The national standard for block ciphering GOST 28147-89
is UMC in a broad sense is related to the bitwise addition
operation. Indeed, in this case with
and
,
( ; , ) ( , ) ( ; , )
f
d x d x
,
where
21
( , ) ( , )
,
,
,
is a round transformation, which is a generalized
Markov mapping (see e.g. [16, 17, 18, 19, 23]).
An upper estimate of the probability of integer differential
of round functions has been found. This result can be
implemented for analysis of crypto stability of block cipher
in relation to round crypto analysis. Note that our method
and bounds can be extended on stream ciphers [21].
[1] Susan K Langford and Martin E Hellman. “Differential-linear
cryptoanalisis”. In: Annual International Cryptology Conference.
Springer, Berlin, Heidelberg, 1994, pp. 17-25.
[2] Biham E., Shamir A. Differential cryptoanalysis of DES-like
cryptosystems. — 1990. — P. 7.
[3] Coppersmith, Don. The Data Encryption Standard (DES) and its
strength against attacks (англ.) // IBM Journal of Research and
Development (англ.)рус. : journal. — 1994. — May (vol. 38, no.
3). — P. 243. — doi:10.1147/rd.383.0243.
[4] V. Rudnitsky, R. Berdibayev, R. Breus, N. Lada, and M. Pustovit,
“Synthesis of reverse two-bit dual-operated strictly straight
cryptographic coding on the basis of another operation”, Advanced
Information Systems, vol. 3, no. 4, pp. 109–114, Dec. 2019.
[5] H.M. Heys, "Key Dependency of Differentials: Experiments in the
Differential Cryptanalysis of Block Ciphers Using Small S-boxes",
Cryptology ePrint Archive, Report 2020/1349, International
Association of Cryptologic Research, available at
https://eprint.iacr.org, 2020.
[6] H. Liao and H.M. Heys, "An Integrated Hardware Platform for
Four Different Lightweight Ciphers", Proceedings of IEEE
Canadian Conference on Electrical and Computer Engineering
(CCECE 2015), Halifax, Nova Scotia, May 2015. (Also presented
at NECEC 2014.)
[7] C. Wang and H.M. Heys, "Performance Characterization of AES
Datapath Architecture in 90-nm Standard Cell CMOS Technology",
Journal of Signal Processing Systems, Springer, vol. 75, no. 3, pp.
217-231, Jun. 2014.
[8] Debdeep Mukhopadhyay. “An improved fault based attack of the
advanced encryption standard”. In: International Conference on
Cryptography in Africa. Springer, Heidelberg, 2009, pp. 421-434.
[9] Michael Tunstall and Debdeep Mukhopadhyay. “Differential fault
analysis of the advanced encryption standard using a single fault”.
In: IFIP international workshop on information security and
practices. Springer, Berlin, Heidelberg, 2009, pp. 224-233.
[10] X. Zhang, H.M. Heys, and C. Li, "FPGA Implementation and
Energy Cost Analysis of Two Lightweight Involutional Block
Ciphers Targeted to Wireless Sensor Networks", Mobile Networks
and Applications (MONET) Journal, ACM/Springer, vol. 18, no. 2,
pp. 222-234, Apr. 2013.
[11] NIST FIPS Pub. “197: Advanced encryption standard (AES)”. In:
Federal information processing standards 197.441 (2001).
[12] Ruslan Skuratovskii. “An Application of Metacyclic and Miller-
Moreno p-Groups to Generalization of Diffie-Hellman Protocol”.
In: Proceedings of the Future Technologies Conference. Springer,
2020, pp. 869–876.
[13] Xuejia Lai and James L. Massey. “Markov Ciphers and Differential
Cryptanalysis”. In: Workshop on the Theory and Application of
Cryptographic Techniques. Springer, Berlin, Heidelberg, 1991, pp.
17-38.
[14] Xuejia Lai and James L Massey. “A Proposal for a New Block
Encryption Standard”. In: Workshop on the Theory and Application
of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1991,
pp. 389-404.
