Home The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network
Article Open Access

The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network

  • N. Kapalova EMAIL logo and A. Haumen
Published/Copyright: May 31, 2018
Become an author with De Gruyter Brill

Abstract

This paper addresses to structures and properties of the cryptographic information protection algorithm model based on NPNs and constructed on an SP-network. The main task of the research is to increase the cryptostrength of the algorithm. In the paper, the transformation resulting in the improvement of the cryptographic strength of the algorithm is described in detail. The proposed model is based on an SP-network. The reasons for using the SP-network in this model are the conversion properties used in these networks. In the encryption process, transformations based on S-boxes and P-boxes are used. It is known that these transformations can withstand cryptanalysis. In addition, in the proposed model, transformations that satisfy the requirements of the “avalanche effect” are used. As a result of this work, a computer program that implements an encryption algorithm model based on the SP-network has been developed.

1 Introduction

In the Institute of the Information and Computational Technologies, under the authority of R.G. Biyashev there were developed nonconventional algorithms for encryption (including a symmetric block data encryption algorithm), digital signature, and cryptographic key exchange on the basis of non-positional polynomial notations (NPNs) with the benefit of properties of algebraic methods [1,2,3,4]. Besides, the developed methods are examined with respect to their reliability or rather their strength against cryptanalysis.

This paper presents the results of work on modification of the encryption algorithm aimed at improving the cryptostrength of the algorithm. The properties of a model developed on an SP-network basis are studied.

An SP-network (Substitution-Permutation network) is a block cipher variation put forward by Horst Feistel in 1971 [5]. A cipher developed on an SP-network consists of an S-box and a P-box.

An S-box (substitution box) substitutes a block of input bits with another block of output bits. This substitution should be one-to-one to ensure its invertibility. Since an S-box implements a nonlinear conversion, this enables the cipher to withstand the linear cryptanalysis.

A P-box (permutation box) is a permutation of all the bits of a block.

2 Encryption algorithm based on non-positional polynomial notations and constructed on an SP-network

While developing the encryption algorithm, we used an encryption method based on NPNs, transformations of substitution (S), permutation (P), and so-termed LT-conversion. All the four transformations are described below. A software implementation model of the algorithm was developed. A flow diagram of the model is shown in Figure 1.

Figure 1 The scheme of the algorithm based on SP-network
Figure 1

The scheme of the algorithm based on SP-network

Before encryption, any input data are split into 16-byte ore 128-bit blocks. The last block is completed up to the length of 16 bytes, when required, according to a rule specified in advance (e.g. with zeroes). The encryption begins with the addition of the first block of plaintext bits to the respective key bits. Further transformations are as follows.

2.1 Conversion S

An S-box is used as a nonlinear bijective conversion (substitution table). The S-box is a one-dimensional array consisting of 256 elements. As a rule, S-boxes are included in the transformation function, and they are essential for the encryption algorithm strength. It is important that any changes in the input data of an S-box would change the output data in a random-looking way. The relationship between an input and the respective output should not be linear or easily approximated by linear functions (this very property is used in the linear cryptanalysis) [6,7].

Transformation S substitutes each input byte by another byte through the S-box (Figure 2).

Figure 2 The scheme of conversion S
Figure 2

The scheme of conversion S

From the scheme of conversion S it is easily seen that encrypting two identical 16-byte blocks of a plaintext results in two identical blocks of ciphertext. This is a weakness hat can be used by a cryptanalyst. In order to eliminate the weakness, an LT-conversion was developed.

2.2 Conversion LT

Developing an encryption algorithm, presumes that the algorithm must be analyzed with regard to its strength against various types of cryptographic attacks. Among the most common standard methods now in use are attacks on the basis of linear and differential analyses [6]. Essentially, the latter traces the differences between output bits (in the ciphertext) as a function of differences between input bits (in the plaintext) at different rounds of the base transformation. The precondition to ensure that an encryption algorithm is strong against the differential analysis is the “avalanche effect” in the base transformation.

The LT-conversion serves to comply with the requirement of avalanche effect.

The avalanche effect is an important cryptographic property for encryption, where a small change in the input plaintext bits or the key results in a drastic change in the output ciphertext bits. In other words, all output bits depend on each input bit. It is known that such encryption algorithms as AES, RC4, Kuznyechik and others use transformations that meet the requirements of “avalanche effect” to increase their cryptostrength [8, 9, 10, 11].

Before conversion LT, the bytes of a block are placed in a 4x4 two-dimensional array, as is shown in Figure 3.

