=Paper=
{{Paper
|id=Vol-3654/paper12
|storemode=property
|title=Information-Driven Permutation Operations for Cryptographic Transformation
|pdfUrl=https://ceur-ws.org/Vol-3654/paper12.pdf
|volume=Vol-3654
|authors=Vira Babenko,Tetiana Myroniuk,Artem Lavdanskyi,Yaroslav Tarasenko,Oleg Myroniuk
|dblpUrl=https://dblp.org/rec/conf/cpits/BabenkoMLTM24
}}
==Information-Driven Permutation Operations for Cryptographic Transformation==
Information-Driven Permutation Operations for Cryptographic Transformation Vira Babenko1, Tetiana Myroniuk1, Artem Lavdanskyi1, Yaroslav Tarasenko1, and Oleg Myroniuk1 1 Cherkasy State Technological University, 460 Shevchenko str. Cherkasy, 18006, Ukraine Abstract In the work, the authors proposed one of the techniques of using information-driven permutation operations for the implementation of cryptographic data transformation. An algorithm for implementing the proposed method of cryptographic data transformation based on the use of a basic group of information-driven permutation operations has been developed. The process of cryptographic transformation of three bytes of data based on the proposed algorithm is shown by a flowchart containing information-driven permutations, a Feistel network, shift and XOR operations, and addition modulo 2. The software implementation of the developed algorithm in the high-level object-oriented programming language Python is carried out. The obtained results of the work of the created software made it possible to conduct further research and carry out a qualitative assessment of the results of cryptographic data transformation according to the proposed method of using previously synthesized information-driven permutation operations. The effectiveness of this algorithm was evaluated based on statistical testing by the NIST STS package, as well as its suitability for implementing data encryption by hardware and software based on a comparison of test results with the results of using standard encryption algorithms DES, AES, Blowfish, Kalyna, Strumok, and Linear Feedback Shift Register. Keywords 1 Technique, information-driven permutation operations, basic operations, algorithm, cryptographic transformation, key, round, statistical testing. 1. Introduction Software cryptographic protection tools are flexible, which gives them a special advantage The development of new and improvement of over hardware ones. Mobility and ease of use common encryption methods that would be explain their modern popularity and prevalence. simple in hardware and software Therefore, among the ways to improve the implementations, and at the same time provide a stability indicators of cryptographic algorithms, sufficiently high level of cryptographic strength there are several approaches to the construction by expanding the range of cryptographic of software ciphers. The most promising for transformation operations used, obtained by software implementation are flexible ciphers modifying the basic operations, is one of the based on the use of several modifications of the urgent tasks of information security. The search encryption algorithm, ciphers with pseudo- and synthesis of modified operations for probable key selection, and ciphers with cryptographic transformation will make it permutation of fixed procedures and possible to build algorithms using them with the customization of transformation operations. In best cryptographic properties, which makes this addition, one of the well-known ways to increase study relevant. cryptographic strength is the multi-pass mode of applying the encryption algorithm. CPITS-2024: Cybersecurity Providing in Information and Telecommunication Systems, February 28, 2024, Kyiv, Ukraine EMAIL: v.babenko@chdtu.edu.ua (V. Babenko); t.myroniuk@chdtu.edu.ua (T. Myroniuk); a.lavdanskyi@chdtu.edu.ua (A. Lavdanskyi); o.m.myroniuk.asp23@chdtu.edu.ua (O. Myroniuk) ORCID: 0000-0003-2039-2841 (V. Babenko); 0000-0002-7588-1055 (T. Myroniuk); 0000-0002-1596-4123 (A. Lavdanskyi); 0000-0002- 5902-8628 (Y. Tarasenko); 0009-0007-7572-6972 (O. Myroniuk) ©️ 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) CEUR ceur-ws.org Workshop ISSN 1613-0073 Proceedings 137 2. Background Analysis results of experimental studies of the statistical security and speed characteristics of stream In our day to be secure, modern information and ciphers show that the Strumok algorithm is the communication technology needs reliable most balanced solution, it can provide the encryption. That is why a large number of modern properties of a random sequence generator and scientific publications are devoted to the give huge indicators in terms of encryption speed. development of new and improvement of existing It has been practically proven that the encryption common cryptographic algorithms. Such works speed of the Strumok algorithm on modern include scientific publications [1–3, 12–14, 22]. computer systems can reach 10–15 Gbit/s. In this paper [1] to improve the security In works [9, 11] the results of experimental effectiveness of electronic information studies of statistical properties of common and resources, two encryption algorithms (Luna and modern cryptographic encryption algorithms Neptun) have been developed based on fixed are given. In the article [11], experimental lookup tables with extended bit depth and studies of the cryptographic properties of the dynamic key-dependent lookup tables. Strumok stream cipher were carried out by the Properties of random sequences