<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Information-Driven Permutation Operations for Cryptographic Transformation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vira Babenko</string-name>
          <email>v.babenko@chdtu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tetiana Myroniuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Artem Lavdanskyi</string-name>
          <email>a.lavdanskyi@chdtu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yaroslav Tarasenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleg Myroniuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Cherkasy State Technological University</institution>
          ,
          <addr-line>460 Shevchenko str. Cherkasy, 18006</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>137</fpage>
      <lpage>149</lpage>
      <abstract>
        <p>In the work, the authors proposed one of the techniques of using information-driven permutation operations for the implementation of cryptographic data transformation. An algorithm for implementing the proposed method of cryptographic data transformation based on the use of a basic group of information-driven permutation operations has been developed. The process of cryptographic transformation of three bytes of data based on the proposed algorithm is shown by a flowchart containing information-driven permutations, a Feistel network, shift and XOR operations, and addition modulo 2. The software implementation of the developed algorithm in the high-level object-oriented programming language Python is carried out. The obtained results of the work of the created software made it possible to conduct further research and carry out a qualitative assessment of the results of cryptographic data transformation according to the proposed method of using previously synthesized information-driven permutation operations. The effectiveness of this algorithm was evaluated based on statistical testing by the NIST STS package, as well as its suitability for implementing data encryption by hardware and software based on a comparison of test results with the results of using standard encryption algorithms DES, AES, Blowfish, Kalyna, Strumok, and Linear Feedback Shift Register.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Technique</kwd>
        <kwd>information-driven permutation operations</kwd>
        <kwd>basic operations</kwd>
        <kwd>algorithm</kwd>
        <kwd>cryptographic transformation</kwd>
        <kwd>key</kwd>
        <kwd>round</kwd>
        <kwd>statistical testing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The development of new and improvement of
common encryption methods that would be
simple in hardware and software
implementations, and at the same time provide a
sufficiently high level of cryptographic strength
by expanding the range of cryptographic
transformation operations used, obtained by
modifying the basic operations, is one of the
urgent tasks of information security. The search
and synthesis of modified operations for
cryptographic transformation will make it
possible to build algorithms using them with the
best cryptographic properties, which makes this
study relevant.</p>
      <p>Software cryptographic protection tools are
flexible, which gives them a special advantage
over hardware ones. Mobility and ease of use
explain their modern popularity and prevalence.
Therefore, among the ways to improve the
stability indicators of cryptographic algorithms,
there are several approaches to the construction
of software ciphers. The most promising for
software implementation are flexible ciphers
based on the use of several modifications of the
encryption algorithm, ciphers with
pseudoprobable key selection, and ciphers with
permutation of fixed procedures and
customization of transformation operations. In
addition, one of the well-known ways to increase
cryptographic strength is the multi-pass mode of
applying the encryption algorithm.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background Analysis</title>
      <p>In our day to be secure, modern information and
communication technology needs reliable
encryption. That is why a large number of modern
scientific publications are devoted to the
development of new and improvement of existing
common cryptographic algorithms. Such works
include scientific publications [1–3, 12–14, 22].</p>
      <p>In this paper [1] to improve the security
effectiveness of electronic information
resources, two encryption algorithms (Luna and
Neptun) have been developed based on fixed
lookup tables with extended bit depth and
dynamic key-dependent lookup tables.
Properties of random sequences formed using
the proposed algorithms’ encryption [1] were
explored in the environment of NIST STS
statistical tests.</p>
      <p>The paper [2] proposes a method that uses
substitution tables with increased capacity and
randomized linear and non-linear operations.
Based on this method, a new advanced block
cipher was proposed and its specifications were
given [2].</p>
      <p>In this work [3] the Linear Feedback Shift
Register (LFSR) is used to produce nonbinary
pseudo-random key sequences. The length of the
sequence has been enhanced by designing a
hybrid model using LFSR and Genetic Algorithm.
Achieving a length more than the maximum
length of LFSR is the primary intention of this
work.</p>
      <p>It should be noted that the main block and
stream symmetric encryption algorithms used in
Ukraine are the Kalyna and Strumok
cryptographic algorithms. For the cryptographic
transformation in the Kalyna standard [4–8], the
SPN structure was chosen as a high-level design
of the cipher based on analytical comparison, the
layer of nonlinear transformation of the cyclic
function was implemented based on S-blocks,
and for the implementation of the linear
scattering block, multiplication by MDV was
chosen matrix. This method of constructing a
crypto algorithm ensures compliance with
modern requirements for the level of
cryptographic stability and speed compared to
other international standards.</p>
      <p>In turn, it should be noted the high statistical
security of the stream symmetric encryption
algorithm Strumok [9–11], which revealed certain
properties of the random bit generator. The
results of experimental studies of the statistical
security and speed characteristics of stream
ciphers show that the Strumok algorithm is the
most balanced solution, it can provide the
properties of a random sequence generator and
give huge indicators in terms of encryption speed.
