Разработка схем управления базовыми операциями криптографического преобразования, выполняемыми программируемой логической интегральной схемой

Научная статья
DOI:
https://doi.org/10.60797/IRJ.2024.150.121
Выпуск: № 12 (150), 2024
Предложена:
07.07.2023
Принята:
22.11.2023
Опубликована:
17.12.2024
10
1
XML
PDF

Аннотация

В данной статье рассматривается процедура разработки схем управления основными операциями криптографического преобразования информации, выполняемыми программируемой логической интегральной схемой, входящей в состав системы управления автономным техническим объектом. Целью исследования является анализ основных логических операций, используемых различными алгоритмами для криптографического преобразования информации, а также разработка математического аппарата для контроля корректности выполнения этих операций. Управление выполнением логических операций осуществляется внутри программируемой логической интегральной схемы параллельно с основным алгоритмом криптографического преобразования информации. В дальнейшем разработанные схемы управления могут быть использованы при разработке алгоритма технической диагностики программируемых логических интегральных схем с локализацией места и причины неисправности.

1. Introduction

Cryptographic transformation of information (hereinafter referred to as KPI) is the process of changing information that depends on the parameter being changed, and has the property that it is impossible to restore the original information from the transformed one, without knowing the current key, with a labor intensity less than the specified one.

Currently, KPI is implemented by software, hardware, and software-to-hardware tools. At the same time, in the case of even a minimal error of one bit, the information recovery process becomes impossible.

Especially relevant is the problem of error occurrence during KPI on autonomous technical means (hereinafter referred to as PBX) that operate at a long distance from the technical operator and transmit cryptographically transformed information to the processing object via radio channels.

In this regard, there is a need for autonomous monitoring of the implementation of KPI on the PBX in order to determine the error in advance and, if possible, eliminate the malfunction of the device that performs KPI.

The main computing device that performs KPI is currently a programmable logic integrated circuit. This computing tool is the most versatile for implementing various KPI algorithms.

The most cryptographic algorithms are based on four basic logical operations:

– modulo 2 addition operation.

– modulo 2^16 addition operation;

– cyclic shift operation.

– substitution operation.

Control of these logical operations will allow you to most fully determine the technical condition of the FPGA performed by the KPI on the PBX.

Consider numerical control of arithmetic operations modulo. The construction of control schemes is based on two theorems

.

Theorem 1. The sum of numbers is comparable modulo q with the sum of the residuals r of the same numbers, i.e.

img
(1)

Theorem 2. The product of numbers is comparable modulo q with the product of the residuals r of the same numbers, i.e.

img
(2)

 

Let us consider control schemes for the following transformations: summation modulo 2, summation modulo 216substitution and cyclic shift operation

,
,
.

2. Results and Discussion

Development of an algorithm for controlling the modulo summation operation. The control scheme for adding numbers modulo 2 is shown in Fig. 1.

Control of the value of binary numbers modulo 2

Figure 1 - Control of the value of binary numbers modulo 2

In general, the operation of this scheme can be described in the following way.

The result of summing two numbers А1 and A2 is the number А3. In blocks B1 and B2, the residuals r1 and r2 numbers Aand Abefore conversion, respectively. Then, in block S, the resulting residuals are summed up. Since the sum of the residuals can be greater than the modulus, then at the output of the adder, it is necessary to perform the operation of finding the remainder again using the conversion in block B3. As a result, the remainder rA3 obtained from the number Ais compared with the sum of the remainder of the numbers А1 and A– img in the comparison module () with the formation of the "norm" sign (P) in the form of a logical unit and zero – otherwise. It should be noted that the P-value is an additional feature (parameter) of the subsystem functioning and diagnostics model, i.e. img

The functioning of the presented control scheme can be divided into several stages:

1. At the initial stage, the numbers involved in the addition operation modulo 2 are obtained. After that, the remainder of the terms r1, r2 and their sum (= rr2) are found.