formed using NIST STS statistical testing methodology. In the proposed algorithms’ encryption [1] were articles [9–11], a comparative analysis of the explored in the environment of NIST STS statistical security indicators of the world- statistical tests. famous and most widespread cryptographic The paper [2] proposes a method that uses algorithms (Enocoro, HC-128, HC-256, Grain, substitution tables with increased capacity and MICKEY 2, MUGI, Rabbit, Salsa20, SNOW 2.0, randomized linear and non-linear operations. Sosemanuk, Trivium, AES, Strumok, Kalyna, etc.), Based on this method, a new advanced block which are standardized at the international or cipher was proposed and its specifications were national level, is carried out. given [2]. The article [12] deals with an actual task for In this work [3] the Linear Feedback Shift increasing the reliability of information Register (LFSR) is used to produce nonbinary protection systems by the creation and use of pseudo-random key sequences. The length of the new four-bit cryptographic transformations sequence has been enhanced by designing a with nonlinear Boolean functions that have the hybrid model using LFSR and Genetic Algorithm. property of strict avalanche criterion. In the Achieving a length more than the maximum article [12], for the first time, there was length of LFSR is the primary intention of this proposed a method for obtaining inverse four- work. bit cryptographic transformations with the It should be noted that the main block and strict avalanche criterion property for stream symmetric encryption algorithms used in balanced Boolean functions containing two Ukraine are the Kalyna and Strumok logical operations (inversion and addition cryptographic algorithms. For the cryptographic modulo two). This method [12] is a method of transformation in the Kalyna standard [4–8], the selecting the already existing basic Boolean SPN structure was chosen as a high-level design functions from a predetermined set of of the cipher based on analytical comparison, the balanced basic Boolean functions for direct layer of nonlinear transformation of the cyclic and inverse cryptographic transformations, function was implemented based on S-blocks, whereas the existing methods of searching for and for the implementation of the linear inverse cryptographic transformation are scattering block, multiplication by MDV was methods for calculating each element of the chosen matrix. This method of constructing a Boolean functions for the inverse cryptographic crypto algorithm ensures compliance with transformation. modern requirements for the level of The article [13] proposes a modification of the cryptographic stability and speed compared to algorithm for calculating the reciprocal of a other international standards. number presented in a finite ring, which makes it In turn, it should be noted the high statistical possible to reduce the number of elementary security of the stream symmetric encryption operations and thereby increase the algorithm Strumok [9–11], which revealed certain performance of encryption algorithms. properties of the random bit generator. The However, the problem task of using a group of information-driven permutation operations for 138 the implementation of cryptographic hardware. The results obtained are presented in transformation has not been given attention in Table 1 [16]. the development of security software. Thus, the To obtain the elementary functions of the development of methods for applying this group cryptographic transformations given in Table 1, of operations for data encryption and decryption the bit permutation method should be used, the and the algorithmization of these processes is main task of which is to replace one bit of the certainly an urgent task of research. elementary function with two others. Based on the researched results, the obtained 3. Formal Problem Statement elementary functions will be called elementary functions of information-driven permutations. In the work [16], a model of elementary The usage of controlled operations opens up functions for cryptographic transformation is great opportunities for achieving the required built, which has the following form: level of cryptographic protection. Considering that the efficiency of using controlled 𝑌 = 𝑥̃𝑖 𝑥̃𝑗 ∨ 𝑥̃̄𝑖 𝑥̃𝑘 , (1) operations increases with the number of where 𝑌 is the value of the corresponding potentially implemented modifications, since digit of the output signal of the result of the in this case the sub-block of the data being elementary functions of the cryptographic converted expands, the use of the permutation transformation; 𝑥̃𝑖 , 𝑥̃𝑗 , 𝑥̃𝑘 are the values of the operation becomes relevant, since it has a very corresponding digits of the input signal. large number of modifications. Thus, the The following are the properties of the development of cryptographic tools based on defined model [16]: controlled permutations is a promising 1. 𝑖, 𝑗, 𝑘 take the values 1, 2, 3, and 𝑖 ≠ 𝑗 ≠ 𝑘. direction in modern cryptography [15]. 2. 𝑥𝑖 can take a direct or inverse value. Therefore, the main objective of this work is 3. 𝑥𝑗 , 𝑥𝑘 can be both in direct and inverse to improve the technique of using basic meaning and 𝑗 ≠ 𝑘. information-driven permutation operations Table 1 through the use of a modified algorithm of Elementary functions of low complexity cryptographic information transformation that Number of Execution allows using the full set of permutation Discrete model function result modifications. 