It has been practically proven that the encryption
speed of the Strumok algorithm on modern
computer systems can reach 10–15 Gbit/s.</p>
      <p>In works [9, 11] the results of experimental
studies of statistical properties of common and
modern cryptographic encryption algorithms
are given. In the article [11], experimental
studies of the cryptographic properties of the
Strumok stream cipher were carried out by the
NIST STS statistical testing methodology. In
articles [9–11], a comparative analysis of the
statistical security indicators of the
worldfamous and most widespread cryptographic
algorithms (Enocoro, HC-128, HC-256, Grain,
MICKEY 2, MUGI, Rabbit, Salsa20, SNOW 2.0,
Sosemanuk, Trivium, AES, Strumok, Kalyna, etc.),
which are standardized at the international or
national level, is carried out.</p>
      <p>The article [12] deals with an actual task for
increasing the reliability of information
protection systems by the creation and use of
new four-bit cryptographic transformations
with nonlinear Boolean functions that have the
property of strict avalanche criterion. In the
article [12], for the first time, there was
proposed a method for obtaining inverse
fourbit cryptographic transformations with the
strict avalanche criterion property for
balanced Boolean functions containing two
logical operations (inversion and addition
modulo two). This method [12] is a method of
selecting the already existing basic Boolean
functions from a predetermined set of
balanced basic Boolean functions for direct
and inverse cryptographic transformations,
whereas the existing methods of searching for
inverse cryptographic transformation are
methods for calculating each element of the
Boolean functions for the inverse cryptographic
transformation.</p>
      <p>The article [13] proposes a modification of the
algorithm for calculating the reciprocal of a
number presented in a finite ring, which makes it
possible to reduce the number of elementary
operations and thereby increase the
performance of encryption algorithms.</p>
      <p>However, the problem task of using a group of
information-driven permutation operations for
the implementation of cryptographic
transformation has not been given attention in
the development of security software. Thus, the
development of methods for applying this group
of operations for data encryption and decryption
and the algorithmization of these processes is
certainly an urgent task of research.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Formal Problem Statement</title>
      <p>The usage of controlled operations opens up
great opportunities for achieving the required
level of cryptographic protection. Considering
that the efficiency of using controlled
operations increases with the number of
potentially implemented modifications, since
in this case the sub-block of the data being
converted expands, the use of the permutation
operation becomes relevant, since it has a very
large number of modifications. Thus, the
development of cryptographic tools based on
controlled permutations is a promising
direction in modern cryptography [15].</p>
      <p>Therefore, the main objective of this work is
to improve the technique of using basic
information-driven permutation operations
through the use of a modified algorithm of
cryptographic information transformation that
allows using the full set of permutation
modifications.</p>
      <p>Purpose of the work. Develop a way to apply
a basic group of information-driven
permutation operations and propose an
algorithm for implementing cryptographic
data transformation based on the use of these
operations. Investigate and evaluate the
suitability of using the proposed algorithm for
encryption by software and hardware.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Materials and Methods</title>
      <p>Let us consider in more detail the synthesis of
cryptographic transformation operations
based on elementary information-driven
permutation functions.</p>
      <p>In [16] it was determined that the sets of
groups of 3-bit elementary cryptographic
transformation functions are functions
consisting of three elementary functions, the
formal model of which is similar to the
complexity of the addition modulo 2. This means
that these sets are simple and do not require
significant resources for implementation by
hardware. The results obtained are presented in
Table 1 [16].</p>
      <p>To obtain the elementary functions of the
cryptographic transformations given in Table 1,
the bit permutation method should be used, the
main task of which is to replace one bit of the
elementary function with two others.</p>
      <p>Based on the researched results, the obtained
elementary functions will be called elementary
functions of information-driven permutations.</p>
      <p>In the work [16], a model of elementary
functions for cryptographic transformation is
built, which has the following form:</p>
      <p>=  ̃  ̃ ∨  ̃̄  ̃ , (1)
where  is the value of the corresponding
digit of the output signal of the result of the
elementary functions of the cryptographic
transformation;  ̃ ,  ̃ ,  ̃ are the values of the
corresponding digits of the input signal.</p>
      <p>The following are the properties of the
defined model [16]:
1.  ,  ,  take the values 1, 2, 3, and  ≠  ≠  .
2.   can take a direct or inverse value.
3.   ,   can be both in direct and inverse
meaning and  ≠  .