Figure 3 The location of the bytes in LT conversions
Figure 3

The location of the bytes in LT conversions

At the first step, the bytes of the first row in the array are added to each other modulo 256. The new byte obtained in such a way is stored in the place of the leftmost byte, while the rest bytes are rotated right shift of one position.

L(cij)=i=03aijmod256,j=0,3¯.(1)

The procedure is performed four times for the row. As a result, we will get four new bytes in the first row. We then repeat the operation for each row in the array.

Figure 4 The scheme of conversion LT
Figure 4

The scheme of conversion LT

At the next step, the operation above is implemented for the columns of the array. The obtained new bytes are placed here from up to down. After the LT-conversion, the bytes in the array will receive new values.

2.3 Conversion P

For this transformation, the bytes in a block are considered as bits, which are permutated with a specially designed P-box (a permutation table).

Figure 5 The scheme of conversion P
Figure 5

The scheme of conversion P

As a result of the bit permutation, the bytes receive new values. After the conversion, the obtained bit sequences are sent to the encryption module. The module encrypts the block of bytes on the basis of NPNs.

Examples that meet the requirements of the avalanche effect are shown below.

2.4 Description of a nonpositional encryption scheme

As distinct from a classical residue number system, irreducible polynomials over GF(2) serve as bases in an NPN.

First of all, an NPN is formed for an N-bit block of electronic message [12, 13]. For this purpose, we choose its working bases, i.e. irreducible polynomials

p1(x),p2(x),...,pS(x)(2)

over GF(2) of degrees m1, m2, …, mS respectively [2]. Polynomials (1) subject to their arrangement constitute a certain base system. All bases (1) are to be different including the case when they have the same degree. The working range of the NPN is specified by polynomial (modulus)

P(x)=p1(x)p2(x)pS(x)

Table 1

Examples of the avalanche effect

Conversionaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaab
LTd1 25 4f e4 25 09 7b b4 4f 7b 91 9c e4 b4 9c 10e1 2d 53 e8 2d 0d 7d b6 53 7d 92 9d e8 b6 9d 11
S+LT8b d6 db 3c 55 af a7 ef 2b c8 9a 4c 32 57 dd a86b 46 93 f4 c5 67 83 cb e3 a4 88 3a ea 33 cb 96
S+P+LTc6 b0 14 2b 22 65 9c 66 b2 8e 48 81 40 f8 d3 e99a 20 cc 87 8c 9d f8 14 4e de 70 95 0e e0 07 83

of degree m=i=1Smi. Therefore, a message of N-bit length could be interpreted as a sequence of remainders α1(x), α2(x), …, αS(x) of dividing a polynomial F(x) by working bases p1(x) ⋅ p2(x) ⋅ … ⋅ pS(x):

F(x)=(α1(x),α2(x),,αS(x)),(3)

where F(x) ≡ αi(x)(modpi(x)), i = 1, S.

In expression (2) remainders α1(x), α2(x), …, αS(x) are chosen so that the first l1 bits of a message associate to binary coefficients of remainder α1(x), the next l2 bits associate to binary coefficients of remainder α2(x), etc., and the last lS bits associate to binary coefficients of αS(x).

To encrypt a message, it is used a secret key of N bits, which is also interpreted as a sequence of remainders resulting from dividing some other polynomial G(x) by the same working bases of the system:

G(x)=(β1(x),β2(x),,βS(x)),(4)

where G(x) ≡ βi(x)(mod pi(x)), i = 1, S.

Hence, some function H(F(x), G(x)) is considered as a cryptogram:

H(x)=(ω1(x),ω2(x),,ωS(x)),(5)

where H(x) ≡ ωi(x)(mod pi(x)), i = 1, S.

In NPNs, a cryptogram is the result of multiplying polynomial F(x) by G(x). The members of residue sequence ω1(x), ω2(x), …, ωS(x) are the least remainders on dividing products αi(x) βi(x) by respective bases pi(x):

αi(x)βi(x)ωi(x)(modpi(x)),i=1,S¯.(6)

The binary form of cryptogram H(x) is as follows. The binary coefficients of residue ω1(x) associate to first consecutive l1 bits of H(x). The binary coefficients of residue ω2(x) associate to further consecutive l2 bits of H(x), etc. The binary coefficients of the last residue ωS(x) associate the last consecutive lS binary bits of the cryptogram.