83 01010011 𝑥1 ⋅ 𝑥2 ∨ 𝑥̄ 1 ⋅ 𝑥3 163 10100011 𝑥1 ⋅ 𝑥2 ∨ 𝑥̄ 1 ⋅ 𝑥̄ 3 Purpose of the work. Develop a way to apply 46 00101110 𝑥1 ⋅ 𝑥̄ 2 ∨ 𝑥2 ⋅ 𝑥̄ 3 a basic group of information-driven 71 01000111 𝑥1 ⋅ 𝑥2 .∨ 𝑥̄ 2 ⋅ 𝑥3 permutation operations and propose an 139 10001011 𝑥1 ⋅ 𝑥2 ∨ 𝑥̄ 2 ⋅ 𝑥̄ 3 53 00110101 𝑥̄ 1 ⋅ 𝑥2 .∨ 𝑥1 ⋅ 𝑥3 algorithm for implementing cryptographic 58 00111010 𝑥̄ 1 ⋅ 𝑥2 .∨ 𝑥1 ⋅ 𝑥̄ 3 data transformation based on the use of these 184 10111000 𝑥̄ 1 ⋅ 𝑥2 ∨ 𝑥̄ 2 ⋅ 𝑥̄ 3 operations. Investigate and evaluate the 116 01110100 𝑥̄ 1 ⋅ 𝑥2 ∨ 𝑥̄ 2 ⋅ 𝑥3 92 01011100 𝑥1 ⋅ 𝑥̄ 2 ∨ 𝑥̄ 1 ⋅ 𝑥3 suitability of using the proposed algorithm for 172 10101100 𝑥1 ⋅ 𝑥̄ 2 ∨ 𝑥̄ 1 ⋅ 𝑥̄ 3 encryption by software and hardware. 29 00011101 𝑥1 ⋅ 𝑥̄ 2 ∨ 𝑥2 ⋅ 𝑥3 197 11000101 𝑥̄ 1 ⋅ 𝑥̄ 2 ∨ 𝑥1 ⋅ 𝑥3 202 11001010 𝑥̄ 1 ⋅ 𝑥̄ 2 ∨ 𝑥1 ⋅ 𝑥̄ 3 4. Materials and Methods 209 226 11010001 11100010 𝑥̄ 1 ⋅ 𝑥̄ 2 ∨ 𝑥2 ⋅ 𝑥3 𝑥̄ 1 ⋅ 𝑥̄ 2 ∨ 𝑥2 ⋅ 𝑥̄ 3 39 00100111 𝑥1 ⋅ 𝑥3 ∨ 𝑥2 ⋅ 𝑥̄ 3 Let us consider in more detail the synthesis of 141 10001101 𝑥1 ⋅ 𝑥3 ∨ 𝑥̄ 2 ⋅ 𝑥̄ 3 114 01110010 𝑥̄ 1 ⋅ 𝑥3 ∨ 𝑥2 ⋅ 𝑥̄ 3 cryptographic transformation operations 27 00011011 𝑥1 ⋅ 𝑥̄ 3 ∨ 𝑥2 ⋅ 𝑥3 based on elementary information-driven 78 01001110 𝑥1 ⋅ 𝑥̄ 3 ∨ 𝑥̄ 2 ⋅ 𝑥3 permutation functions. 177 10110001 𝑥̄ 1 ⋅ 𝑥̄ 3 ∨ 𝑥2 ⋅ 𝑥3 228 11100100 𝑥̄ 1 ⋅ 𝑥̄ 3 ∨ 𝑥̄ 2 ⋅ 𝑥3 In [16] it was determined that the sets of 216 11011000 𝑥̄ 1 ⋅ 𝑥3 ∨ 𝑥̄ 2 ⋅ 𝑥̄ 3 groups of 3-bit elementary cryptographic transformation functions are functions To construct a method of synthesis of consisting of three elementary functions, the information-driven elementary functions, we formal model of which is similar to the will introduce the following definitions [16]. complexity of the addition modulo 2. This means Definition 1. The main element of the that these sets are simple and do not require elementary function of information-driven significant resources for implementation by 139 permutations is the repeating element in the cryptographic transformation operations, it is right and left parts of the elementary function necessary to calculate the number of basic in direct and inverse meanings. three-bit operations from the total number of Definition 2. An additional element or an cryptographic transformation operations. elementary function of information-driven For further research, elementary permutations is an element that occurs once information-driven functions were divided into either on the left or on the right side of the direct and reverse elementary information- elementary function. driven functions [16]. The method for synthesizing elementary When studying certain groups of information-driven permutation functions is information-driven permutation operations, it as follows [16]: was found that the base group can be 1. Determine the indices of the main and considered a group where elementary additional elements of elementary functions are located in the following way [16]: functions of information-driven the first elementary function of the operation permutation. is the function f1, the value of the main element 2. Determine direct and inverse values of of which is x1; the second elementary function elements of elementary functions of of the operation is the function f2, the main information-driven permutation. element of which is x2; the third elementary 3. Substitute certain values into expression function of the operation is the function f3, (1) to obtain elementary information- where the value of the main element is x3. driven permutation functions. Based on this, it can be concluded that the 4. Applying items 1–3 on this set of main elements of the basic operation, which elementary indices for direct and inverse can form the basic group of cryptographic values of elementary functions of transformation operations, should be placed information-driven permutation, we diagonally [16]. obtain the complete set of elementary Thus, eight operations for two groups were functions of information-driven defined, which are the basic operations of permutation. forward (Ff) and reverse (Fr) cryptographic Subsequently, the analysis of cryptographic transformation. They are represented by transformation operations [16] was carried expressions (2)–(17) [16]. out based on elementary permutation 𝑥1 ⋅ 𝑥̄ 2 ∨ 𝑥̄ 1 ⋅ 𝑥3 functions controlled by information obtained 𝑓 𝐹92,46,27 = [𝑥1 ⋅ 𝑥̄ 2 ∨ 𝑥2 ⋅ 𝑥̄ 3 ] = based on the experiment. 𝑥1 ⋅ 𝑥̄ 3 ∨ 𝑥2 ⋅ 𝑥3 1 0 0 − 0 1 (2) As a result of the computational experiment = [0 1 0] ⇔ [ 1 − 0 ]. [16], it was determined that the total number 0 0 1 1 1 − of three-bit information-driven permutation operations for cryptographic transformation 𝑥1 ⋅ 𝑥2 ∨ 𝑥̄1 ⋅ 𝑥3 will be equal to the product of the 𝑟 𝐹83,116,78 = [𝑥̄ 1 ⋅ 𝑥2 ∨ 𝑥̄ 2 ⋅ 𝑥3 ] = multiplication of the number of operations in 𝑥1 ⋅ 𝑥̄ 3 ∨ 𝑥̄ 2 ⋅ 𝑥3 (3) 1 0 0 − 1 1 each group, which is 764 information-driven = [0 1 0] ⇔ [ 0 − 1 ]. operations. 0 0 1 1 0 − When researching cryptographic transformation operations, it was found that 𝑥̄ 1 ⋅ 𝑥2 ∨ 𝑥1 ⋅ 𝑥3 𝑓 the total number of these operations is formed 𝐹53,71,27 = [𝑥1 ⋅ 𝑥2 ∨ 𝑥̄ 2 ⋅ 𝑥3 ] = by a combination of basic operations, 𝑥1 ⋅ 𝑥̄ 3 ∨ 𝑥2 ⋅ 𝑥3 1 0 0 − 1 1 (4) permutation operations, and inversion = [0 1 0] ⇔ [ 1 − 1 ]. operations [16]: 𝑁 = 𝑁𝑏 ⋅ 𝑁п ⋅ 𝑁і = 𝑁𝑏 ⋅ 3! ⋅ 0 0 1 1 1 − 23 = 384, where N is the total number of operations; Nb is the number of basic 𝑥1 ⋅ 𝑥2 ∨ 𝑥̄1 ⋅ 𝑥3 𝑟 operations; Nn is the number of operations 𝐹83,29,39 = [𝑥1 ⋅ 𝑥̄ 2 ∨ 𝑥2 ⋅ 𝑥3 ] = 𝑥1 ⋅ 𝑥3 ∨ 𝑥2 ⋅ 𝑥̄ 3 based on the replacement of 1 or 2 elementary 1 0 0 − 1 1 (5) group functions and Ni is the number of = [0 1 0] ⇔ [ 1 − 1 ]. inversion transactions. Therefore, to 0 0 1 1 1 − determine the number of three-bit basic 140 𝑥1 ⋅ 𝑥2 ∨ 𝑥̄1 ⋅ 𝑥3 𝑥̄1 ⋅ 𝑥2 ∨ 𝑥1 ⋅ 𝑥̄ 3 𝑓 𝑟 𝐹83,29,39 = [𝑥1 ⋅ 𝑥̄ 2 ∨ 𝑥2 ⋅ 𝑥3 ] = 𝐹58,116,39 = [𝑥̄1 ⋅ 𝑥2 ∨ 𝑥̄ 2 ⋅ 𝑥3 ] = 𝑥1 ⋅ 𝑥3 ∨ 𝑥2 ⋅ 𝑥̄ 3 𝑥1 ⋅ 𝑥3 ∨ 𝑥2 ⋅ 𝑥̄ 3 1 0 0 − 1 1 (6) 1 0 0 − 1 0 (15) = [0 1 0] ⇔ [ 1 − 1 ]. = [0 1 0] ⇔ [ 0 − 1 ]. 