To construct a method of synthesis of
information-driven elementary functions, we
will introduce the following definitions [16].</p>
      <p>Definition 1. The main element of the
elementary function of information-driven
permutations is the repeating element in the
right and left parts of the elementary function
in direct and inverse meanings.
cryptographic transformation operations, it is
necessary to calculate the number of basic
three-bit operations from the total number of
Definition 2. An additional element or an
cryptographic transformation operations.
elementary function</p>
      <p>of information-driven
permutations is an element that occurs once
either on the left or on the right side of the
For
further
research,
elementary
information-driven functions were divided into
direct and reverse elementary
informationelementary function.
driven functions [16].</p>
      <p>The method for synthesizing elementary
When
studying
certain
groups
information-driven permutation functions is
information-driven permutation operations, it
(1) to obtain elementary
informationwhere the value of the main element is x3.
as follows [16]:
1. Determine the indices of the main and
additional
functions
permutation.</p>
      <p>elements
of</p>
      <p>elementary
of</p>
      <p>information-driven
2. Determine direct and inverse values of
elements of elementary functions of
information-driven permutation.
3. Substitute certain values into expression
driven permutation functions.
4. Applying items
1–3</p>
      <p>on this set of
elementary indices for direct and inverse
values
of
elementary</p>
      <p>functions
information-driven
permutation,
of
we
obtain the complete set of elementary</p>
      <p>information-driven
functions
permutation.</p>
      <p>of</p>
      <p>Subsequently, the analysis of cryptographic
transformation operations [16] was carried
out
based
on
elementary
permutation
functions controlled by information obtained
based on the experiment.</p>
      <p>As a result of the computational experiment
[16], it was determined that the total number
of three-bit information-driven permutation
operations for cryptographic transformation
will
be
equal
to
the
product
of
the
multiplication of the number of operations in
each group, which is 764 information-driven
operations.</p>
      <p>When
researching
transformation operations, it was found that
the total number of these operations is formed
by
a
combination
of</p>
      <p>basic</p>
      <p>3 = 384, where N is the total number of
operations;</p>
      <p>Nb is the
number
of
basic
operations; Nn is the number of operations
based on the replacement of 1 or 2 elementary
group functions and</p>
      <p>Ni is the number of
inversion
transactions.</p>
      <p>Therefore,
to
determine the number of three-bit basic
of
be
was found that the base
group
can
considered
a
group
where
elementary
functions are located in the following way [16]:
the first elementary function of the operation
is the function f1, the value of the main element
of which is x1; the second elementary function
of the operation is the function f2, the main
element of which is x2; the third elementary
function of the operation is the function f3,</p>
      <p>Based on this, it can be concluded that the
main elements of the basic operation, which
can form the basic group of cryptographic
transformation operations, should be placed
diagonally [16].</p>
      <p>Thus, eight operations for two groups were
defined, which are the basic operations of
forward (Ff) and reverse (Fr) cryptographic
transformation. They</p>
      <p>are represented by
expressions (2)–(17) [16].
 58,29,78 = [ 1 ⋅  ̄2 ∨  2 ⋅  3] =
 ̄1 ⋅  2 ∨  1 ⋅  ̄3
models, we have determined the following
for the</p>
      <p>main elements of

 92,46,27 =  1 = 1,  2 = 0,  3 = 0. ⇒
⇒  83,116,78 =  1 = 1,  2 = 1,  3 = 0.</p>
      <p>53,71,27 =  1 = 0,  2 = 1,  3 = 0. ⇒
⇒  83,29,39 =  1 = 1,  2 = 0,  3 = 1.</p>
      <p>83,29,39 =  1 = 1,  2 = 0,  3 = 1. ⇒
⇒  53,71,27 =  1 = 0,  2 = 1,  3 = 0.</p>
      <p>58,29,78 =  1 = 0,  2 = 0,  3 = 0. ⇒
⇒  53,46,114 =  1 = 0,  2 = 0,  3 = 1.</p>
      <p>58,116,39 =  1 = 0,  2 = 1,  3 = 1. ⇒
⇒  92,71,114 =  1 = 1,  2 = 1,  3 = 1.</p>
      <p>53,46,114 =  1 = 0,  2 = 0,  3 = 1. ⇒
⇒  58,29,78 =  1 = 0,  2 = 0,  3 = 0.</p>
      <p>92,71,114 =  1 = 1,  2 = 1,  3 = 1. ⇒
⇒  58,116,39 =  1 = 0,  2 = 1,  3 = 1.</p>
      <p>83,116,78 =  1 = 1,  2 = 1,  3 = 0. ⇒
⇒  92,46,27 =  1 = 1,  2 = 0,  3 = 0.</p>
      <p>Having
examined
the
obtained
dependencies, we</p>
      <p>can conclude that the
diagonal values of the main elements of the
(13) included in the group under study form eight
variants of operations, that is, 23 variants.