When decrypting cryptogram H(x) with a known key G(x), for each βi(x) it is calculated, as follows from (5), a reciprocal (inverse) polynomial βi1(x) under the following condition:

βi(x)βi1(x)1(modpi(x)),i=1,S¯.(7)

The result is polynomial

G1(x)=(β11(x),β21(x),..,βS1(x))

inverse to polynomial G(x). The original message then could be calculated according to (5) and (6) through remainders of the following congruence:

αi(x)βi1(x)ωi(x)(modpi(x)),i=1,S¯.(8)

3 The encryption algorithm analysis

Computer-based experiments to test statistical properties of the algorithm ciphertext have been conducted. The developed software package implementing a quality assessment system based on graphical and assessment tests was used to test the output ciphertexts. The results of the statistical analysis of the ciphertexts are detailed in [14].

The results for each test are represented in the form of histogram per key and per the number of files under study are shown in Figure 6.

Figure 6 Test results
Figure 6

Test results

To evaluate if the developed algorithm is secure, mathematical models of cryptanalysis involving algebraic, linear and differential methods have been designed.

The cryptanalysis is as follows. A system of nonlinear equations is obtained from a function transforming plaintext into ciphertext with a key. Next, a possibility of transition of the nonlinear system to a linear one is considered. The cryptanalysis of the algorithm under investigation was conducted for the cases with known: 1) ciphertext; 2) plaintext and the related ciphertext; 3) plaintext file format; and 4) ASCII-encoded plaintext [5, 6]. When performing the cryptanalysis, it is believed that an encryption scheme has been known in advance. The cryptanalyst needs to derive:

  1. Plaintext and a key from a ciphertext;

  2. Secret key from a plaintext-ciphertext pair.

To conduct algebraic and linear analyses of a nonpositional encryption algorithm, a set of equations is built subject to regularities of ring multiplication.

The results of the linear and differential analyses were compared against each other with respect to uniformity. Table 2 shows the results for the linear and differential cryptanalyses of S-boxes for certain known and developed algorithms.

Table 2

The interval of results of the linear and differential cryptanalyses

NameMinimumMaximumArithmetical mean minimumArithmetical mean maximumChi-squareDegree of freedom
DESLinear124815,546,25480944
Differential016016205141007
GOST 28147-89Linear2142,7513,75120224
Differential0806,25480239
GOST R 34.13-2015Linear100156--3264065024
Differential08--11129765279
AES-128Linear111145--3263965024
Differential05--6712565279
Encryption algorithm constructed on an SP-networkLinear92164--3264065024
Differential012--13077665279

The study results (Table 2) suggest as follows. To ensure the strength of S-box against the linear cryptanalysis, the elements of the table obtained during the linear cryptanalysis should take the values close to half the quantity of all possible combinations of input vectors in the binary notation. To ensure the strength of an S-box against the differential analysis, the elements of the table (difference matrix) obtained during the differential analysis should take the values close to 1.

The results of the encryption algorithm analysis are detailed in [14].

4 Conclusions

A software application to implement the encryption algorithm model has been developed, and the application is currently under testing. To study the statistical security of the proposed algorithm model, it has been developed a software package embedding statistical and assessment tests.

The work on improving and updating the software applications for the encryption algorithm based on nonpositional polynomial notations will continue. A computational model to keep and transfer key information for the algorithm is the next step of our studies.

It is further planned to use a round mode on the algorithm model, and develop a round key generation scheme.

Acknowledgement

Ongoing studies are funded by the Ministry of Education and Science of the Republic of Kazakhstan.

References

[1] I. Ya. Akushskii, D. I. Juditskii, “Machine Arithmetic in Residue Classes,” Moscow: Sov. Radio, 1968 (in Russian)Search in Google Scholar

[2] R. G. Biyashev, “Development and investigation of methods of the overall increase in reliability in data exchange systems of distributed ACSs,” Doctoral Dissertation in Technical Sciences, Moscow, 1985 (in Russian)Search in Google Scholar

[3] R. G. Bijashev, S. E. Nyssanbayeva Algorithm for Creation a Digital Signature with Error Detection and Correction, Cybernetics and Systems Analysis. – 2012, Vol. 48, No 4, 489-49710.1007/s10559-012-9428-5Search in Google Scholar

[4] R. Biyashev, S. Nyssanbayeva, N. Kapalova, The Key Exchange Algorithm on Basis of Modular Arithmetic, Proceedings of International Conference on Electrical, Control and Automation Engineering (ECAE2013), Hong Kong— Lancaster, U.S.A.:DEStech Publications, 2013, pp.16-21Search in Google Scholar