0 0 1 1 1 − 0 0 1 1 1 − 𝑥̄1 ⋅ 𝑥2 ∨ 𝑥1 ⋅ 𝑥3 𝑥1 ⋅ 𝑥2 ∨ 𝑥̄1 ⋅ 𝑥3 𝑟 𝑓 𝐹53,71,27 = [𝑥1 ⋅ 𝑥2 ∨ 𝑥̄ 2 ⋅ 𝑥3 ] = 𝐹83,116,78 = [𝑥̄1 ⋅ 𝑥2 ∨ 𝑥̄ 2 ⋅ 𝑥3 ] = 𝑥1 ⋅ 𝑥̄ 3 ∨ 𝑥2 ⋅ 𝑥3 (7) 𝑥1 ⋅ 𝑥̄ 3 ∨ 𝑥̄ 2 ⋅ 𝑥3 (16) 1 0 0 − 1 1 1 0 0 − 1 1 = [0 1 0] ⇔ [ 1 − 1 ]. = [0 1 0] ⇔ [ 0 − 1 ]. 0 0 1 1 1 − 0 0 1 1 0 − 𝑥̄1 ⋅ 𝑥2 ∨ 𝑥1 ⋅ 𝑥̄ 3 𝑥1 ⋅ 𝑥̄ 2 ∨ 𝑥̄1 ⋅ 𝑥3 𝑓 𝑟 𝐹58,29,78 = [𝑥1 ⋅ 𝑥̄ 2 ∨ 𝑥2 ⋅ 𝑥3 ] = 𝐹92,46,27 = [𝑥1 ⋅ 𝑥̄ 2 ∨ 𝑥2 ⋅ 𝑥̄ 3 ] = 𝑥1 ⋅ 𝑥̄ 3 ∨ 𝑥̄ 2 ⋅ 𝑥3 (8) 𝑥1 ⋅ 𝑥̄ 3 ∨ 𝑥2 ⋅ 𝑥3 (17) 1 0 0 − 1 0 1 0 0 − 0 1 = [0 1 0] ⇔ [ 1 − 1 ]. = [0 1 0] ⇔ [ 1 − 0 ]. 0 0 1 1 0 − 0 0 1 1 1 − 𝑥̄ 1 ⋅ 𝑥2 ∨ 𝑥1 ⋅ 𝑥3 Having studied the basic group of 𝑟 𝐹53,46,114 = [𝑥1 ⋅ 𝑥̄ 2 ∨ 𝑥2 ⋅ 𝑥̄ 3 ] = cryptographic transformation operations, 𝑥̄ 1 ⋅ 𝑥3 ∨ 𝑥2 ⋅ 𝑥̄ 3 presented above in the form of discrete 1 0 0 − 1 1 (9) = [0 1 0] ⇔ [ 1 − 0 ]. models, we have determined the following 0 0 1 0 1 − dependencies for the main elements of operations [16]: 𝑓 𝑥̄ 1 ⋅ 𝑥2 ∨ 𝑥1 ⋅ 𝑥̄ 3 𝐹92,46,27 = 𝑥1 = 1, 𝑥2 = 0, 𝑥3 = 0. ⇒ 𝑓 𝐹58,116,39 = [𝑥̄ 1 ⋅ 𝑥2 ∨ 𝑥̄ 2 ⋅ 𝑥3 ] = 𝑟 ⇒ 𝐹83,116,78 = 𝑥1 = 1, 𝑥2 = 1, 𝑥3 = 0. 𝑥1 ⋅ 𝑥3 ∨ 𝑥2 ⋅ 𝑥̄ 3 𝑓 1 0 0 − 1 0 (10) 𝐹53,71,27 = 𝑥1 = 0, 𝑥2 = 1, 𝑥3 = 0. ⇒ 𝑟 = [0 1 0] ⇔ [ 0 − 1 ]. ⇒ 𝐹83,29,39 = 𝑥1 = 1, 𝑥2 = 0, 𝑥3 = 1. 𝑓 0 0 1 1 1 − 𝐹83,29,39 = 𝑥1 = 1, 𝑥2 = 0, 𝑥3 = 1. ⇒ 𝑟 ⇒ 𝐹53,71,27 = 𝑥1 = 0, 𝑥2 = 1, 𝑥3 = 0. 𝑓 𝑥1 ⋅ 𝑥̄ 2 ∨ 𝑥̄1 ⋅ 𝑥3 𝐹58,29,78 = 𝑥1 = 0, 𝑥2 = 0, 𝑥3 = 0. ⇒ 𝑟 𝐹92,71,114 = [𝑥1 ⋅ 𝑥2 ∨ 𝑥̄ 2 ⋅ 𝑥3 ] = 𝑟 ⇒ 𝐹53,46,114 = 𝑥1 = 0, 𝑥2 = 0, 𝑥3 = 1. 𝑥̄1 ⋅ 𝑥3 ∨ 𝑥2 ⋅ 𝑥̄ 3 𝑓 1 0 0 − 0 1 (11) 𝐹58,116,39 = 𝑥1 = 0, 𝑥2 = 1, 𝑥3 = 1. ⇒ 𝑟 = [0 1 0] ⇔ [ 1 − 1 ]. ⇒ 𝐹92,71,114 = 𝑥1 = 1, 𝑥2 = 1, 𝑥3 = 1. 𝑓 0 0 1 0 1 − 𝐹53,46,114 = 𝑥1 = 0, 𝑥2 = 0, 𝑥3 = 1. ⇒ 𝑟 ⇒ 𝐹58,29,78 = 𝑥1 = 0, 𝑥2 = 0, 𝑥3 = 0. 𝑓 𝑥̄1 ⋅ 𝑥2 ∨ 𝑥1 ⋅ 𝑥3 𝐹92,71,114 = 𝑥1 = 1, 𝑥2 = 1, 𝑥3 = 1. ⇒ 𝑓 𝐹53,46,114 = [𝑥1 ⋅ 𝑥̄ 2 ∨ 𝑥2 ⋅ 𝑥̄ 3 ] = 𝑟 ⇒ 𝐹58,116,39 = 𝑥1 = 0, 𝑥2 = 1, 𝑥3 = 1. 𝑥̄1 ⋅ 𝑥3 ∨ 𝑥2 ⋅ 𝑥̄ 3 𝑓 1 0 0 − 1 1 (12) 𝐹83,116,78 = 𝑥1 = 1, 𝑥2 = 1, 𝑥3 = 0. ⇒ 𝑟 = [0 1 0] ⇔ [ 1 − 0 ]. ⇒ 𝐹92,46,27 = 𝑥1 = 1, 𝑥2 = 0, 𝑥3 = 0. 0 0 1 0 1 − Having examined the obtained dependencies, we can conclude that the 𝑥̄1 ⋅ 𝑥2 ∨ 𝑥1 ⋅ 𝑥̄ 3 diagonal values of the main elements of the 𝑟 𝐹58,29,78 = [𝑥1 ⋅ 𝑥̄ 2 ∨ 𝑥2 ⋅ 𝑥3 ] = cryptographic transformation operations 𝑥1 ⋅ 𝑥̄ 3 ∨ 𝑥̄ 2 ⋅ 𝑥3 1 0 0 − 1 0 (13) included in the group under study form eight = [0 1 0] ⇔ [ 1 − 1 ]. variants of operations, that is, 23 variants. 0 0 1 1 0 − Hence, it can be assumed that the basic group 𝑥1 ⋅ 𝑥̄ 2 ∨ 𝑥̄1 ⋅ 𝑥3 of cryptographic transformation operations 𝑓 𝐹92,71,114 = [𝑥1 ⋅ 𝑥2 ∨ 𝑥̄ 2 ⋅ 𝑥3 ] = can be formed only by those elementary 𝑥̄ 1 ⋅ 𝑥3 ∨ 𝑥2 ⋅ 𝑥̄ 3 operations for cryptographic transformation, 1 0 0 − 0 1 (14) in which the value of the main elements along = [0 1 0] ⇔ [ 1 − 1 ]. 0 0 1 0 1 − the diagonal is equal to 23 options [16]. The modified matrix discrete model of the combination of the permutation matrix and the complement matrix is described as [16]: 141 𝑥11 𝐹𝑓 = 𝑥̄ 11 ∨ (𝑥22 ⊕ 𝑥33 ) 𝑥11 ∨ (𝑥22 ⊕ 𝑥33 ) 5. Experiments = [ 𝑥̄ 22 ∨ (𝑥11 ≡ 𝑥33 ) 𝑥22 𝑥22 ∨ (𝑥11 ≡ 𝑥33 ) ] (18) 𝑥̄ 33 ∨ (𝑥11 ⊕ 𝑥22 ) 𝑥33 ∨ (𝑥11 ⊕ 𝑥22 ) 𝑥33 An algorithm for a 5-round data transformation process, shown in Fig. 1, was where xij are the elementary functions of the developed to experiment to implement the cryptographic transformation of forward (Ff) proposed method of using the synthesized cryptographic transformation; 𝑖, 𝑗 ∈ {1,2,3}. basic group of information-driven permutation From here, a generalized discrete model of operations to perform cryptographic data basic groups of encoding operations for transformation. cryptographic transformation is obtained, This algorithm was implemented by us which is presented in the following form [16]: programmatically for further research and 𝐹𝑓 = (𝑥1 ≡ 11 ⋅ (𝑥2 ≡ (𝑥̄ 11 ∨ (𝑥22 ⊕ 𝑥33 ))) ∨ (𝑥 )) analysis of the results of its work. The ∨ (𝑥1 ≡ (𝑥11 ⊕ 1)) ⋅ (𝑥3 ≡ (𝑥11 ∨ (𝑥22 ⊕ 𝑥33 ))) development of this software tool was carried (𝑥2 ≡ (𝑥22 )) ⋅ (𝑥1 ≡ (𝑥̄ 22 ∨ (𝑥11 ≡ 𝑥33 ))) ∨ out using the high-level object-oriented = (19) programming language Python. ∨ (𝑥2 ≡ (𝑥22 ⊕ 1)) ⋅ (𝑥3 ≡ (𝑥22 ∨ (𝑥11 ≡ 𝑥33 ))) (𝑥3 ≡ (𝑥33 )) ⋅ (𝑥1 ≡ (𝑥̄ 33 ∨ (𝑥11 ⊕ 𝑥22 ))) ∨ [∨ (𝑥3 ≡ (𝑥33 ⊕ 1)) ⋅ (𝑥2 ≡ (𝑥33 ∨ (𝑥11 ⊕ 𝑥22 )))] where xij are the elementary functions of the cryptographic transformation of reverse (Fr) cryptographic transformation; 𝑖, 𝑗 ∈ {1,2,3}. Having studied the obtained models of encoding and decoding functions, represented by expressions (18) and (19), we can conclude that the essence of the method of synthesis of basic cryptographic transformation operations is to change the values, which allows obtaining eight basic cryptographic transformation operations for encoding and decoding functions. Having determined the essence of the method for synthesizing the basic operations of cryptographic transformation, we can conclude that the synthesis of cryptographic transformation operations based on the obtained discrete models is as follows [16]: 1. Synthesis of all basic operations of cryptographic transformation. 2. For each received operation, it is necessary to perform a permutation, which will increase their number by six times. 