Hence, it can be assumed that the basic group
of cryptographic transformation operations
can be formed only by those elementary
(14) in which the value of the main elements along
operations for cryptographic transformation,
the diagonal is equal to 23 options [16].</p>
      <p>The modified matrix discrete model of the
combination of the permutation matrix and the
complement matrix is described as [16]:
where xij are the elementary functions of the
cryptographic transformation of forward (Ff)
cryptographic transformation;  ,  ∈ {1,2,3}.</p>
      <p>From here, a generalized discrete model of
basic groups of encoding operations for
cryptographic transformation is obtained,
which is presented in the following form [16]:
  =
( 1 ≡ ( 11)) ⋅ ( 2 ≡ ( ̄11 ∨ ( 22 ⊕  33))) ∨
∨ ( 1 ≡ ( 11 ⊕ 1)) ⋅ ( 3 ≡ ( 11 ∨ ( 22 ⊕  33)))
=
( 2 ≡ ( 22)) ⋅ ( 1 ≡ ( ̄22 ∨ ( 11 ≡  33))) ∨
∨ ( 2 ≡ ( 22 ⊕ 1)) ⋅ ( 3 ≡ ( 22 ∨ ( 11 ≡  33)))
( 3 ≡ ( 33)) ⋅ ( 1 ≡ ( ̄33 ∨ ( 11 ⊕  22))) ∨
[∨ ( 3 ≡ ( 33 ⊕ 1)) ⋅ ( 2 ≡ ( 33 ∨ ( 11 ⊕  22)))]
(19)
where xij are the elementary functions of the
cryptographic transformation of reverse (Fr)
cryptographic transformation;  ,  ∈ {1,2,3}.</p>
      <p>Having studied the obtained models of
encoding and decoding functions, represented
by expressions (18) and (19), we can conclude
that the essence of the method of synthesis of
basic cryptographic transformation operations is
to change the values, which allows obtaining
eight basic cryptographic transformation
operations for encoding and decoding functions.</p>
      <p>Having determined the essence of the
method for synthesizing the basic operations
of cryptographic transformation, we can
conclude that the synthesis of cryptographic
transformation operations based on the
obtained discrete models is as follows [16]:
1. Synthesis of all basic operations of
cryptographic transformation.
2. For each received operation, it is
necessary to perform a permutation,
which will increase their number by six
times.
3. To increase the number of operations, it is
necessary to use inversion operations,
which will increase the number of
transformation operations by another
eight times.</p>
      <p>The result of the computational experiment is
384 cryptographic transformation operations
for three-digit elementary functions.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Experiments</title>
      <p>An algorithm for a 5-round data
transformation process, shown in Fig. 1, was
developed to experiment to implement the
proposed method of using the synthesized
basic group of information-driven permutation
operations to perform cryptographic data
transformation.</p>
      <p>This algorithm was implemented by us
programmatically for further research and
analysis of the results of its work. The
development of this software tool was carried
out using the high-level object-oriented
programming language Python.
The essence of this algorithm consists of the
following. The input data stream is divided into
3-byte blocks, on which the following
operations are performed: addition modulo 2,
cyclic shift, and permutations.</p>
      <p>The algorithm of the software, which was
developed by us for conducting an
experimental study, consists of several steps.</p>
      <p>Step 1. For each byte of the output message
sequence, we perform an XOR operation with
each byte of the key. The keys are the basic
operations determined as a result of the
computational experiment. A new key is used
for each group of three bytes.</p>
      <p>Step 2. The next step is to apply the cyclic
shift operation. At the same time, the message
from the previous step is split into bytes, each
of which is cyclically shifted by 4 bits.</p>
      <p>Step 3. After performing the cyclic shift
operation on the message obtained in step 2, a
permutation operation by key 2 is applied to
each 24 bits of information to perform dispersal
of the statistical structure of the message. 5 such
rounds of bit permutations in three bytes are
performed. The process of implementing the
permutation is shown in Fig. 2.