[5] W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd Edition, Transl. from English, M: Williams, 2001, 672 p.Search in Google Scholar

[6] L. K. Babenko, E. A. Ischukova, Modern Block Encryption Algorithms and Methods of their Analysis, Moscow, Helios, ARV, 2006, 376Search in Google Scholar

[7] B. Schneier, Applied Cryptography, 2nd ed.; Transl. from English — Triumf, 2002, 816Search in Google Scholar

[8] National Standard of the Russian Federation GOST R 34.13, http://www.tc26.ru/standard/gost/GOSTR34.13-2015.pdf, 2015, 21 p.Search in Google Scholar

[9] FIPS 46 3, Data Encryption Standard (DES). — USA, NIST, 1977Search in Google Scholar

[10] FIPS PUB 197. Advanced Encryption Standard (AES). – USA, NIST, 2002Search in Google Scholar

[11] Recommendation for Block Cipher Modes of Operation // NIST Special Publication 800-38A. Technology Administration U.S. Department of Commerce. - 2001,10 p.Search in Google Scholar

[12] R. Biyashev, N. Kapalova, S. Nyssanbayeva, A. Haumen, Construction and analysis of models of increasing reliability for modular encryption algorithm // Proceedings of the 10th International Conference on Computer Engineering and Applications (CEA ’16). – Barcelona, Spain, 2016. –pp. 161-165Search in Google Scholar

[13] R. Biyashev, S. Nyssanbayeva, N. Kapalova, A. Haumen, Modified symmetric block encryption-decryption algorithm based on modular arithmetic // Proceedings of the International Conference on Wireless Communications, Network Security and Signal Processing (WCNSSP2016). – Chiang Mai, Thailand,2016. – pp. 263-265.10.2991/amsee-16.2016.69Search in Google Scholar

[14] R.G Biyashev, S.E. Nyssanbayeva, N.A. Kapalova, et al., FRP R&D F.0678, Developmen and study of national encryption algorithm models based on modular arithmetic, State Registration No. 0115RK01304. 175 p.Search in Google Scholar

Received: 2017-06-30
Accepted: 2018-01-03
Published Online: 2018-05-31

© 2018 N.Kapalova and A. Haumen

This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.

