AVALANCHE CHARACTERISTICS OF CRYPTOGRAPHIC FUNCTIONS OF TERNARY LOGIC

Authors

  • A. V. Sokolov Odessa National Polytechnic University, Odessa, Ukraine
  • O. N. Zhdanov Reshetnev Siberian State University of Science and Technology, Krasnoyarsk, Russian Federation

DOI:

https://doi.org/10.15588/1607-3274-2019-4-17

Keywords:

Cryptography, differential properties, ternary logic, Boolean function.

Abstract

Context. The development and aplication of cryptographic algorithms based on many-valued logic functions makes it important
to research their cryptographic properties and develop effective criteria for the cryptographic quality of their components. The
development of efficient methods for the synthesis of high-quality cryptographic primitives based on the functions of many-valued
logic is also an important task. The object of this research is the process of improving the efficiency of cryptographic algorithms
based on many-valued logic functions.
Objective. The purpose of this paper is to generalize the error propagation criterion and the strict avalanche criterion for the case
of functions of three-valued logic.
Method. The emergence of cryptography based on many-valued logic functions led to the understanding that today’s dominant
cryptographic algorithms based on binary algebraic constructions are only a special case of more general trends. Numerous researches show that the use of cryptographic constructions based on many-valued logic functions leads to the creation of cryptoalgorithms that more fully implement the principles of diffusion and confusion. One of the most important cases of many-valued logic functions are 3-functions, which are also used in quantum cryptography. This article is another step towards developing cryptographic constructions based on many-valued logic functions.
Results. The definition of the propagation criterion was extended to the case of functions of three-valued logic. On the basis of
the propagation criterion for the functions of three-valued logic, the definition of a strict avalanche criterion was introduced, which
describes the stability of cryptographic constructions against differential cryptanalysis attacks. We experimentally determined the
number of 3-functions of length N=9, satisfying the strict avalanche criterion. A method based on three constructive rules is proposed, which allows to synthesize a complete set of 864 S-boxes of length N=9 satisfying strict avalanche criterion. This set of Sboxes is basic for the application of Kim’s construction, which allows to recurrently increase the length of the S-box to the required
value. The paper shows that using Kim’s construction to increase the length preserves the S-box satisfying to a strict avalanche criterion, while allowing to obtain S-boxes with satisfactory non-linearity value as well as small output and input vectors correlation.
Conclusions. The most important criterion of cryptographic quality, which shows the stability of the cryptographic algorithm to
attacks of differential cryptanalysis is the propagation criterion that was generalized to the case of 3-functions. The existence of 3-
functions of length N=9 satisfying the strict avalanche criterion is shown, and their full set is found. On the basis of the proposed
constructive method, a complete set of S-boxes of length N=9 that satisfy the strict avalanche criterion was synthesized. It is shown that the Kim scheme can be applied to recurrently increase the length of S-boxes based on many-valued logic functions. As an actual direction for the continuation of the research, the development of regular and constructive methods for th

Author Biographies

A. V. Sokolov, Odessa National Polytechnic University, Odessa

PhD, Senior Lecturer of the Department of Informatics and Control of Information Systems Protection

O. N. Zhdanov, Reshetnev Siberian State University of Science and Technology, Krasnoyarsk

PhD, Assistant Professor of the IT Security Department

References

Stankovic R. S., Astola J. T., Moraga C. Representation of Multiple-Valued Logic Functions, Morgan & Claypool Publishers,

Synthesis lectures on digital circuits and systems, 2012, 153 p.

Sokolov A. V., Zhdanov O. N. Prospects for the Application of Many-Valued Logic Functions in Cryptography.

Springer, Cham, International Conference on Theory and Applications of Fuzzy Systems and Soft Computing, 2018,

pp. 331–339.

Korchenko O., Vasiliu E., Gnatyuk S. Modern quantum technologies of information security, Aviation. Vilnius,

Technika, 2010, No. 14 (2), pp. 58–69.

Hnatiuk S., Zhmurko T., Kinzeriavyi V., Seilova N. Method for quality evaluation of trit pseudorandom sequence to

cryptographic applications, Information technology and security, 2015, Vol. 3, No. 2, pp. 108–116.