Step 4. At this step, the Feistel network was
applied, which is based on two main features of
cryptography [15, 24–27, 30]: substitution and
transposition. The sequence obtained in step 3
is split into blocks of 6 bytes. For each of the 6
bytes, the Feistel network is used, which
involves splitting the message into two equal
parts (three bytes each), where leftBlock is the
left part and rightBlock is the right part.</p>
      <p>An OR operation is performed for each byte of
the sequence contained in rightBlock with each
byte of the key. An XOR operation is performed
on the result obtained after conversion with each
byte contained in leftBlock according to the
Feistel network algorithm.</p>
      <p>For the value to be placed in leftBlock, the
bits are permuted according to step 3.</p>
      <p>The number of rounds of transformation
using the permutation and key for step 4 is 5
rounds.</p>
      <p>Step 5. Before data recording in the
resulting file, each 24-bit block (leftBlock,
rightBlock) is scrambled with a Linear
Feedback Shift Register word (a 24th-degree
polynomial) by performing the addition
modulo 2. The feedback polynomial is  24 +
 23 +  21 +  20. In our case, the taps (the bit
positions that affect the next state) are [20–
24]. The result is recorded byte by byte to a file.</p>
      <p>For the example shown in Fig. 2, we
estimate the probability Pcrack of cracking one
round of bit permutations for step 3 of the
cryptographic transformation using the
formula:
 crack =  ℎ ℎ              .</p>
      <p>The number of all different permutations of
n bits is  !. For three bytes, this number is  ! =
24! = 6.204484017× 10²³.</p>
      <p>For the given example in Fig. 2 probability
Pcrack of cracking one round of bit permutations
for step 3 of the cryptographic transformation is
8
 crack = 6,204484017 × 10²³ =</p>
      <p>= 1.289390057× 10−23.</p>
      <p>Therefore, the probability of cracking one
round of bit permutations Pcrack is quite low.</p>
      <p>Further research consisted of the
verification of the developed cryptographic
transformation algorithm. For this, we chose
the most common method of testing the
statistical properties of NIST STS.</p>
      <p>Binary sequence testing according to the
NIST STS method has the following order
[1821, 28, 29]:
1. It is assumed that the binary sequence
studied during testing  =
 0,  1, . . .   −1is random—the null
hypothesis is accepted  0.
2. Test statistics are calculated  ( ).
3. The value of a certain probability is
determined using the test statistics
function,  =  ( ( )),  ∈ [0,1].
4. The probability value P is compared with
the significance level  ∈ [0.001,0.01].
The null hypothesis is accepted in the
case of  ≥  , and in the opposite case, a
conclusion is made that the alternative
hypothesis is accepted.</p>
      <p>The built-in tests included in the NIST STS
package are shown in Table 2 [18, 20–21].</p>
      <p>Using 16 built-in tests included in the NIST
STS package [21], 189 probabilities P are
calculated. Therefore, the result of testing is
the construction of some vector of values of
calculated probabilities P = {P1, P2, ..., P189}.
These probabilities can be considered as
separate results of test calculations.
being tested, and q is the number of statistical
tests used to test each sequence [18–21]. The
elements of the</p>
      <p>matrix Pij ∈ [0, 1], where
 =̅(̅1̅̅,̅̅̅̅) and  =̅(̅1̅̅,̅̅̅) are the values of the
probability obtained as a result of testing the ith
sequence by the jth test.</p>
      <p>According
to
the
obtained
statistical
portrait, a part of the sequences that passed
each statistical test is determined. For this, the
level of significance is set  ∈ [0.001,0.01] and
the</p>
      <p>probability
established
level
values
of</p>
      <p>exceeding
significance 
the
are
calculated for each of the 
tests. That is,
determine the coefficient [18–20]:
  =
#{  ≥  | = 1,   }</p>
      <p>.</p>
      <p />
      <p>As a result, a vector of coefficients is formed,
the
elements
of
which
characterize
in
percentage the passage of the sequence of all
statistical tests.</p>
      <p>The
sequences
properties
formed</p>
      <p>of
using
pseudo-random
the
developed
software tool were studied in the environment
of statistical tests NIST STS. Statistical portraits
of software implementations of the method of
using
information-driven
permutation
operations and DES [17, 24], AES [26–27],
Blowfish [14, 29–30] algorithms, and linear
feedback shift register are shown in Figs. 3–7
respectively.
the technique of using information-driven
permutation operations
of scrambling with a LFSR word ( 24 +  23 +
 21 +  20 polynomial)
To design the test, the following parameters
were selected [28–29]:
1. The sequence length for testing: n = 106
bits.
2. Number of sequences that are tested:
m = 100.
3. number of tests q = 189.</p>
      <p>Thus, the tested sample size was
N = 106100 = 108 bits, and the number of tests
(q) for different lengths q = 189, thus, the
statistical portrait of the generator contains
18900 probability values Р.</p>
      <p>In the ideal case, with m = 100 and  = 0.01,
only one sequence out of a hundred can be
rejected during testing. The pass rate for each
test must be 99%. But this is too strict a rule.
Therefore, a rule based on the confidence
interval is applied. The lower limit is 0.96015.</p>
      <p>The structure and common basic
transformations of the Kalyna block cipher are
given in the papers [6–8]. A cipher mini-model
is developed by scaling common cipher
cryptographic transformations with the
preservation of their algebraic structure in
paper [7]. The developed mini-model [7] is
intended to study the general characteristics of
the cipher and was used for statistical testing
by the NIST STS package.</p>
      <p>The paper [8] is devoted to the study of
statistical properties of crypto-algorithms by
the Suite NIST STS and contains images of
statistical profiles of algorithms, in particular,
the Kalyna block cipher. We will use the
experimental data obtained in works [6–8]
regarding the study of the statistical properties
of the Kalyna block cipher by using the Suite
NIST STS for comparison with the results of the
research of other algorithms obtained by us.