Articles in the same Issue

  1. Regular Article
  2. Real-scale comparison between simple and composite raw sewage sampling
  3. 10.1515/eng-2018-0017
  4. The risks associated with falling parts of glazed facades in case of fire
  5. Implementation of high speed machining in thin-walled aircraft integral elements
  6. Evaluating structural crashworthiness and progressive failure of double hull tanker under accidental grounding: bottom raking case
  7. Influence of Silica (SiO2) Loading on the Thermal and Swelling Properties of Hydrogenated-Nitrile-Butadiene-Rubber/Silica (HNBR/Silica) Composites
  8. Statistical Variations and New Correlation Models to Predict the Mechanical Behavior and Ultimate Shear Strength of Gypsum Rock
  9. Analytic approximate solutions to the chemically reactive solute transfer problem with partial slip in the flow of a viscous fluid over an exponentially stretching sheet with suction/blowing
  10. Thermo-mechanical behavior simulation coupled with the hydrostatic-pressure-dependent grain-scale fission gas swelling calculation for a monolithic UMo fuel plate under heterogeneous neutron irradiation
  11. Optimal Auxiliary Functions Method for viscous flow due to a stretching surface with partial slip
  12. Vibrations Analysis of Rectangular Plates with Clamped Corners
  13. Evaluating Lean Performance of Indian Small and Medium Sized Enterprises in Automotive Sector
  14. FPGA–implementation of PID-controller by differential evolution optimization
  15. Thermal properties and morphology of polypropylene based on exfoliated graphite nanoplatelets/nanomagnesium oxide
  16. A computer-based renewable resource management system for a construction company
  17. Hygrothermal Aging of Amine Epoxy: Reversible Static and Fatigue Properties
  18. The selected roof covering technologies in the aspect of their life cycle costs
  19. Influence of insulated glass units thickness and weight reduction on their functional properties
  20. Structural analysis of conditions determining the selection of construction technology for structures in the centres of urban agglomerations
  21. Selection of the optimal solution of acoustic screens in a graphical interpretation of biplot and radar charts method
  22. Subsidy Risk Related to Construction Projects: Seeking Causes
  23. Multidimensional sensitivity study of the fuzzy risk assessment module in the life cycle of building objects
  24. Planning repetitive construction projects considering technological constraints
  25. Identification of risk investment using the risk matrix on railway facilities
  26. Comparison of energy parameters of a centrifugal pump with a multi-piped impeller in cooperation either with an annular channel and a spiral channel
  27. Influence of the contractor’s payment method on the economic effectiveness of the construction project from the contractor’s point of view
  28. Special Issue Automation in Finland
  29. Diagnostics and Identification of Injection Duration of Common Rail Diesel Injectors
  30. An advanced teaching scheme for integrating problem-based learning in control education
  31. A survey of telerobotic surface finishing
  32. Wireless Light-Weight IEC 61850 Based Loss of Mains Protection for Smart Grid
  33. Smart Adaptive Big Data Analysis with Advanced Deep Learning
  34. Topical Issue Desktop Grids for High Performance Computing
  35. A Bitslice Implementation of Anderson’s Attack on A5/1
  36. Efficient Redundancy Techniques in Cloud and Desktop Grid Systems using MAP/G/c-type Queues
  37. Templet Web: the use of volunteer computing approach in PaaS-style cloud
  38. Using virtualization to protect the proprietary material science applications in volunteer computing
  39. Parallel Processing of Images in Mobile Devices using BOINC
  40. “XANSONS for COD”: a new small BOINC project in crystallography
  41. Special Issue on Sustainable Energy, Engineering, Materials and Environment
  42. An experimental study on premixed CNG/H2/CO2 mixture flames
  43. Tidal current energy potential of Nalón river estuary assessment using a high precision flow model
  44. Special Spring Issue 2017
  45. Context Analysis of Customer Requests using a Hybrid Adaptive Neuro Fuzzy Inference System and Hidden Markov Models in the Natural Language Call Routing Problem
  46. Special Issue on Non-ferrous metals and minerals
  47. Study of strength properties of semi-finished products from economically alloyed high-strength aluminium-scandium alloys for application in automobile transport and shipbuilding
  48. Use of Humic Sorbent from Sapropel for Extraction of Palladium Ions from Chloride Solutions
  49. Topical Issue on Mathematical Modelling in Applied Sciences, II
  50. Numerical simulation of two-phase filtration in the near well bore zone
  51. Calculation of 3D Coordinates of a Point on the Basis of a Stereoscopic System
  52. The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network
  53. A computational algorithm and the method of determining the temperature field along the length of the rod of variable cross section
  54. ICEUBI2017 - International Congress on Engineering-A Vision for the Future
  55. Use of condensed water from air conditioning systems
  56. Development of a 4 stroke spark ignition opposed piston engine
  57. Development of a Coreless Permanent Magnet Synchronous Motor for a Battery Electric Shell Eco Marathon Prototype Vehicle
  58. Removal of Cr, Cu and Zn from liquid effluents using the fine component of granitic residual soils
  59. A fuzzy reasoning approach to assess innovation risk in ecosystems
  60. Special Issue SEALCONF 2018
  61. Brush seal with thermo-regulating bimetal elements
  62. The CFD simulation of the flow structure in the sewage pump
  63. The investigation of the cavitation processes in the radial labyrinth pump
  64. Testing of the gaskets at liquid nitrogen and ambient temperature
  65. Probabilistic Approach to Determination of Dynamic Characteristics of Automatic Balancing Device
  66. The design method of rubber-metallic expansion joint
  67. The Specific Features of High-Velocity Magnetic Fluid Sealing Complexes
  68. Effect of contact pressure and sliding speed on the friction of polyurethane elastomer (EPUR) during sliding on steel under water wetting conditions
  69. Special Issue on Advance Material
  70. Effect of thermo-mechanical parameters on the mechanical properties of Eurofer97 steel for nuclear applications
  71. Failure prediction of axi-symmetric cup in deep drawing and expansion processes
  72. Characterization of cement composites based on recycled cellulosic waste paper fibres
  73. Innovative Soft Magnetic Composite Materials: Evaluation of magnetic and mechanical properties
  74. Statistical modelling of recrystallization and grain growth phenomena in stainless steels: effect of initial grain size distribution
  75. Annealing effect on microstructure and mechanical properties of Cu-Al alloy subjected to Cryo-ECAP
  76. Influence of heat treatment on corrosion resistance of Mg-Al-Zn alloy processed by severe plastic deformation
  77. The mechanical properties of OFHC copper and CuCrZr alloys after asymmetric rolling at ambient and cryogenic temperatures
Downloaded on 18.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/eng-2018-0013/html
Scroll to top button