Математична модель процесу табличної реалізації операції алгебраїчного множення в класі залишків
Анотація
На підставі властивостей класу залишків в статті синтезована математична модель процесу табличної реалізації модульного множення, як для позитивного, так і для негативного числових діапазонів обробки інформації засобами обробки цілочисельної інформації. Дана модель рекомендована до практичного застосування при розробці методів і алгоритмів швидкої обробки криптографічної інформації. Пошук шляхів спрощення структури табличного операційного пристрою засобу обробки цілочисельної інформації зумовив необхідність вдосконалення математичної моделі, методів і алгоритмів реалізації модульних операцій, що дозволяють підвищити ефективність застосування табличній арифметики в класі залишків. Особливістю реалізації даної моделі є можливість зменшення кількості обладнання операційного пристрою засобу обробки цілочисельної інформації за рахунок скорочення на (50-70)% логічних елементів "І" в вузлах таблиці постійний запам'ятовуючий пристрій, безпосередньо реалізують операцію модульного множення за довільним mi модулю класу залишків. Це можливо за рахунок використання властивостей симетрії таблиці реалізації aibi(mod mi) модульної операції множення.
Завантаження
Посилання
Akushsky I. Ya.,Yuditsky DI. Machine arithmetic in residual classes, Moscow: Soviet radio, 1968, 440 p. (In Russian)
Torgashov V. A. The system of residual classes and reliability of digital computers, Moscow: Soviet radio, 1973, 118 p. (In Russian)
Krasnobayev V., Kuznetsov A., Koshman S., Moroz S. (2019) Improved Method of Determining the Alternative Set of Numbers in Residue Number System. In: Chertov O., Mylovanov T., Kondratenko Y., Kacprzyk J., Kreinovich V., Stefanuk V. (eds) Recent Developments in Data Science and Intelligent Analysis of Information. ICDSIAI 2018. Advances in Intelligent Systems and Computing, vol 836. Springer, Cham, pp. 319-328, 05 August 2018.
F. Barsi and P. Maestrini, "Error Correcting Properties of Redundant Residue Number Systems," in IEEE Transactions on Computers, vol. C-22, no. 3, pp. 307-315, March 1973.
V.A. Krasnobayev, A.S. Yanko, S.A. Koshman. “A Method for arithmetic comparison of data represented in a residue number system” Cybernetics and Systems Analysis, vol. 52, issue 1, pp. 145-150, January 2016.
G. Harman and I. E. Shparlinski, "Products of Small Integers in Residue Classes and Additive Properties of Fermat Quotients," in International Mathematics Research Notices, vol. 2016, no. 5, pp. 1424-1446, Jan. 2016.
V. Krasnobayev, A. Kuznetsov, M. Zub, K. Kuznetsova. Methods for comparing numbers in non-positional notation of residual classes. In Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), Zaporizhzhia, Ukraine, April 15-19, 2019., pp. 581–595. 2019.
D. I. Popov and A. V. Gapochkin, "Development of Algorithm for Control and Correction of Errors of Digital Signals, Represented in System of Residual Classes," 2018 International Russian Automation Conference (RusAutoCon), Sochi, 2018, pp. 1-3.
Yu.V. Stasev, A.A. Kuznetsov, A.M. Nosik. “Formation of pseudorandom sequences with improved autocorrelation properties.” Cybernetics and Systems Analysis, vol. 43, Issue 1, pp. 1-11, January 2007.
A. Kuznetsov, A. Kiian, K. Kuznetsova, et al. Soft decoding based on ordered subsets of verification equations of turbo-productive codes. In Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), Zaporizhzhia, Ukraine, April 15-19, 2019., pp. 873–884. 2019
A. A. Kuznetsov, I. P. Kolovanova, D. I. Prokopovych-Tkachenko, T. Y. Kuznetsova. “Analysis and Studying of the Properties of Algebraic Geometric Codes.” Telecommunications and Radio Engineering, Volume 78, 2019, Issue 5, pp. 393-417.