Vol E. D. Quantum theory as a relevant framework for the statement of probabilistic and many-valued logic, International

Journal of Theoretical Physics, 2013, 52(2), pp. 514–523.

Stakhov A. Brousentsov’s ternary principle, Bergman’s number system and ternary mirror-symmetrical arithmetic,

The Computer Journal, 2002, 45(2), pp. 221–236.

Shannon, C.E. A Mathematical Theory of Cryptography, Bell system technical journal, 1948, Vol. 27, No. 3, pp. 379–423

Zhdanov O.N. Sokolov A.V. Block symmetric cryptographic algorithm based on principles of variable block

length and many-valued logic, Far East Journal of Electronics and Communications, 2015, Vol. 16, No. 3, pp. 573–589.

El Fishawy N. F., Zaid O. M. A. Quality of encryption measurement of bitmap images with RC6, MRC6, and

Rijndael block cipher algorithms, IJ Network Security, 2007, 5(3), pp. 241–251.

Sokolov, A.V., Constructive method for the synthesis of nonlinear S-boxes satisfying the strict avalanche criterion /

A.V. Sokolov. – Radioelectronics and Communications Systems, 2013. – Vol. 56. – No.8. – P. 415–423.

Sokolov A. V. Regular synthesis method of a complete class of ternary bent-sequences and their nonlinear properties,

Journal of Telecommunication, Electronic and Computer Engineering, 2016, Vol. 8, No. 9, pp. 39–43.

Mazurkov M. I., Sokolov A. V., Barabanov N. A. Synthesis method for bent sequences in the Vilenkin-Chrestenson basis,

Radioelectronics and Communications Systems, 2016, Vol. 59, No. 11, pp. 510–517.

Zhdanov O. N., Sokolov A. V. Algorithm of construction of optimal according to criterion of zero correlation nonbinary

S-boxes, Problems of physics, mathematics and technics, 2015, No. 3(24), pp. 94–97.

Zhdanov O. N., Sokolov A. V. Extending Nyberg construction on Galois fields of odd characteristic / O.N. Zhdanov, //

Radioelectronics and Communications Systems, 2017, Vol. 60, No. 12, pp. 538–544.

Sokolov A. V., Krasota N. I. Very nonlinear permutations:synthesis method for S-boxes with maximal 4-nonlinearity,

Proceeding of ONAT named after A. S. Popov, 2017, No.1, pp. 145–154.

Webster A. F., Tavares S. E. On the design of S-boxes, Proc. of CRYPTO’85. Springer-Verlag, 1985, pp. 523–534.

Chandrasekharappa T.G.S., Prema K. V., Kumara Shama S - boxes generated using Affine transformation giving maximum

avalanche effect, Int. J. Comput. Sci. Eng., 2011, Vol. 3, No. 9, pp. 3185–3193.

Chandrasekharappa T. G. S., Prema K. V., Shama Kumara Possible S-boxes generated from Affine transformation

those satisfy Maximum Strict Avalanche Criteria, Proceedings of World Academy of Science, Engineering and Technology,

, Vol. 60, pp. 880–883.

Trakhtman A. M., Trakhtman V. A. Fundamentals of the theory of discrete signals on finite intervals. Moscow, Soviet

Radio, 1975, 208 p.

Kim K. Construction of DES-like S-boxes based on Boolean functions satisfying the SAC, Lect. Notes Comput. Sci.,

, pp. 59–72.

Kim K., Matsumoto T., Imai H. A recursive construction method of S-boxes satisfying the strict avalanche criterion,

Proc. of CRYPTO90. Springer-Verlag, 1990, pp. 565–574.

Downloads

Published

2019-11-25

How to Cite

Sokolov, A. V., & Zhdanov, O. N. (2019). AVALANCHE CHARACTERISTICS OF CRYPTOGRAPHIC FUNCTIONS OF TERNARY LOGIC. Radio Electronics, Computer Science, Control, (4), 177–185. https://doi.org/10.15588/1607-3274-2019-4-17

Issue

Section

Progressive information technologies