PRACTICAL IMPLEMENTATION OF INFORMATION PROTECTION RESULTS BASED ON CET ENCRYPTION TECHNOLOGY
DOI:
https://doi.org/10.33405/2078-7480/2025/1/92/332053Keywords:
evaluation, CET-operation, pseudorandom sequence generator, statistical properties, synthesis, model, NIST STSAbstract
The article evaluates the statistical properties of the results of CET-encryption of information-driven permutation operations. The possibility of using CET-operations in stream encryption in sequential transformation of open information elements is investigated.
Based on the generalization of the obtained results, a method of cryptographic transformation based on information-driven CET-operations is developed.
The structure of an information protection system based on cryptographic transformation based on information-driven CET-operations is proposed and functional models of devices for their hardware implementation are developed.
Based on the implemented software implementation of the information protection method, the generated pseudorandom sequences are tested using the NIST STS test software package. Analysis of the test results made it possible to conclude that the proposed method of cryptographic transformation based on information-driven CET-operations is suitable for use in information resource protection systems.
Pseudorandom sequence generators are the most important elements of any protection system, the reliability of which is largely determined by the properties of the generators used. Qualitative pseudorandom sequences, which are inherently deterministic, have almost all the properties of implementations of truly random processes and successfully replace them, since random sequences are extremely difficult to form.
Discrete-casual models of elementary functions of information-driven permutations were constructed. The properties of these models were established, which allowed to simplify the method of their synthesis.
Only two-operand CET-operations of the basic group of operations, which were obtained according to the results of the experiment, were used. This limitation is due to the possibility of constructing a complete group of models of one-operand CET-operations of information-driven permutations from models of one-operand CET-operations of the basic group.
References
Rudnytskyi V., Lada N., Kuchuk G. & Pidlasyi D. Architecture of CET-operations and stream encryption technologies : monograph. Cherkasy : R. V. Ponomarenko 2024. 374 р. URL: https://surl.li/hfzghl (accessed: 14.10.2024).
Rudnytskyi V., Lada N., Pochebut M., Melnyk O. & Tarasenko Ya. Increasing the cryptographic strength of CETencryption by ensuring the transformation quality of the information block. 13th International Conference on Dependable Systems, Services and Technologies (DESSERT), Oct. 13‒15, 2023, Athens, Greece. P. 1‒6. DOI: https://doi.org/10.1109/DESSERT61349.2023.10416546.
Бабенко В., Мельник О., Мельник Р. Класифікація трирозрядних елементарних функцій для криптографічного перетворення інформації. Безпека інформації. 2013. Т. 19. № 1. С. 56–59. URL: https://surli.cc/duunzv (дата звернення: 14.10.2024).
Рудницький В. М., Ларін В. В., Мельник О. Г., Підласий Д. А. Дискретно-казуальне представлення моделей елементарних функцій і СЕТ-операцій. Системи управління, навігації та зв’язку. 2023. № 4. С. 96‒101. DOI: https://doi.org/10.28925/2663-4023.2024.23.616.
Рудницька Ю. В., Рудницький С. В. Моделювання симетричних операцій криптографічного кодування. Проблеми інформатизації : тези доп. 10-ї міжнар. наук.-техн. конф., Черкаси – Баку – Бельсько-Бяла – Харків, 24-25 листоп. 2022 р. Черкаси : ЧДТУ; Баку : ВА ЗС АР, Бельсько-Бяла : УТіГН, Харків : НТУ «ХПІ», 2022. Т. 2. С. 10.
Dhaou I. B., Skhiri H., Tenhunen H. Study and Implementation of a Secure Random Number Generator for DSRC Devices. In Proceedings of the 2017 9th IEEE-GCC Conference and Exhibition (GCCCE), Manama, Bahrain, 8–11 May 2017. Р. 1–9.
Nguyen-Duc A., Viet Do M., Quan L., Nguyen Khac K., Nguyen Quang A. On the adoption of static analysis for software security assessment. A case study of an open-source e-government project. Comput. Secur. 2021.
Choi J. Physical Layer Security for Channel-Aware Random Access with Opportunistic Jamming. IEEE Trans. Inf. Forensics Secur. 2017, 12. P. 2699 – 2711.
Tang J., Jiao L., Zeng K., Wen H., Qin K. Y. Physical Layer Secure MIMO Communications Against Eavesdroppers with Arbitrary Number of Antennas. IEEE Trans. Inf. Forensics Secur. 2021, 16. P. 466–481.
Gergely A. M., Crainicu B. A succinct survey on (Pseudo)-random number generators from a cryptographic perspective. In Proceedings of the 2017 5th International Symposium on Digital Forensic and Security (ISDFS), Tirgu Mures, Romania, 26–28 April 2017. Vol. 42. Р. 1–6.
Wang P., You F., He S. Design of Broadband Compressed Sampling Receiver Based on Concurrent Alternate Random Sequences. IEEE Access 2019, 7. P. 525–538.
Benedetti R., Andreano M. S., Piersimoni F. Sample selection when a multivariate set of size measures is available. Stat. Methods Appl. 2019, 28. P. 1–25.
Tuncer T., Avaroglu E. Random number generation with LFSR based stream cipher algorithms. In Proceedings of the 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 22–26 May 2017. Vol. 42. Р. 171–175.
Chithaluru P., Tanwar R. and Kumar S. Cyber-attacks and their impact on real life. Information security and optimization. 2020, Chapman and Hall/CRC. Р. 61‒77.
Khan A., Bryans J. and Sabaliauskaite G. Framework for Calculating Residual Cybersecurity Risk of Threats to Road Vehicles in Alignment with ISO/SAE 21434. Applied Cryptography and Network Security Workshops: ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20–23, 2022, Proceedings. 2022. Springer.
Taherdoost H. Understanding Cybersecurity Frameworks and Information Security Standards. A Review and Comprehensive Overview. Electronics, 2022. 11 (14). P. 2181.
Hijji M. and Alam G. Cybersecurity Awareness and Training (CAT) Framework for Remote Working Employees. Sensors, 2022. 22. P. 86.
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications / A. Rukhin, J. Soto, J. Nechvatal et al. URL : https://surl.lu/jsuhvq (accessed: 14.10.2024).
Hatzivasilis G., Fysarakis K., Papaefstathiou I., Manifavas Ch. A review of lightweight block ciphers. Cryptographic Engineering. 2018. Vol. 8 (2). P. 141–184. DOI: https://doi.org/10.1007/s13389-017-0160-y.
Шугуров О. С. Розвиток військових наземних роботизованих систем в контексті нових концепцій управління: перспективи України. Стратегічні пріоритети. 2007. № 4. С. 198‒205. URL: https://surl.li/pifinl (дата звернення: 14.10.2024).
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Honor and Law

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.