2. In the next step, we determine the remainder r3 of the sum of the residuals S and the remainder r4 of the sum of the terms А1 and A2.

3. At the last stage, a report is generated about whether the summation is correct (output Р1) or not (output Р2).

From a formal point of view, these stages can be represented as a set of the following maps

:

img
(3)

where B1 is an operator that characterizes getting the remainder r1 from a number A1.

img
(4)

where B2 is an operator that characterizes getting the remainder r2 from a number A2.

img
(5)

where S is the operator for finding the sum of balances r1 and r2.

img
(6)

where B3 is an operator that characterizes obtaining the remainder r3 from the sum of the remainder r1 and r2.

img
(7)

where P is an operator that characterizes obtaining the solution p.

When controlling addition modulo 2^16, the scheme is simplified, taking into account the fact that the remainder of two numbers is calculated in the transformation itself (Fig. 2).

Control of the position of binary numbers modulo 2^16

Figure 2 - Control of the position of binary numbers modulo 2^16

The functioning of the presented control scheme can be divided into several stages:

1. At the initial stage, the addition of numbers is performed. After that, the sum is compared with the number 2^16. If the value is exceeded, the difference is calculated img

2. In the next step, we define the remainder r1 of the sum of the numbers S and the remainder r2  as a number A3 (A3 ≡ r2).

3. At the last stage, a report is generated about whether the summation is correct (output Р1) or not (output Р2).

Basic analytical relations

:

img
(8)

where B1 is an operator that characterizes getting the remainder r1 from a number S.

img
(9)

where P is an operator that characterizes obtaining the solution p.

The control scheme of the shift operation is shown in Fig. 3.

Control scheme for the shift operation

Figure 3 - Control scheme for the shift operation

The functioning of the presented control scheme can be divided into several stages:

1. At the initial stage, the number is represented A1 as two numbers relative to the number of clock cycles of the shift towards the highest digit. The residuals of the indicated numbers are calculated. Similarly, the component numbers are determined A2 and the residuals are calculated.

2. In the next step, the remainder of the numbers before and after the shift is compared.

3. At the last stage, a report is generated about whether or not the number shift (P) is correct.

Basic analytical relations

,
:

img
(10)

where B1, B2 are operators that characterize obtaining residuals r1 and r2 from a number A1.

img
(11)

where B3, B4 are operators that characterize obtaining residuals r3 and r4 from a number A2.

Comparing numbers before and after the shift

img
(12)

where P1, P2 are the results of comparing the residuals r3 and r4.

img
(13)

where P is an operator that characterizes obtaining the solution p.

The control scheme for substitution operations is shown in Figure 4.

Control scheme for the substitution operation

Figure 4 - Control scheme for the substitution operation

The functioning of the presented control scheme can be divided into several stages:

The functioning of the presented control scheme can be divided into several stages:

1. At the initial stage, the division of the numbers A1 and A2 by the corresponding numbers is carried out, and the definition of the numbers img and img.

2. From the table of residuals n, select the residuals r1 and r2.

3. The remainder (img and imgof the numbers are generated after performing the substitution operation and compared with the remainder from the remainder table.

4. At the last stage, a report is generated about whether the substitution is correct or not (P).

Basic analytical relations

:

img
(14)

where B3 is an operator that characterizes getting the remainder img from a number img.

img
(15)

where B4 is an operator that characterizes getting the remainder img from a number img.

Comparing numbers before and after the shift

img
(16)

where P1, P2 are the results of comparing the residuals img and img.

img
(17)

where P is an operator that characterizes obtaining the solution p.

3. Conclusion

Thus, we have developed control schemes for the main operations of cryptographic transformation, namely addition modulo 2,modulo 2 ^ 16, shift and substitution. Many additional parameters of the technical diagnostics process have been formed. It is necessary to make adjustments to the functioning model of the encoder, taking into account the process of its technical diagnostics, based on the obtained parameters.

Метрика статьи

Просмотров:10
Скачиваний:1
Просмотры
Всего:
Просмотров:10