Author:
Sokolov A. V.,Zhdanov O. N.
Abstract
In recent decades, perfect algebraic constructions are successfully being use to signal systems synthesis, to construct block and stream cryptographic algorithms, to create pseudo-random sequence generators as well as in many other fields of science and technology. Among perfect algebraic constructions a significant place is occupied by bent-sequences and the class of perfect binary arrays associated with them. Bent-sequences are used for development of modern cryptographic primitives, as well as for constructing constant amplitude codes (C-codes) used in code division multiple access technology. In turn, perfect binary arrays are used for constructing correction codes, systems of biphase phase- shifted signals and multi-level cryptographic systems. The development of methods of many-valued logic in modern information and communication systems has attracted the attention of researchers to the improvement of methods for synthesizing many-valued bent-sequences for cryptography and information transmission tasks. The new results obtained in the field of the synthesis of ternary bent-sequences, make actual the problem of researching the class of perfect ternary arrays. In this paper we consider the problem of extending the definition of perfect binary arrays to three-valued logic case, as a result of which the definition of a perfect ternary array was introduced on the basis of the determination of the unbalance of the ternary function. A complete class of perfect ternary arrays of the third order is obtained by a regular method, bypassing the search. Thus, it is established that the class of perfect ternary arrays is a union of four subclasses, in each of which the corresponding methods of reproduction are determined. The paper establishes the relationship between the class of ternary bent-sequences and the class of perfect ternary arrays. The obtained results are the basis for the introduction of perfect ternary arrays into modern cryptographic and telecommunication algorithms.
Publisher
Belarusian National Technical University
Reference15 articles.
1. Hnatiuk, S. O. Method for quality evaluation of trit pseudorandom sequence to cryptographic applications / S. O. Hnatiuk, T. O. Zhmurko, V. N. Kinzeriavyi, N. A. Seilova. – Information Technology and Security, 2015. – Vol. 3. – No. 2(5). – С. 108–116.
2. Sokolov, A. V. Pseudo-random key sequence generator based on triple sets of bent-functions / A. V. Sokolov, O. N. Zhdanov, N. A. Barabanov. – Problems of physics, mathematics and technics, 2016. – No. 1(26). – P. 85–91.
3. Zhdanov, O. N. Block symmetric cryptographic algorithm based on principles of variable block length and many-valued logic / O. N. Zhdanov, A. V. Sokolov. – Far East Journal of Electronics and Communications, 2016. – Vol. 16, No. 3. – P. 573–589.
4. Tao, Wu. Stream cipher by reed-solomon code / Wu Tao, Wang Ruomei. – Information and Communication Technology Convergence (ICTC), 2017. – P. 422–427.
5. Tokareva, N. N. Bent functions: results and applications. Survey of works / N. N. Tokareva. – Applied Discrete Mathematics. – Tomsk, 2009. – Ser. № 1(3). – P. 15–37.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. On quaternary resilient functions;INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN MATHEMATICS AND COMPUTATIONAL ENGINEERING: ICRAMCE 2022;2023