3. To increase the number of operations, it is necessary to use inversion operations, which will increase the number of transformation operations by another eight times. The result of the computational experiment is Figure 1: Algorithm of the developed software 384 cryptographic transformation operations for three-digit elementary functions. The essence of this algorithm consists of the following. The input data stream is divided into 3-byte blocks, on which the following operations are performed: addition modulo 2, cyclic shift, and permutations. 142 The algorithm of the software, which was positions that affect the next state) are [20– developed by us for conducting an 24]. The result is recorded byte by byte to a file. experimental study, consists of several steps. For the example shown in Fig. 2, we Step 1. For each byte of the output message estimate the probability Pcrack of cracking one sequence, we perform an XOR operation with round of bit permutations for step 3 of the each byte of the key. The keys are the basic cryptographic transformation using the operations determined as a result of the formula: computational experiment. A new key is used 𝑃crack = 𝑡ℎ𝑒 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑐𝑜𝑟𝑟𝑒𝑐𝑡 𝑝𝑒𝑟𝑚𝑢𝑡𝑎𝑡𝑖𝑜𝑛𝑠 𝑜𝑓 𝑏𝑖𝑡 𝑝𝑎𝑖𝑟𝑠 . for each group of three bytes. 𝑡ℎ𝑒 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑎𝑙𝑙 𝑝𝑒𝑟𝑚𝑢𝑡𝑎𝑡𝑖𝑜𝑛𝑠 𝑜𝑓 𝑏𝑖𝑡 𝑝𝑎𝑖𝑟𝑠 Step 2. The next step is to apply the cyclic The number of all different permutations of shift operation. At the same time, the message n bits is 𝑛!. For three bytes, this number is 𝑛! = from the previous step is split into bytes, each 24! = 6.204484017 × 10²³. of which is cyclically shifted by 4 bits. For the given example in Fig. 2 probability Step 3. After performing the cyclic shift Pcrack of cracking one round of bit permutations operation on the message obtained in step 2, a for step 3 of the cryptographic transformation is permutation operation by key 2 is applied to 8 𝑃crack = = each 24 bits of information to perform dispersal 6,204484017 × 10²³ −23 of the statistical structure of the message. 5 such = 1.289390057 × 10 . rounds of bit permutations in three bytes are Therefore, the probability of cracking one performed. The process of implementing the round of bit permutations Pcrack is quite low. permutation is shown in Fig. 2. Further research consisted of the verification of the developed cryptographic transformation algorithm. For this, we chose the most common method of testing the Figure 2: Bit permutation process for three statistical properties of NIST STS. bytes Binary sequence testing according to the NIST STS method has the following order [18- Step 4. At this step, the Feistel network was 21, 28, 29]: applied, which is based on two main features of 1. It is assumed that the binary sequence cryptography [15, 24–27, 30]: substitution and studied during testing 𝑆= transposition. The sequence obtained in step 3 𝑆0 , 𝑆1 , . . . 𝑆𝑛−1 is random—the null is split into blocks of 6 bytes. For each of the 6 hypothesis is accepted 𝐻0 . bytes, the Feistel network is used, which 2. Test statistics are calculated 𝑐(𝑆). involves splitting the message into two equal 3. The value of a certain probability is parts (three bytes each), where leftBlock is the determined using the test statistics left part and rightBlock is the right part. An OR operation is performed for each byte of function, 𝑃 = 𝑓(𝑐(𝑆)), 𝑃 ∈ [0,1]. the sequence contained in rightBlock with each 4. The probability value P is compared with byte of the key. An XOR operation is performed the significance level 𝛼 ∈ [0.001,0.01]. on the result obtained after conversion with each The null hypothesis is accepted in the byte contained in leftBlock according to the case of 𝑃 ≥ 𝛼, and in the opposite case, a Feistel network algorithm. conclusion is made that the alternative For the value to be placed in leftBlock, the hypothesis is accepted. bits are permuted according to step 3. The built-in tests included in the NIST STS The number of rounds of transformation package are shown in Table 2 [18, 20–21]. using the permutation and key for step 4 is 5 Using 16 built-in tests included in the NIST rounds. STS package [21], 189 probabilities P are Step 5. Before data recording in the calculated. Therefore, the result of testing is resulting file, each 24-bit block (leftBlock, the construction of some vector of values of rightBlock) is scrambled with a Linear calculated probabilities P = {P1, P2, ..., P189}. Feedback Shift Register word (a 24th-degree These probabilities can be considered as polynomial) by performing the addition separate results of test calculations. modulo 2. The feedback polynomial is 𝑥 24 + 𝑥 23 + 𝑥 21 + 𝑥 20 . In our case, the taps (the bit 143 Table 2 List of tests in the NIST STS package Number Test Name 1 Frequency 2 Block Frequency 3 Runs 4 Long Runs of Ones 5 Binary Matrix Rank 6 Spectral Discrete Fourier Transform 7 Non-overlapping Templates Matching Figure 3: Statistical portrait of the sequence of 8 Overlapping Templates Matching 9 Universal the technique of using information-driven 10 Lempel Ziv Compression permutation operations 11 Linear Complexity 12 Serial 13 Approximate Entropy 14 Cumulative Sums 15 Random Excursions 16 Random Excursions Variant As a result of testing according to the NIST STS method, a statistical portrait is formed, the form of which is a matrix with dimension m×q, Figure 4: Statistical