Statistical portraits of the results of the Kalyna
cipher are shown in Figs. 8–9 (Kalyna
miniversion) [6–8].
According to the NIST STS testing
methodology, the Kalyna cipher and
miniversion of Kalyna cipher have the following
results: the number of passed statistical tests
according to the   ≥ 0.96 criterion is 187 and
186 respectively, and according to the   ≥
0.99 criterion, it is 132 and 135 respectively.</p>
      <p>Let’s enter the data obtained in [6–8]
regarding the statistical testing of the Kalyna
cipher into Table 3 for a comparative analysis.</p>
      <p>The work [9] presents the results of
experimental studies of statistical security and
speed characteristics of modern stream
ciphers, in particular the Strumok cipher. In
[11], a study of the statistical properties of
standardized stream encryption algorithms
was carried out and a detailed description and
analysis of the obtained test results was given.
The data obtained in the course of
experimental studies in works [9, 11] can be
used to conduct a comparative assessment of
the statistical properties of the modern
Strumok cipher and the software
implementation of the method of applying in
formation-driven permutation operations
developed by us. Statistical portraits of the
results of the Strumok cipher with a key length
of 256 and 512 bits are shown in Figs. 10–11
respectively [11]. According to the NIST STS
testing methodology, the Strumok cipher with
256- and 512-bit keys has the following
results: the number of passed statistical tests
according to the   ≥ 0.96 criterion is 186 and
187 respectively, and according to the   ≥
0.99 criterion, it is 130 and 133 respectively.</p>
      <p>Let’s enter the data obtained in the paper
[11] regarding the statistical testing of the
Strumok cipher into Table 3 for comparative
analysis.
Table 3 shows the results of testing the
sequences formed based on the applied
algorithms for comparison.</p>
      <p>As can be seen from the results, the
generator based on the algorithm developed by
us passed the comprehensive control over the
NIST STS methodology and has acceptable
results compared to other generators (Table 3).
Generator</p>
      <p>Thus, we can conclude that the developed
algorithm for implementing the proposed
technique of using information-driven
permutation operations is suitable for
cryptographic data transformation.</p>
      <p>The method of researching the efficiency of
implementation of cryptographic
transformation by a certain algorithm
presupposes the definition and analysis of
encryption speed as one of the main indicators
used when comparing cryptographic
algorithms. The main requirement for speed
measurement is the measurement of the
encryption speed indicator of the same volume
of open texts (in different modes) for all
possible combinations of block size and key
length under the same conditions within one
interactive process of the user of the operating
system. To ensure the same conditions for
measuring encryption speed and for further
qualitative assessment, it is necessary to
consider that the results of speed testing of
cryptographic algorithms are directly related to
the technical characteristics of the selected
hardware and software platform. In addition,
speed indicators and their ratio for different
ciphers can change significantly depending on
the compiler version. More often, speed
comparisons are performed for software
implementations of cryptographic algorithms.
Usually, specially developed optimized versions
of the software implementation of the
investigated cryptographic algorithms are used
to evaluate the encryption speed to obtain the
highest possible indicators.</p>
      <p>It should be noted that the work carried out
a software implementation of the developed
algorithm of one of the methods of
cryptographic data transformation based on the
use of a basic group of permutation operations
controlled by information containing only 25
basic synthesized groups to check the
possibility of using similar operations when
constructing cryptographic primitives. Since at
this stage of the study, the development of an
optimized software version of the
implementation of the proposed method for
applying information-driven permutation
operations for the implementation of
cryptographic data transformation was not
carried out, then, accordingly, there is no
possibility to evaluate the speed of the
developed algorithm for comparison with other
algorithms. Investigation of the implementation
of this method and the effectiveness of its use in
terms of encryption speed is planned to be
carried out in further studies.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>The paper proposes one of the techniques of
using information-driven permutation
operations for the implementation of
cryptographic data transformation. The study
of the implementation of this technique and
the effectiveness of its use was carried out only
on the example of 25 basic synthesized groups
of 3-bit permutation operations controlled by
information.</p>
      <p>In the course of the study, we developed an [1]
algorithm for the proposed method of
cryptographic data transformation based on
the use of a basic group of information-driven
permutation operations and implemented a
software implementation using the high-level [2]
object-oriented programming language
Python. Cryptographic transformation
according to the developed algorithm is
performed on 3 bytes of data using the
following operations: information-driven [3]
permutations, Feistel network, and shift and
addition modulo 2 operations.</p>
      <p>Among the features of the implementation
of the developed cryptographic data
transformation algorithm is the use of a basic [4]
group of information-driven permutation
operations, the multi-pass of the algorithm, in
particular, there must be at least 5
transformation rounds, and also ensuring that
the key value changes at each transformation
round. [5]</p>
      <p>The obtained results of the work of the
created software made it possible to conduct
further research and carry out a qualitative
assessment of the results of cryptographic data
transformation according to the proposed
method of using previously synthesized
information-driven permutation operations.</p>
      <p>The effectiveness of this algorithm was [6]
evaluated based on statistical testing by the
NIST STS package, as well as its suitability for
implementing data encryption by hardware
and software based on a comparison of test [7]
results with the results of using standard
encryption algorithms (DES, AES, Blowfish,
LFSR and modern Kalyna and Strumok
ciphers).</p>
      <p>Subsequent research should be directed to
the study of operations of permutations
controlled by information of greater capacity,
as well as the use of the full set of basic groups
of synthesized operations, which will provide
an increase in the number of transformation
operations and the possibility of processing
data blocks of greater length. In addition, it is
necessary to study and evaluate in more detail
such parameters of the cryptographic
transformation algorithm as cryptographic
strength, avalanche effect, and speed.
