The Model of Encryption Algorithm Based on Non-Positional Polynomial

The Model of Encryption Algorithm Based on Non-Positional Polynomial

Open Eng. 2018; 8:140–146 Research Article Open Access N.Kapalova* and A. Haumen The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network https://doi.org/10.1515/eng-2018-0013 ined with respect to their reliability or rather their strength Received June 30, 2017; accepted January 3, 2018 against cryptanalysis. This paper presents the results of work on modica- Abstract: This paper addresses to structures and prop- tion of the encryption algorithm aimed at improving the erties of the cryptographic information protection algo- cryptostrength of the algorithm. The properties of a model rithm model based on NPNs and constructed on an SP- developed on an SP-network basis are studied. network. The main task of the research is to increase the An SP-network (Substitution-Permutation network) is cryptostrength of the algorithm. In the paper, the transfor- a block cipher variation put forward by Horst Feistel in 1971 mation resulting in the improvement of the cryptographic [5]. A cipher developed on an SP-network consists of an S- strength of the algorithm is described in detail. The pro- box and a P-box. posed model is based on an SP-network. The reasons for An S-box (substitution box) substitutes a block of in- using the SP-network in this model are the conversion put bits with another block of output bits. This substitu- properties used in these networks. In the encryption pro- tion should be one-to-one to ensure its invertibility. Since cess, transformations based on S-boxes and P-boxes are an S-box implements a nonlinear conversion, this enables used. It is known that these transformations can withstand the cipher to withstand the linear cryptanalysis. cryptanalysis. In addition, in the proposed model, trans- A P-box (permutation box) is a permutation of all the formations that satisfy the requirements of the "avalanche bits of a block. eect" are used. As a result of this work, a computer program that implements an encryption algorithm model based on the SP-network has been developed. 2 Encryption algorithm based on Keywords: cryptography, encryption algorithms, SP- network, non-positional polynomial notations, avalanche non-positional polynomial eect. notations and constructed on an SP-network 1 Introduction While developing the encryption algorithm, we used an encryption method based on NPNs, transformations In the Institute of the Information and Computational of substitution (S), permutation (P), and so-termed LT- Technologies, under the authority of R.G. Biyashev there conversion. All the four transformations are described be- were developed nonconventional algorithms for encryp- low. A software implementation model of the algorithm tion (including a symmetric block data encryption al- was developed. A ow diagram of the model is shown in gorithm), digital signature, and cryptographic key ex- Figure 1. change on the basis of non-positional polynomial nota- Before encryption, any input data are split into 16-byte tions (NPNs) with the benet of properties of algebraic ore 128-bit blocks. The last block is completed up to the methods [1–4]. Besides, the developed methods are exam- length of 16 bytes, when required, according to a rule spec- ied in advance (e.g. with zeroes). The encryption begins with the addition of the rst block of plaintext bits to the *Corresponding Author: N.Kapalova: Institute Information and respective key bits. Further transformations are as follows. Computational Technologies Almaty, Kazakhstan, E-mail: [email protected] A. Haumen: E-mail: [email protected] Open Access. © 2018 N.Kapalova and A. Haumen, published by De Gruyter. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 4.0 License. The model of encryption algorithm based on non-positional polynomial notations Ë 141 Figure 1: The scheme of the algorithm based on SP-network 2.1 Conversion S the basis of linear and dierential analyses [6]. Essentially, the latter traces the dierences between output bits (in the An S-box is used as a nonlinear bijective conversion (sub- ciphertext) as a function of dierences between input bits stitution table). The S-box is a one-dimensional array con- (in the plaintext) at dierent rounds of the base transfor- sisting of 256 elements. As a rule, S-boxes are included mation. The precondition to ensure that an encryption al- in the transformation function, and they are essential for gorithm is strong against the dierential analysis is the the encryption algorithm strength. It is important that any "avalanche eect" in the base transformation. changes in the input data