portrait of the sequence of where m is the number of binary sequences the DES cryptographic algorithm being tested, and q is the number of statistical tests used to test each sequence [18–21]. The elements of the matrix Pij ∈ [0, 1], where ̅̅̅̅̅̅̅̅ 𝑖 =(1, ̅̅̅̅̅̅̅ 𝑚) and 𝑗 =(1, 𝑞) are the values of the probability obtained as a result of testing the ith sequence by the jth test. According to the obtained statistical portrait, a part of the sequences that passed each statistical test is determined. For this, the Figure 5: A statistical portrait of the sequence level of significance is set 𝛼 ∈ [0.001,0.01] and of the AES cryptographic algorithm the probability values exceeding the established level of significance 𝛼 are calculated for each of the 𝑞 tests. That is, determine the coefficient [18–20]: #{𝑃𝑖𝑗 ≥ 𝛼|𝑖 = 1, 𝑚} 𝑟𝑗 = . 𝑚 As a result, a vector of coefficients is formed, the elements of which characterize in Figure 6: A statistical portrait of the sequence percentage the passage of the sequence of all of the Blowfish cryptographic algorithm statistical tests. The properties of pseudo-random sequences formed using the developed software tool were studied in the environment of statistical tests NIST STS. Statistical portraits of software implementations of the method of using information-driven permutation operations and DES [17, 24], AES [26–27], Blowfish [14, 29–30] algorithms, and linear Figure 7: A statistical portrait of the sequence feedback shift register are shown in Figs. 3–7 of scrambling with a LFSR word (𝑥24 + 𝑥23 + respectively. 𝑥21 + 𝑥20 polynomial) To design the test, the following parameters were selected [28–29]: 144 1. The sequence length for testing: n = 106 bits. 2. Number of sequences that are tested: m = 100. 3. number of tests q = 189. Thus, the tested sample size was N = 106100 = 108 bits, and the number of tests (q) for different lengths q = 189, thus, the statistical portrait of the generator contains Figure 9: A statistical portrait of Kalyna (mini- 18900 probability values Р. version) cipher In the ideal case, with m = 100 and = 0.01, According to the NIST STS testing only one sequence out of a hundred can be methodology, the Kalyna cipher and mini- rejected during testing. The pass rate for each version of Kalyna cipher have the following test must be 99%. But this is too strict a rule. results: the number of passed statistical tests Therefore, a rule based on the confidence according to the 𝑃𝑖 ≥ 0.96 criterion is 187 and interval is applied. The lower limit is 0.96015. 186 respectively, and according to the 𝑃𝑗 ≥ The structure and common basic 0.99 criterion, it is 132 and 135 respectively. transformations of the Kalyna block cipher are Let’s enter the data obtained in [6–8] given in the papers [6–8]. A cipher mini-model regarding the statistical testing of the Kalyna is developed by scaling common cipher cipher into Table 3 for a comparative analysis. cryptographic transformations with the The work [9] presents the results of preservation of their algebraic structure in experimental studies of statistical security and paper [7]. The developed mini-model [7] is speed characteristics of modern stream intended to study the general characteristics of ciphers, in particular the Strumok cipher. In the cipher and was used for statistical testing [11], a study of the statistical properties of by the NIST STS package. standardized stream encryption algorithms The paper [8] is devoted to the study of was carried out and a detailed description and statistical properties of crypto-algorithms by analysis of the obtained test results was given. the Suite NIST STS and contains images of The data obtained in the course of statistical profiles of algorithms, in particular, experimental studies in works [9, 11] can be the Kalyna block cipher. We will use the used to conduct a comparative assessment of experimental data obtained in works [6–8] the statistical properties of the modern regarding the study of the statistical properties Strumok cipher and the software of the Kalyna block cipher by using the Suite implementation of the method of applying in NIST STS for comparison with the results of the formation-driven permutation operations research of other algorithms obtained by us. developed by us. Statistical portraits of the Statistical portraits of the results of the Kalyna results of the Strumok cipher with a key length cipher are shown in Figs. 8–9 (Kalyna mini- of 256 and 512 bits are shown in Figs. 10–11 version) [6–8]. respectively [11]. According to the NIST STS testing methodology, the Strumok cipher with 256- and 512-bit keys has the following results: the number of passed statistical tests according to the 𝑃𝑖 ≥ 0.96 criterion is 186 and 187 respectively, and according to the 𝑃𝑗 ≥ 0.99 criterion, it is 130 and 133 respectively. Let’s enter the data obtained in the paper [11] regarding the statistical testing of the Strumok cipher into Table 3 for comparative Figure 8: A statistical portrait of Kalyna cipher analysis. 