[8] V. Dolgov, A. Nastenko, Large Ciphers— Dependencies, J. Electrical Eng.</p>
      <p>
        Random Permutations. Verification of Electronics Control Comput. Sci. 5(15)
Statistical Properties Ciphers Submitted (2019) 1–6.
for Ukrainian Contecst with a Test Suite [19] R. Hegadi, A. Patil, A Statistical Analysis
NIST STS, Inf. Proces.Syst. 7 (2012) 2–16. on In-Built Pseudo Random Number
[9] O. Kuznetsov, et al., Comparative Studies Generators Using NIST Test Suite, 5th
of Stream Cryptographic Transfor- International Conference on Computing,
mation Algorithms, Radyotekhnyka 191 Communication and
        <xref ref-type="bibr" rid="ref2">Security (2020</xref>
        ).
(2017) 52–75. doi: 10.30837/rt.2017. doi: 10.1109/ICCCS49678.2020.9276849.
4.191.06. [20] R. Kochana, et al., Statistical Tests
[10] A. Oleksiichuk, S. Koniushok, Independence Verification Methods,
M. Poremskyi, Security Justification for Procedia Comput. Sci. 192 (2021) 2678–
Strumok Stream Cipher Against 2688. doi: 10.1016/j.procs.2021.09.038.
Correlation Attacks Over Finite Fields of [21] NIST 800-22 A Statistical Test Suite for
Characteristic 2, Math. Comput. Random and Pseudorandom Number
Modeling 19 (2019) 114–119. doi: Generators for Cryptographic
10.32626/2308-5916.2019-19.114-119 Applications.
[11] O. Kuznetsov, et al., Statistical Studies of [22] O. Pliushch, The Use of Cyclic Shifts of a
Modern Stream Ciphers, Appl. Radio Pseudo-Random Code Sequence to
Electron. 15(3) (2016) 167–178. Improve the Characteristics of a
[12] I. Fedotova-Piven, et al., The Inversion Telecommunications Channel,
Method of Four-Bit Boolean SAC Cybersecur. Educ. Sci. Technol. 1(9)
Cryptotran
        <xref ref-type="bibr" rid="ref2">sforms. Radio Electronics, (2020</xref>
        ) 126–139. doi:
10.28925/2663Comput. Sci. Control. 4 (2019) 199–210. 4023.2020.9.126139.
      </p>
      <p>doi: 10.15588/1607-3274-2019-4-19. [23] B. Hamouda, Comparative Study of
[13] B. Shramchenko, Improving the Different Cryptographic Algorithms, J.</p>
      <p>
        Performance of Encryption Algorithms, Inf. Secur. 11 (2020) 138–148. doi:
5th International Scientific and Practical 10.4236/ji
        <xref ref-type="bibr" rid="ref2">s.2020</xref>
        .113009.
      </p>
      <p>Conference on Mechatronic Systems: [24] R. Sivakumar, B. Balakumar,
Innovations and Engineering (2021) V. ArivuPandeeswaran, A Study of
180–181. Encryption Algorithms (DES, 3DES and
[14] V. Karpinets, A. Priymak, Y. Yaremchuk, AES) for Information Security, Int. Res. J.</p>
      <p>Increasing the Stability of the Blowfish Eng. Technol. 5 (2018) 4133–4137.
Cipher Based on the Optimization of [25] K. Patel, Performance Analysis of AES,
Weak Keys by the Genetic Algorithm. DES and Blowfish Cryptographic
Legal, Regulatory and Metrological Algorithms on Small and Large Data Files
Support of the Information Protection Int. J. Inf. Tecnol. 11 (2019) 813–819.</p>
      <p>
        System in Ukraine 35 (2018) 106–115. doi: 10.1007/s41870-018-0271-4.
