Scientific journal
Modern high technologies
ISSN 1812-7320
"Перечень" ВАК
ИФ РИНЦ = 0,940

Existing ciphers are not capable to provide theoretical undecodeability. Spent researches showed that one this problem solution ways is encryption process virtualization. Using this approach allowed to receive a lot of ciphers, potentially capable to provide theoretical undeciphering capability. On these ciphers computer realization basis information security software complex was developed. This complex experimental research carried out with statistical tests NIST STS using (tab. 1), has shown its advantage in relation to existing ciphers including cipher Rijndael developed in AES frameworks which was recommended as XXI century encryption standard. So, even at 1 bit key length (primitive variant) encryption quality similar to quality of modern ciphers, operating 128 and more bit key length is ensured. And, even insignificant magnification of key length (up to 4 bit) considerably allows to improve these indexes.

Table 1.

Generator

Amount of tests at which testing have passed more than 99 % of sequences

Amount of tests at which testing have passed more than 96 % of sequences

BBS

134 (70.8%)

189 (100%)

Gryada - 1M

130 (68.8%)

184 (97.4%)

Primitive variant

134 (70.8%)

189 (100%)

Simple variant

150 (79.4%)

189 (100%)

It is necessary to underline, that given results should be considered only as dynamic reflection of complex realization variants effectiveness depending on initial keys length and should not be considered as univalent acknowledgement of small value of this length advantages. Generally, initial keys length will be commensurable with initial keys length in the modern ciphers. It is why initial key structure should contain bits assigning virtual sample space discrete form aspect, and also discrete sampling, quantization and scaling parameters.

As a whole, from complex probing follows that its realization in random sequences generator mode is potentially capable to provide indexes that considerable exceed known analogs. Taking into account, that development of a casual (pseudorandom) sequence makes unrolled key forming basis which performances finally determine encryption quality. Obtained lead-out may be generalized on all developed software complex modes.

Given results are obtained at Russian Federation Education Ministry grant (T02-03.1-816) support.