language English
format Article
sources DOAJ
author Kapalova N.
Haumen A.
spellingShingle Kapalova N.
Haumen A.
The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network
Open Engineering
cryptography
encryption algorithms
sp-network
non-positional polynomial notations
avalanche effect
author_facet Kapalova N.
Haumen A.
author_sort Kapalova N.
title The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network
title_short The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network
title_full The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network
title_fullStr The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network
title_full_unstemmed The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network
title_sort model of encryption algorithm based on non-positional polynomial notations and constructed on an sp-network
publisher De Gruyter
series Open Engineering
issn 2391-5439
publishDate 2018-05-01
description This paper addresses to structures and properties of the cryptographic information protection algorithm model based on NPNs and constructed on an SP-network. The main task of the research is to increase the cryptostrength of the algorithm. In the paper, the transformation resulting in the improvement of the cryptographic strength of the algorithm is described in detail. The proposed model is based on an SP-network. The reasons for using the SP-network in this model are the conversion properties used in these networks. In the encryption process, transformations based on S-boxes and P-boxes are used. It is known that these transformations can withstand cryptanalysis. In addition, in the proposed model, transformations that satisfy the requirements of the “avalanche effect” are used. As a result of this work, a computer program that implements an encryption algorithm model based on the SP-network has been developed.
topic cryptography
encryption algorithms
sp-network
non-positional polynomial notations
avalanche effect
url https://doi.org/10.1515/eng-2018-0013
work_keys_str_mv AT kapalovan themodelofencryptionalgorithmbasedonnonpositionalpolynomialnotationsandconstructedonanspnetwork
AT haumena themodelofencryptionalgorithmbasedonnonpositionalpolynomialnotationsandconstructedonanspnetwork
AT kapalovan modelofencryptionalgorithmbasedonnonpositionalpolynomialnotationsandconstructedonanspnetwork
AT haumena modelofencryptionalgorithmbasedonnonpositionalpolynomialnotationsandconstructedonanspnetwork
_version_ 1717785055490736128