B. Wang and L. Liu, "A flexible and energy-efficient reconfigurable architecture for symmetric cipher processing," 2015 IEEE International Symposium on Circuits and Systems (ISCAS), Lisbon, 2015, pp. 1182-1185.
A. Kuznetsov, Y. Gorbenko, A. Andrushkevych and I. Belozersev, "Analysis of block symmetric algorithms from international standard of lightweight cryptography ISO/IEC 29192-2," 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, 2017, pp. 203-206.
I. Gorbenko, A. Kuznetsov, M. Lutsenko and D. Ivanenko, "The research of modern stream ciphers," 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, 2017, pp. 207-210.
M. E. Pamukov, V. Poulkov, A. Mihovska, N. R. Prasad and R. Prasad, "Lightweight robust cryptographic combiner for mobile devices: Crypto roulette," 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Athens, 2014, pp. 188-192.
A. Kuznetsov, I. Kolovanova and T. Kuznetsova, "Periodic characteristics of output feedback encryption mode," 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, 2017, pp. 193-198.
Z. Dai, X. Yu, J. Su and X. Chen, "Accelerated Flexible Processor Architecture for Crypto Information," 2007 2nd International Conference on Pervasive Computing and Applications, Birmingham, 2007, pp. 399-403.
I. Gorbenko, O. Kuznetsov, Y. Gorbenko, A. Alekseychuk and V. Tymchenko, "Strumok keystream generator," 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine, 2018, pp. 294-299.
Runovski, K., & Schmeisser, H. (2004). On the convergence of fourier means and interpolation means. Journal of Computational Analysis and Applications, 6(3), 211-227.
Gnatyuk, V. A. (2001). Mechanism of laser damage of transparent semiconductors. Physica B: Condensed Matter, 308-310, 935-938.
Tkach, B. P., & Urmancheva, L. B. (2009). Numerical-analytic method for finding solutions of systems with distributed parameters and integral condition. Nonlinear Oscillations, 12(1), 113-122.
Chornei, R., Hans Daduna, V. M., & Knopov, P. (2005). Controlled markov fields with finite state space on graphs. Stochastic Models, 21(4), 847-874.
Y. N. Kocherov, D. V. Samoylenko and A. I. Koldaev, "Development of an Antinoise Method of Data Sharing Based on the Application of a Two-Step-Up System of Residual Classes," 2018 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon), Vladivostok, 2018, pp. 1-5.
C. Fan and G. Ge, "A Unified Approach to Whiteman's and Ding-Helleseth's Generalized Cyclotomy Over Residue Class Rings," in IEEE Transactions on Information Theory, vol. 60, no. 2, pp. 1326-1336, Feb. 2014.
M. Kasianchuk, I. Yakymenko, I. Pazdriy, A. Melnyk and S. Ivasiev, "Rabin's modified method of encryption using various forms of system of residual classes," 2017 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), Lviv, 2017, pp. 222-224.
V.A. Krasnobayev, S.A. Koshman, M.A. Mavrina. “A Method for Increasing the Reliability of Verification of Data Represented in a Residue Number System” Cybernetics and Systems Analysis, , vol. 50, issue 6, pp. 969–976, November 2014.
K. Tao, L. Peng, K. Liang and B. Zhuo, "Irregular repeat accumulate low-density parity-check codes based on residue class pair," 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN), Guangzhou, 2017, pp. 127-131.
V. Krasnobayev, A. Kuznetsov, A. Kononchenko, T. Kuznetsova. Method of data control in the residue classes. In Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), Zaporizhzhia, Ukraine, April 15-19, 2019., pp. 241–252. 2019.
V. Krasnobayev, S. Koshman, A. Yanko and A. Martynenko, "Method of Error Control of the Information Presented in the Modular Number System," 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, 2018, pp. 39-42.
Krasnobayev V. A. Method for realization of transformations in public-key cryptography. Telecommunications and Radio Engineering. - Volume 66, 2007 Issue 17, pp. 1559-1572.