145 Thus, we can conclude that the developed algorithm for implementing the proposed technique of using information-driven permutation operations is suitable for cryptographic data transformation. The method of researching the efficiency of implementation of cryptographic Figure 10: A statistical portrait of Strumok- transformation by a certain algorithm 256 cipher presupposes the definition and analysis of encryption speed as one of the main indicators used when comparing cryptographic algorithms. The main requirement for speed measurement is the measurement of the encryption speed indicator of the same volume of open texts (in different modes) for all possible combinations of block size and key length under the same conditions within one Figure 21: A statistical portrait of Strumok- interactive process of the user of the operating 512 cipher system. To ensure the same conditions for Table 3 shows the results of testing the measuring encryption speed and for further sequences formed based on the applied qualitative assessment, it is necessary to algorithms for comparison. consider that the results of speed testing of As can be seen from the results, the cryptographic algorithms are directly related to generator based on the algorithm developed by the technical characteristics of the selected us passed the comprehensive control over the hardware and software platform. In addition, NIST STS methodology and has acceptable speed indicators and their ratio for different results compared to other generators (Table 3). ciphers can change significantly depending on the compiler version. More often, speed Table 3 comparisons are performed for software Sequence test results implementations of cryptographic algorithms. Number of tests, in which tests Usually, specially developed optimized versions have passed Generator 99% 96% of the software implementation of the sequences sequences investigated cryptographic algorithms are used An algorithm that 138 (73.4%) 185 (98.4%) to evaluate the encryption speed to obtain the implements a technique highest possible indicators. of using information- driven permutation It should be noted that the work carried out operations a software implementation of the developed DES 145 (77.1%) 186 (98.9%) algorithm of one of the methods of cryptographic data transformation based on the AES 138 (73.4%) 177 (94.1%) use of a basic group of permutation operations controlled by information containing only 25 Blowfish 129 (68.6%) 186 (98.9%) basic synthesized groups to check the Scrambling with a linear 150 (79.8%) 185 (98.4%) possibility of using similar operations when feedback shift register constructing cryptographic primitives. Since at word (𝑥 24 + 𝑥 23 + 𝑥 21 + this stage of the study, the development of an 𝑥 20 polynomial) optimized software version of the Kalyna 132 (70.2) 187 (99.5) implementation of the proposed method for applying information-driven permutation Kalyna (mini-versions) 135 (71.8) 186 (98.9) operations for the implementation of cryptographic data transformation was not Strumok-256 130 (69,1%) 186 (98.9%) carried out, then, accordingly, there is no Strumok-512 133 (70,7) 187 (99,5%) possibility to evaluate the speed of the developed algorithm for comparison with other algorithms. Investigation of the implementation 146 of this method and the effectiveness of its use in Subsequent research should be directed to terms of encryption speed is planned to be the study of operations of permutations carried out in further studies. controlled by information of greater capacity, as well as the use of the full set of basic groups 6. Conclusions of synthesized operations, which will provide an increase in the number of transformation operations and the possibility of processing The paper proposes one of the techniques of data blocks of greater length. In addition, it is using information-driven permutation necessary to study and evaluate in more detail operations for the implementation of such parameters of the cryptographic cryptographic data transformation. The study transformation algorithm as cryptographic of the implementation of this technique and strength, avalanche effect, and speed. the effectiveness of its use was carried out only on the example of 25 basic synthesized groups of 3-bit permutation operations controlled by References information. In the course of the study, we developed an [1] S. Gnatyuk, et al., High-Performance algorithm for the proposed method of Reliable Block Encryption Algorithms cryptographic data transformation based on Secured against Linear and Differential the use of a basic group of information-driven Cryptanalytic Attacks, CEUR Workshop permutation operations and implemented a Proceedings Vol. 2104 (2018) 657–668. software implementation using the high-level [2] S. Gnatyuk, et al., Studies on object-oriented programming language Cryptographic Security and Speed Python. Cryptographic transformation Analysis of New Advanced Block Cipher, according to the developed algorithm is CEUR Workshop Proceedings Vol. 2711 performed on 3 bytes of data using the (2020) 202–213. following operations: information-driven [3] K. Sudeepa, et al., Genetic Algorithm permutations, Feistel network, and shift and Based Key Sequence Generation for addition modulo 2 operations. Cipher System, Pattern Recognit. Lett. Among the features of the implementation 133 (2020) 341–348. doi: 10.1016/ of the developed cryptographic data j.patrec.2020.03.015. transformation algorithm is the use of a basic [4] R. Oliynykov, et al., Design Principles and group of information-driven permutation Main Properties of the New Ukrainian operations, the multi-pass of the algorithm, in National Standard of Block Encryption, particular, there must be at least 5 Ukrainian Inf. Secur. Res. J. 17(2) (2015) transformation rounds, and also ensuring that 142–157. doi: 10.18372/2410-7840.17. the key value changes at each transformation 8789. round. [5] Y. Sovyn, et al., Effective Implementation The obtained results of the work of the and Performance Comparison of created software made it possible to conduct “KALYNA” and GOST 28147-89 Ciphers further research and carry out a qualitative witch the Use of Vector Extensions SSE, assessment of the results of cryptographic data AVX AND AVX-512, Ukrainian Ukrainian transformation according to the proposed Inf. Secur. Res. J. Vol. 21(4) (2019) 207– method of using previously synthesized 223. doi: 10.18372/2410-7840.21.142 information-driven permutation operations. 