Applied study on cryptographic functions for algorithms used in communications security protocols

Communications security is one of the most important fields to take into account when designing a system that manages information, especially when implementing such a system for the military, no matter which branch, Navy, Air Force, or Army. One important field when talking about information secu...

Full description

Bibliographic Details
Main Author: Florin Medeleanu
Format: Article
Language:English
Published: Naval Academy Press 2020-06-01
Series:Scientific Bulletin of Naval Academy
Online Access:https://www.anmb.ro/buletinstiintific/buletine/2020_Issue1/04_FAR/43.pdf
id doaj-59081a164a3842a9889c34a3160df1d5
record_format Article
spelling doaj-59081a164a3842a9889c34a3160df1d52020-11-25T02:53:54ZengNaval Academy PressScientific Bulletin of Naval Academy2392-89561454-864X2020-06-01XXIII124324710.21279/1454-864X-20-I1-033Applied study on cryptographic functions for algorithms used in communications security protocolsFlorin Medeleanu0Ministry of DefenseCommunications security is one of the most important fields to take into account when designing a system that manages information, especially when implementing such a system for the military, no matter which branch, Navy, Air Force, or Army. One important field when talking about information security, in general, is cryptology and within cryptology, linear and nonlinear Boolean functions and maps are essential important building blocks. They are used in the design of several blocks and stream ciphers. The study of cryptographic properties of these functions does not only help cryptanalysis but also plays an important role in the design of cryptographic algorithms that resist well against various cryptographic attacks. Linear and differential cryptanalysis of block ciphers is mainly based on determining and exploiting linear combinations of their components. The most useful mathematical tool for studying the linearity of Boolean functions is the Walsh (or Hadamard) transform. This can be regarded as a size-2 discrete Fourier transform. Another method for determining linear combinations of cipher components is that of finding and solving linear systems of equations. This article reflects the authors’ effort to shed some light on this field. https://www.anmb.ro/buletinstiintific/buletine/2020_Issue1/04_FAR/43.pdf
collection DOAJ
language English
format Article
sources DOAJ
author Florin Medeleanu
spellingShingle Florin Medeleanu
Applied study on cryptographic functions for algorithms used in communications security protocols
Scientific Bulletin of Naval Academy
author_facet Florin Medeleanu
author_sort Florin Medeleanu
title Applied study on cryptographic functions for algorithms used in communications security protocols
title_short Applied study on cryptographic functions for algorithms used in communications security protocols
title_full Applied study on cryptographic functions for algorithms used in communications security protocols
title_fullStr Applied study on cryptographic functions for algorithms used in communications security protocols
title_full_unstemmed Applied study on cryptographic functions for algorithms used in communications security protocols
title_sort applied study on cryptographic functions for algorithms used in communications security protocols
publisher Naval Academy Press
series Scientific Bulletin of Naval Academy
issn 2392-8956
1454-864X
publishDate 2020-06-01
description Communications security is one of the most important fields to take into account when designing a system that manages information, especially when implementing such a system for the military, no matter which branch, Navy, Air Force, or Army. One important field when talking about information security, in general, is cryptology and within cryptology, linear and nonlinear Boolean functions and maps are essential important building blocks. They are used in the design of several blocks and stream ciphers. The study of cryptographic properties of these functions does not only help cryptanalysis but also plays an important role in the design of cryptographic algorithms that resist well against various cryptographic attacks. Linear and differential cryptanalysis of block ciphers is mainly based on determining and exploiting linear combinations of their components. The most useful mathematical tool for studying the linearity of Boolean functions is the Walsh (or Hadamard) transform. This can be regarded as a size-2 discrete Fourier transform. Another method for determining linear combinations of cipher components is that of finding and solving linear systems of equations. This article reflects the authors’ effort to shed some light on this field.
url https://www.anmb.ro/buletinstiintific/buletine/2020_Issue1/04_FAR/43.pdf
work_keys_str_mv AT florinmedeleanu appliedstudyoncryptographicfunctionsforalgorithmsusedincommunicationssecurityprotocols
_version_ 1724723744845332480