[15] O. Korchenko, V. Sidenko, Y. Dreis, [26] Difference Between DES (Data
Applied Cryptology: Encryption Encryption Standard) and AES
Systems, State University of (Advanced Encryption Stand
        <xref ref-type="bibr" rid="ref6">ard). URL:
Telecommunications (2014</xref>
        ).
https://techdifferences.com/difference[16] T. Myroniuk, et al., Information between-des-and-17.aes.html
Protection Based on Permutation [27] K. Logunleko, O. Adeniji, A. Logunleko, A
Operations by Controlled of Information: Comparative Study of Symmetric
monograph. Cherkasy State Cryptography Mechanism on DES, AES
Technological University (2021). and EB64 for Information Security, Int. J.
[17] G. Mamonova, M. Mednikova, Sci. Res. Comput. Sci. Eng. 8(1) (2020)
Cryptographic Analysis of the DES 45–51.
      </p>
      <p>Algorithm, Model. Inf. Syst. Econom. Coll. [28] NIST SP 800-22 Revision 1a, A Statistical
Sci. Pr. 98 (2019) 146–156. doi: Test Suite for Random and
10.33111/mise.98.15. Pseudorandom Number Generators for
[18] P. Burciu, E. Simion, A Systematic Cryptographic Applications. URL:
Approach of NIST Statistical Tests https://nvlpubs.nist.gov/nistpubs/Lega
cy/SP/nistspecialpublication80022r1a.pdf.
[29] Z. Mengdi, et al., Overview of</p>
      <p>Randomness Test on Cryptographic
Algorithms, J. Phys. Conf. Ser. 1861
(2021). doi: 10.1088/1742-6596/1861/
1/012009.
[30] H. Dibas, K. Sabri, A Comprehensive</p>
      <p>Performance Empirical Study of the
Symmetric Algorithms:AES, 3DES,
Blowfish and Twofish, International
Conference on Information Technology
(ICIT) (2021) 344–349. doi:
10.1109/ICIT52682.2021.9491644.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , et al.,
          <article-title>High-Performance Reliable Block Encryption Algorithms Secured against Linear and Differential Cryptanalytic Attacks</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          Vol.
          <volume>2104</volume>
          (
          <year>2018</year>
          )
          <fpage>657</fpage>
          -
          <lpage>668</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , et al.,
          <source>Studies on Cryptographic Security and Speed Analysis of New Advanced Block Cipher, CEUR Workshop Proceedings</source>
          Vol.
          <volume>2711</volume>
          (
          <year>2020</year>
          )
          <fpage>202</fpage>
          -
          <lpage>213</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <volume>133</volume>
          (
          <year>2020</year>
          )
          <fpage>341</fpage>
          -
          <lpage>348</lpage>
          . doi:
          <volume>10</volume>
          .1016/ j.patrec.
          <year>2020</year>
          .
          <volume>03</volume>
          .015.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>R.</given-names>
            <surname>Oliynykov</surname>
          </string-name>
          , et al.,
          <article-title>Design Principles and Main Properties of the New Ukrainian National Standard of Block Encryption, Ukrainian Inf</article-title>
          .
          <source>Secur. Res. J</source>
          .
          <volume>17</volume>
          (
          <issue>2</issue>
          ) (
          <year>2015</year>
          )
          <fpage>142</fpage>
          -
          <lpage>157</lpage>
          . doi:
          <volume>10</volume>
          .18372/
          <fpage>2410</fpage>
          -
          <lpage>7840</lpage>
          .
          <fpage>17</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sovyn</surname>
          </string-name>
          , et al.,
          <article-title>Effective Implementation and Performance Comparison of “KALYNA” and GOST 28147-89 Ciphers witch the Use of Vector Extensions SSE, AVX</article-title>
          AND AVX-
          <volume>512</volume>
          , Ukrainian Ukrainian Inf.
          <source>Secur. Res. J</source>
          . Vol.
          <volume>21</volume>
          (
          <issue>4</issue>
          ) (
          <year>2019</year>
          )
          <fpage>207</fpage>
          -
          <lpage>223</lpage>
          . doi:
          <volume>10</volume>
          .18372/
          <fpage>2410</fpage>
          -
          <lpage>7840</lpage>
          .
          <fpage>21</fpage>
          .142 66.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Іvanenko</surname>
          </string-name>
          , E. Kolovanova, Perspective Block Cipher “Kalyna” Modelling, Appl. Radio Electron.
          <volume>13</volume>
          (
          <issue>3</issue>
          ) (
          <year>2014</year>
          )
          <fpage>201</fpage>
          -
          <lpage>207</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Inf</surname>
          </string-name>
          . Secur.
          <volume>23</volume>
          (
          <issue>2</issue>
          ) (
          <year>2017</year>
          )
          <fpage>100</fpage>
          -
          <lpage>108</lpage>
          . doi:
          <volume>10</volume>
          .18372/
          <fpage>2225</fpage>
          -
          <lpage>5036</lpage>
          .
          <fpage>23</fpage>
          .11796.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>