66. The effectiveness of this algorithm was [6] A. Kuznetsov, D. Іvanenko, E. Kolovanova, evaluated based on statistical testing by the Perspective Block Cipher “Kalyna” NIST STS package, as well as its suitability for Modelling, Appl. Radio Electron. 13(3) implementing data encryption by hardware (2014) 201–207. and software based on a comparison of test [7] S. Yevseiev, S. Ostapov, R. Korolev, Use of results with the results of using standard Mini-Versions to Evaluate the Security of encryption algorithms (DES, AES, Blowfish, Block-Symmetric Ciphers, Ukrainian Sci. J. LFSR and modern Kalyna and Strumok Inf. Secur. 23(2) (2017) 100–108. doi: ciphers). 10.18372/2225-5036.23.11796. 147 [8] V. Dolgov, A. Nastenko, Large Ciphers— Dependencies, J. Electrical Eng. Random Permutations. Verification of Electronics Control Comput. Sci. 5(15) Statistical Properties Ciphers Submitted (2019) 1–6. for Ukrainian Contecst with a Test Suite [19] R. Hegadi, A. Patil, A Statistical Analysis NIST STS, Inf. Proces.Syst. 7 (2012) 2–16. on In-Built Pseudo Random Number [9] O. Kuznetsov, et al., Comparative Studies Generators Using NIST Test Suite, 5th of Stream Cryptographic Transfor- International Conference on Computing, mation Algorithms, Radyotekhnyka 191 Communication and Security (2020). (2017) 52–75. doi: 10.30837/rt.2017. doi: 10.1109/ICCCS49678.2020.9276849. 4.191.06. [20] R. Kochana, et al., Statistical Tests [10] A. Oleksiichuk, S. Koniushok, Independence Verification Methods, M. Poremskyi, Security Justification for Procedia Comput. Sci. 192 (2021) 2678– Strumok Stream Cipher Against 2688. doi: 10.1016/j.procs.2021.09.038. Correlation Attacks Over Finite Fields of [21] NIST 800-22 A Statistical Test Suite for Characteristic 2, Math. Comput. Random and Pseudorandom Number Modeling 19 (2019) 114–119. doi: Generators for Cryptographic 10.32626/2308-5916.2019-19.114-119 Applications. [11] O. Kuznetsov, et al., Statistical Studies of [22] O. Pliushch, The Use of Cyclic Shifts of a Modern Stream Ciphers, Appl. Radio Pseudo-Random Code Sequence to Electron. 15(3) (2016) 167–178. Improve the Characteristics of a [12] I. Fedotova-Piven, et al., The Inversion Telecommunications Channel, Method of Four-Bit Boolean SAC Cybersecur. Educ. Sci. Technol. 1(9) Cryptotransforms. Radio Electronics, (2020) 126–139. doi: 10.28925/2663- Comput. Sci. Control. 4 (2019) 199–210. 4023.2020.9.126139. doi: 10.15588/1607-3274-2019-4-19. [23] B. Hamouda, Comparative Study of [13] B. Shramchenko, Improving the Different Cryptographic Algorithms, J. Performance of Encryption Algorithms, Inf. Secur. 11 (2020) 138–148. doi: 5th International Scientific and Practical 10.4236/jis.2020.113009. Conference on Mechatronic Systems: [24] R. Sivakumar, B. Balakumar, Innovations and Engineering (2021) V. ArivuPandeeswaran, A Study of 180–181. Encryption Algorithms (DES, 3DES and [14] V. Karpinets, A. Priymak, Y. Yaremchuk, AES) for Information Security, Int. Res. J. Increasing the Stability of the Blowfish Eng. Technol. 5 (2018) 4133–4137. Cipher Based on the Optimization of [25] K. Patel, Performance Analysis of AES, Weak Keys by the Genetic Algorithm. DES and Blowfish Cryptographic Legal, Regulatory and Metrological Algorithms on Small and Large Data Files Support of the Information Protection Int. J. Inf. Tecnol. 11 (2019) 813–819. System in Ukraine 35 (2018) 106–115. doi: 10.1007/s41870-018-0271-4. [15] O. Korchenko, V. Sidenko, Y. Dreis, [26] Difference Between DES (Data Applied Cryptology: Encryption Encryption Standard) and AES Systems, State University of (Advanced Encryption Standard). URL: Telecommunications (2014). https://techdifferences.com/difference- [16] T. Myroniuk, et al., Information between-des-and-17.aes.html Protection Based on Permutation [27] K. Logunleko, O. Adeniji, A. Logunleko, A Operations by Controlled of Information: Comparative Study of Symmetric monograph. Cherkasy State Cryptography Mechanism on DES, AES Technological University (2021). and EB64 for Information Security, Int. J. [17] G. Mamonova, M. Mednikova, Sci. Res. Comput. Sci. Eng. 8(1) (2020) Cryptographic Analysis of the DES 45–51. Algorithm, Model. Inf. Syst. Econom. Coll. [28] NIST SP 800-22 Revision 1a, A Statistical Sci. Pr. 98 (2019) 146–156. doi: Test Suite for Random and 10.33111/mise.98.15. Pseudorandom Number Generators for [18] P. Burciu, E. Simion, A Systematic Cryptographic Applications. URL: Approach of NIST Statistical Tests https://nvlpubs.nist.gov/nistpubs/Lega 148 cy/SP/nistspecialpublication800- 22r1a.pdf. [29] Z. Mengdi, et al., Overview of Randomness Test on Cryptographic Algorithms, J. Phys. Conf. Ser. 1861 (2021). doi: 10.1088/1742-6596/1861/ 1/012009. [30] H. Dibas, K. Sabri, A Comprehensive Performance Empirical Study of the Symmetric Algorithms:AES, 3DES, Blowfish and Twofish, International Conference on Information Technology (ICIT) (2021) 344–349. doi: 10.1109/ICIT52682.2021.9491644. 149