The presentation of Magma and $2$-GOST block cipher semibyte substitutions by algebraic threshold functions
Prikladnaya Diskretnaya Matematika. Supplement, no. 9 (2016), pp. 32-34
Cet article a éte moissonné depuis la source Math-Net.Ru
The paper deals with the implementation of Magma and $2$-GOST block cipher semibyte substitutions by algebraic threshold functions (ATF). For each Magma substitution, an ATF-presentation of some linear combinations of its coordinate functions is proposed. Some linear combinations of ATF representing $2$-GOST substitutions are found.
Keywords:
algebraical threshold functions
Mots-clés : substitution.
Mots-clés : substitution.
@article{PDMA_2016_9_a12,
author = {D. A. Soshin},
title = {The presentation of {Magma} and $2${-GOST} block cipher semibyte substitutions by algebraic threshold functions},
journal = {Prikladnaya Diskretnaya Matematika. Supplement},
pages = {32--34},
year = {2016},
number = {9},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDMA_2016_9_a12/}
}
TY - JOUR AU - D. A. Soshin TI - The presentation of Magma and $2$-GOST block cipher semibyte substitutions by algebraic threshold functions JO - Prikladnaya Diskretnaya Matematika. Supplement PY - 2016 SP - 32 EP - 34 IS - 9 UR - http://geodesic.mathdoc.fr/item/PDMA_2016_9_a12/ LA - ru ID - PDMA_2016_9_a12 ER -
D. A. Soshin. The presentation of Magma and $2$-GOST block cipher semibyte substitutions by algebraic threshold functions. Prikladnaya Diskretnaya Matematika. Supplement, no. 9 (2016), pp. 32-34. http://geodesic.mathdoc.fr/item/PDMA_2016_9_a12/
[1] Soshin D. A., “Predstavlenie geometricheskikh tipov bulevykh funktsii ot trekh peremennykh algebraicheskimi porogovymi funktsiyami”, Prikladnaya diskretnaya matematika, 2016, no. 1(31), 32–45
[2] GOST R 34.12-2015, Informatsionnaya tekhnologiya. Kriptograficheskaya zaschita informatsii. Blochnye shifry, Standartinform, M., 2015
[3] Dmukh A. A., Dygin D. M., Marshalko G. B., “Prigodnaya dlya nizkoresursnoi realizatsii modifikatsiya blochnogo shifra GOST”, Matem. vopr. kriptograf., 5:2 (2014), 47–55