[15] Joan Daemen and Vincent Rijmen. “Statistics of correlation and
differentials in block ciphers”. In: IACR ePrint archive 212 (2005).
[16] Eli Biham and Adi Shamir. “Differential Fault Analysis of Secret
Key Cryptosystems”. In: Annual international crypτology
conference. Springer, Berlin, Heidelberg, 1997, pp. 513-525.
[17] Tomas A Berson. “Differential cryptanalysis mod 2^32 with
applications to MD5”. In: Advances in Cryptography -
EUROCRYPT ’92, Workshop on the Theory of Application of
Cryptographic Techniques. Lecture Notes in Computer Science
658, Springer, Berlin, Heidelberg, 1992, pp. 71-80.
[18] Andrey Bogdanov, Christina Boura, Vincent Rijmen, Meiqin
Wang, Long Wen and Jingyan Zhao. “Key difference invariant bias
in block ciphers”. In: International Conference on the Theory and
Application of Crytography and Information Security. Springer,
Berlin, Heidelberg, 2013, pp. 357-376.
[19] Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir
Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich and Siang
Meng Sim. “The SKINNY family of block ciphers and its low-
latency variant MANTIS”. In: Annual International Cryptography
Conference. Springer, Berlin, Heidelberg, 2016, pp. 123-153.
[20] Roberto Avanzi. “The QARMA block cipher family. Almost MDS
matrices over rings with zero divisors, nearly symmetric even-
mansour constructions with non-involutory central rounds, and
search heuristics for low-latency S-boxes”. In: IACR Transactions
on Symmetric Cryptology (2017), pp. 4-44.
[21] Available at www.springerlink.com: Eli Biham, Orr Dunkelman
Differential Cryptanalysis of Stream Ciphers. Paper 2007,
[22] Ruslan Skuratovskii, Yevgen Osadchyy and Volodymyr Osadchyy.
“The timer compression of data and information”. In: 2020 IEEE
Third Conference on Data Stream Mining and Processing (DSMP).
IEEE, 2020, p. 455-459.
[23] Ruslan Skuratovskii. “Employment of minimal generating sets and
structure of sylow 2-subgroups alternating groups in block ciphers”.
In: Advances in Computer Communication and Computational
Sciences. Springer, Singapore, 2019, pp. 351-364
[24] Ruslan Skuratovskii and Aled Williams. “Irreducible bases and
subgroups of a wreath product in applying to diffeomorphism
groups acting on the Möbius band”. In: Rendiconti del Circolo
Mathematico di Palermo Series 2 70.2 (2021), pp. 721-739.
[25] Ruslan Skuratovskii. “A method for fast timer coding of texts”. In:
Cybernetrics and Systems Analysis 49.1 (2013) pp. 133-138.
[26] Ruslan Skuratovskii, Volodymyr Osadchyy and Yevgen Osadchyy.
“The timer inremental compression of data and information”. In:
WSEAS Transactions on Mathematics 19 (2020), pp. 398-406.
[27] Anna V Iatsyshyn, Valeriia O Kovach, Yevhen O Romanenkoa and
Andrii V Iatsyshyn. "Cloud services application ways for
preparation of PhD". In: CEUR Workshop Proceedings (2019), pp.
197-216.
7. Conclusion
References
WSEAS TRANSACTIONS on CIRCUITS and SYSTEMS
DOI: 10.37394/23201.2023.22.2
Contribution of Individual Authors to the
Creation of a Scientific Article (Ghostwriting
Policy)
The authors equally contributed in the present
research, at all stages from the formulation of the
problem to the final findings and solution.
Sources of Funding for Research Presented in a
Scientific Article or Scientific Article Itself
No funding was received for conducting this study.
Conflict of Interest
The authors have no conflicts of interest to declare
that are relevant to the content of this article.
Creative Commons Attribution License 4.0
(Attribution 4.0 International, CC BY 4.0)
This article is published under the terms of the
Creative Commons Attribution License 4.0
https://creativecommons.org/licenses/by/4.0/deed.en
_US