Applied study on cryptographic functions for algorithms used in communications security protocols
Communications security is one of the most important fields to take into account when designing a system that manages information, especially when implementing such a system for the military, no matter which branch, Navy, Air Force, or Army. One important field when talking about information secu...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Naval Academy Press
2020-06-01
|
Series: | Scientific Bulletin of Naval Academy |
Online Access: | https://www.anmb.ro/buletinstiintific/buletine/2020_Issue1/04_FAR/43.pdf |
id |
doaj-59081a164a3842a9889c34a3160df1d5 |
---|---|
record_format |
Article |
spelling |
doaj-59081a164a3842a9889c34a3160df1d52020-11-25T02:53:54ZengNaval Academy PressScientific Bulletin of Naval Academy2392-89561454-864X2020-06-01XXIII124324710.21279/1454-864X-20-I1-033Applied study on cryptographic functions for algorithms used in communications security protocolsFlorin Medeleanu0Ministry of DefenseCommunications security is one of the most important fields to take into account when designing a system that manages information, especially when implementing such a system for the military, no matter which branch, Navy, Air Force, or Army. One important field when talking about information security, in general, is cryptology and within cryptology, linear and nonlinear Boolean functions and maps are essential important building blocks. They are used in the design of several blocks and stream ciphers. The study of cryptographic properties of these functions does not only help cryptanalysis but also plays an important role in the design of cryptographic algorithms that resist well against various cryptographic attacks. Linear and differential cryptanalysis of block ciphers is mainly based on determining and exploiting linear combinations of their components. The most useful mathematical tool for studying the linearity of Boolean functions is the Walsh (or Hadamard) transform. This can be regarded as a size-2 discrete Fourier transform. Another method for determining linear combinations of cipher components is that of finding and solving linear systems of equations. This article reflects the authors’ effort to shed some light on this field. https://www.anmb.ro/buletinstiintific/buletine/2020_Issue1/04_FAR/43.pdf |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Florin Medeleanu |
spellingShingle |
Florin Medeleanu Applied study on cryptographic functions for algorithms used in communications security protocols Scientific Bulletin of Naval Academy |
author_facet |
Florin Medeleanu |
author_sort |
Florin Medeleanu |
title |
Applied study on cryptographic functions for algorithms used in communications security protocols |
title_short |
Applied study on cryptographic functions for algorithms used in communications security protocols |
title_full |
Applied study on cryptographic functions for algorithms used in communications security protocols |
title_fullStr |
Applied study on cryptographic functions for algorithms used in communications security protocols |
title_full_unstemmed |
Applied study on cryptographic functions for algorithms used in communications security protocols |
title_sort |
applied study on cryptographic functions for algorithms used in communications security protocols |
publisher |
Naval Academy Press |
series |
Scientific Bulletin of Naval Academy |
issn |
2392-8956 1454-864X |
publishDate |
2020-06-01 |
description |
Communications security is one of the most important fields to take into account
when designing a system that manages information, especially when implementing such a
system for the military, no matter which branch, Navy, Air Force, or Army. One important
field when talking about information security, in general, is cryptology and within cryptology,
linear and nonlinear Boolean functions and maps are essential important building blocks. They
are used in the design of several blocks and stream ciphers. The study of cryptographic
properties of these functions does not only help cryptanalysis but also plays an important role
in the design of cryptographic algorithms that resist well against various cryptographic attacks.
Linear and differential cryptanalysis of block ciphers is mainly based on determining and
exploiting linear combinations of their components. The most useful mathematical tool for
studying the linearity of Boolean functions is the Walsh (or Hadamard) transform. This can be
regarded as a size-2 discrete Fourier transform. Another method for determining linear
combinations of cipher components is that of finding and solving linear systems of equations.
This article reflects the authors’ effort to shed some light on this field.
|
url |
https://www.anmb.ro/buletinstiintific/buletine/2020_Issue1/04_FAR/43.pdf |
work_keys_str_mv |
AT florinmedeleanu appliedstudyoncryptographicfunctionsforalgorithmsusedincommunicationssecurityprotocols |
_version_ |
1724723744845332480 |