of an S-box would change the The LT-conversion serves to comply with the require- output data in a random-looking way. The relationship be- ment of avalanche eect. tween an input and the respective output should not be The avalanche eect is an important cryptographic linear or easily approximated by linear functions (this very property for encryption, where a small change in the in- property is used in the linear cryptanalysis) [6, 7]. put plaintext bits or the key results in a drastic change in Transformation S substitutes each input byte by an- the output ciphertext bits. In other words, all output bits other byte through the S-box (Figure 2). depend on each input bit. It is known that such encryp- From the scheme of conversion S it is easily seen that tion algorithms as AES, RC4, Kuznyechik and others use encrypting two identical 16-byte blocks of a plaintext re- transformations that meet the requirements of "avalanche sults in two identical blocks of ciphertext. This is a weak- eect" to increase their cryptostrength [8–11]. ness hat can be used by a cryptanalyst. In order to elimi- Before conversion LT, the bytes of a block are placed nate the weakness, an LT-conversion was developed. in a 4x4 two-dimensional array, as is shown in Figure 3. At the rst step, the bytes of the rst row in the ar- ray are added to each other modulo 256. The new byte ob- 2.2 Conversion LT tained in such a way is stored in the place of the leftmost byte, while the rest bytes are rotated right shift of one po- Developing an encryption algorithm, presumes that the sition. algorithm must be analyzed with regard to its strength 3 against various types of cryptographic attacks. Among the X L(cij) = aijmod256, j = 0, 3. (1) most common standard methods now in use are attacks on i=0 142 Ë N.Kapalova and A. Haumen Figure 2: The scheme of conversion S Figure 3: The location of the bytes in LT conversions The procedure is performed four times for the row. As Examples that meet the requirements of the avalanche a result, we will get four new bytes in the rst row. We then eect are shown below. repeat the operation for each row in the array. At the next step, the operation above is implemented for the columns of the array. The obtained new bytes are 2.4 Description of a nonpositional placed here from up to down. After the LT-conversion, the encryption scheme bytes in the array will receive new values. As distinct from a classical residue number system, irre- ducible polynomials over GF(2) serve as bases in an NPN. 2.3 Conversion P First of all, an NPN is formed for an N-bit block of electronic message [12, 13]. For this purpose, we choose its For this transformation, the bytes in a block are considered working bases, i.e. irreducible polynomials as bits, which are permutated with a specially designed P- box (a permutation table). p1(x), p2(x), ..., pS(x) (2) As a result of the bit permutation, the bytes receive new values. After the conversion, the obtained bit se- over GF(2) of degrees m1, m2,..., mS respectively [2]. quences are sent to the encryption module. The module Polynomials (1) subject to their arrangement constitute a encrypts the block of bytes on the basis of NPNs. certain base system. All bases (1) are to be dierent includ- The model of encryption algorithm based on non-positional polynomial notations Ë 143 Figure 4: The scheme of conversion LT Figure 5: The scheme of conversion P Table 1: Examples of the avalanche eect Conversion aaaaaaaaaaaaaaaa aaaaaaaaaaaaaaab LT d1 25 4f e4 25 09 7b b4 4f 7b 91 9c e4 b4 9c 10 e1 2d 53 e8 2d 0d 7d b6 53 7d 92 9d e8 b6 9d 11 S+LT 8b d6 db 3c 55 af a7 ef 2b c8 9a 4c 32 57 dd a8 6b 46 93 f4 c5 67 83 cb e3 a4 88 3a ea 33 cb 96 S+P+LT c6 b0 14 2b 22 65 9c 66 b2 8e 48 81 40 f8 d3 e9 9a 20 cc 87 8c 9d f8 14 4e de 70 95 0e e0 07 83 ing the case when they have the same degree. The working In expression (2) remainders α1(x), α2(x), ..., αS(x) range of the NPN is specied by polynomial (modulus) are chosen so that the rst l1 bits of a message associate to binary coecients of remainder α1(x), the next l2 bits as- P x p x p x p x ( ) = 1( ) · 2( ) · ... · S( ) sociate to binary coecients of remainder α2(x), etc., and the last lS bits associate to binary coecients of αS(x). m PS m N of degree = i=1 i. Therefore, a message of -bit To encrypt a message, it is used a secret key of N bits, length could be interpreted as a sequence of remainders which is also interpreted as a sequence of remainders re- α x α x α x F x 1( ), 2( ), ..., S( ) of dividing a polynomial ( ) by sulting from dividing some other polynomial G(x) by the p x p x p x working bases 1( ) · 2( ) · ..

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us