Three-level cryptographic system for block data encryption


  • Michael I. Mazurkov Odessa National Polytechnic University, Ukraine
  • V. Ya. Chechelnytskyi Odessa National Polytechnic University, Ukraine
  • K. K. Nekrasov Odessa National Polytechnic University, Ukraine



data protection, block data encryption, m-shift, decimation, scrambling


It is proposed three-level iterative cryptosystem for block data encryption, where three procedures of (block) encryptic protection: multi-loop m-shift, decimation and scrambling, are applied at each iteration. Cryptographic system is characterized by analytically proved practical stability and several promising properties.


B. Sklar, Digital Communications: Fundamentals and Applications, 2nd ed. (Prentice-Hall, New Jersey, 2001; Izdat. dom “Williams,” Moscow, 2003).

P. Roele, “The Design of Composite Permutations with Applications to DES–Like S–Boxes, Designs,” DESI 42, No. 1, 21 (2007).

H. Saputra, N. Vijaykrishnan, M. Kandemir, et al., “Masking the Energy Behavior of DES Encryption,” IEEE Computer Society, No. 1, 10084 (2003).

A. M. Trakhtman and V. A. Trakhtman, Basic Principles of Discrete Signals Theory at Finite Interval (Sov. Radio, Moscow, 1975) [in Russain].

V. I. Zhuravlyov and A. B. Tsaryov, “Application of Decimation and Redecimation Properties of M-sequence in Radio Engineering System,” Radiotekhnika, No. 10, 8 (1990).

O. I. Lagutenko, Modems. User’s Handbook (Lan’, St. Petersburg, 1997) [Russian translation].

C. E. Shannon, “A Mathematical Theory of Communication,” Bell Sys. Tech. J. 27, 379 (1948).

M. I. Mazurkov and V. Ya. Chechel’nitskii, “The Classes of Equivalent and Generative Perfect Binary Arrays for CDMA-Technologies,” Izv. Vyssh. Uchebn. Zaved., Radioelektron. 46(5), 54 (2003); Radioelectron. Commun. Syst. 46(5), 45 (2003).

M. I. Mazurkov, V. Ya. Chechel’nitskii and P. Murr, “Information security method based on perfect binary arrays,” Izv. Vyssh. Uchebn. Zaved., Radioelektron. 51(11), 53 (2008) [Radioelectron. Commun. Syst. 51(11), 612 (2008)].





Research Articles