Author
Listed:
- Volodymyr Rudnytskyi
(State Scientific Research Institute of Armament and Military Equipment Testing and Certification)
- Nataliia Lada
(State Scientific Research Institute of Armament and Military Equipment Testing and Certification)
- Maksym Herashchenko
(State Scientific Research Institute of Armament and Military Equipment Testing and Certification)
- Tymofii Korotkyi
(Cherkasy State Technological University)
- Tetiana Stabetska
(Bohdan Khmelnytsky National University of Cherkasy)
Abstract
The object of the research is relationships in non-commutative two-operand two-bit CET-operations of a double cycle when operands are permuted. The article is devoted to studying the results of the computational experiment, which is in building a model of relationships in non-commutative two-operand two-bit CET-operations of a double cycle with the operands permutation in order to ensure the possibility of building cryptographic systems with XOR sequence encryption. The theoretical and practical results of the work are obtained on the basis of the computational experiment data. The results of researching the CET-operations data make it possible to build cryptographic systems with XOR sequence ciphering and to improve the quality of low-resource stream encryption systems. The mathematical description of the computational experiment results made it possible to establish relationships between pairs of non-commutative two-operand two-bit CET-operations of a double cycle when operands are permuted. The possibility of constructing a group of commutative two-operand two-bit CET-operations of a double cycle based on the modification of a known two-operand operation by one-operand operations to within the permutation of the crypto-transformation results has been studied. The correctness of constructing a group of CET-operations, both without operand permutation and such that allow operand permutation, has been verified. The model for building a group of asymmetric two-operand two-bit CET-operations of a double cycle, which allow the operands permutation is proposed. Applying the substitution model made it possible to obtain pairs of interrelated operations in this group. The obtained pairs of interconnected operations provide a description of modification for direct and inverse non-commutative CET operations when permuting the operands. The obtained results provide the possibility of building cryptographic systems that encrypt both the input open information under the control of the XOR sequence and the XOR sequence under the control of the input open information. Further research will be aimed at establishing relationships in non-commutative two-operand two-bit CET operations of the triple cycle when operands are permuted.
Suggested Citation
Volodymyr Rudnytskyi & Nataliia Lada & Maksym Herashchenko & Tymofii Korotkyi & Tetiana Stabetska, 2024.
"Modeling relationships in non-commutative two-operand two-bit cet-operations of a double cycle when permuting the operands,"
Technology audit and production reserves, PC TECHNOLOGY CENTER, vol. 3(2(77)), pages 30-35, June.
Handle:
RePEc:baq:taprar:v:3:y:2024:i:2:p:30-35
DOI: 10.15587/2706-5448.2024.306980
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:baq:taprar:v:3:y:2024:i:2:p:30-35. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Iryna Prudius (email available below). General contact details of provider: https://journals.uran.ua/tarp/issue/archive .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.