CBC Mode of MPF Based Shannon Cipher Defined Over a Non-Commuting Platform Group
Commonly modern symmetric encryption schemes (e.g. AES) use rather simple actions repeated many times by defining several rounds to calculate the ciphertext. An idea we previously offered was to trade these multiple repeats for one non-linear operation. Recently we proposed a perfectly secure symmet...
Saved in:
| Published in | Informatica (Vilnius, Lithuania) Vol. 33; no. 4; pp. 833 - 856 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
London, England
SAGE Publications
01.01.2022
IOS Press BV |
| Subjects | |
| Online Access | Get full text |
| ISSN | 0868-4952 1822-8844 1822-8844 |
| DOI | 10.15388/22-INFOR499 |
Cover
| Abstract | Commonly modern symmetric encryption schemes (e.g. AES) use rather simple actions repeated many times by defining several rounds to calculate the ciphertext. An idea we previously offered was to trade these multiple repeats for one non-linear operation. Recently we proposed a perfectly secure symmetric encryption scheme based on the matrix power function (MPF). However, the platform group we used was commuting. In this paper, we use a non-commuting group whose cardinality is a power of 2 as a platform for MPF. Due to the convenient cardinality value, our scheme is more suitable for practical implementation. Moreover, due to the non-commuting nature of the platform group, some “natural” constraints on the power matrices arise. We think that this fact complicates the cryptanalysis of our proposal. We demonstrate that the newly defined symmetric cipher possesses are perfectly secure as they were previously done for the commuting platform group. Furthermore, we show that the same secret key can be used multiple times to encrypt several plaintexts without loss of security. Relying on the proven properties we construct the cipher block chaining mode of the initial cipher and show that it can withstand an adaptive chosen plaintext attack. |
|---|---|
| AbstractList | Commonly modern symmetric encryption schemes (e.g. AES) use rather simple actions repeated many times by defining several rounds to calculate the ciphertext. An idea we previously offered was to trade these multiple repeats for one non-linear operation. Recently we proposed a perfectly secure symmetric encryption scheme based on the matrix power function (MPF). However, the platform group we used was commuting. In this paper, we use a non-commuting group whose cardinality is a power of 2 as a platform for MPF. Due to the convenient cardinality value, our scheme is more suitable for practical implementation. Moreover, due to the non-commuting nature of the platform group, some “natural” constraints on the power matrices arise. We think that this fact complicates the cryptanalysis of our proposal. We demonstrate that the newly defined symmetric cipher possesses are perfectly secure as they were previously done for the commuting platform group. Furthermore, we show that the same secret key can be used multiple times to encrypt several plaintexts without loss of security. Relying on the proven properties we construct the cipher block chaining mode of the initial cipher and show that it can withstand an adaptive chosen plaintext attack. |
| Author | Sakalauskas, Eligijus Levinskas, Matas Mihalkovich, Aleksejus Dindiene, Lina |
| Author_xml | – sequence: 1 givenname: Aleksejus orcidid: 0000-0002-8661-3021 surname: Mihalkovich fullname: Mihalkovich, Aleksejus organization: , Studentu str. 50-324 – sequence: 2 givenname: Matas surname: Levinskas fullname: Levinskas, Matas organization: , Studentu str. 50-324 – sequence: 3 givenname: Lina surname: Dindiene fullname: Dindiene, Lina organization: , Studentu str. 50-324 – sequence: 4 givenname: Eligijus orcidid: 0000-0002-4620-4469 surname: Sakalauskas fullname: Sakalauskas, Eligijus organization: , Studentu str. 50-324 |
| BookMark | eNptkFtLwzAYhoMouE3v_AEBrwSrSXpIcumqm4Od8HBd0jXZOtqkJq2yf2-wije7-ng_Hh5e3iE41UZLAK4wusNxyNg9IcFsOVm9RJyfgAFmPjMWRadggFjCgojH5BwMndsjFFJOkwFYp-MULkwhoVFwsZ7AsXCygK87ob0cpmWzkxY-SlVq_159-iDg0uggNXXdtaXewnUlWmVsDafWdM0FOFOicvLy947A--TpLX0O5qvpLH2YBxvCSRvEXFGJKMol40JhzBmSNGRJhFEicpUUiuZxHGEqwpwrpSRThUAIsbhABc3DcASC3tvpRhy-RFVljS1rYQ8ZRtnPHBkhWal9NT-H5697vrHmo5Ouzfams9pXzAiNKeIRp9hTtz21scY5K9VR6d_GHr_pcSe28l94lP0GDmF64w |
| Cites_doi | 10.21595/mme.2021.22234 10.3390/sym10110571 10.15388/LMR.A.2018.02 10.2478/s11533-009-0072-x 10.1007/BF01442913 10.3390/sym12091389 10.1002/j.1538-7305.1949.tb00928.x 10.1049/iet-ifs.2019.0333 10.21595/mme.2022.22517 10.3390/sym12050860 |
| ContentType | Journal Article |
| Copyright | 2022 Vilnius University Copyright IOS Press BV 2022 |
| Copyright_xml | – notice: 2022 Vilnius University – notice: Copyright IOS Press BV 2022 |
| DBID | AFRWT AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D ADTOC UNPAY |
| DOI | 10.15388/22-INFOR499 |
| DatabaseName | Sage Journals GOLD Open Access 2024 CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | CrossRef Computer and Information Systems Abstracts |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 2 dbid: AFRWT name: Sage Journals GOLD Open Access 2024 url: http://journals.sagepub.com/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1822-8844 |
| EndPage | 856 |
| ExternalDocumentID | 10.15388/22-infor499 10_15388_22_INFOR499 10.15388_22-INFOR499 |
| GroupedDBID | 4.4 AAOTM ABDBF ABJNI ABUBZ ACGFS ACPQW ACUHS ADMLS ADZMO AENEX AFRWT AJNRN ALMA_UNASSIGNED_HOLDINGS AMVHM CAG COF DU5 EBS EJD ESX FEDTE HZ~ I-F IOS MET MIO MK~ ML~ MV1 NGNOM O9- OK1 TR2 TUS AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D ADTOC UNPAY |
| ID | FETCH-LOGICAL-c292t-59f7e070be89af11980e73864106abf6df7b55417a3b9fffe8fda00085d0d7b33 |
| IEDL.DBID | UNPAY |
| ISSN | 0868-4952 1822-8844 |
| IngestDate | Wed Oct 01 15:28:42 EDT 2025 Sun Jun 29 16:58:26 EDT 2025 Tue Jul 01 01:00:46 EDT 2025 Tue Jun 17 22:29:10 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Keywords | perfect secrecy symmetric cryptography non-commuting cryptography matrix power function |
| Language | English |
| License | This article is distributed under the terms of the Creative Commons Attribution 4.0 License (https://creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work without further permission provided the original work is attributed as specified on the SAGE and Open Access page (https://us.sagepub.com/en-us/nam/open-access-at-sage). http://creativecommons.org/licenses/by/4.0 cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c292t-59f7e070be89af11980e73864106abf6df7b55417a3b9fffe8fda00085d0d7b33 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-4620-4469 0000-0002-8661-3021 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://informatica.vu.lt/journal/INFORMATICA/article/1277/file/pdf |
| PQID | 2757094971 |
| PQPubID | 2048743 |
| PageCount | 24 |
| ParticipantIDs | unpaywall_primary_10_15388_22_infor499 proquest_journals_2757094971 crossref_primary_10_15388_22_INFOR499 sage_journals_10_15388_22_INFOR499 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2022-01-01 |
| PublicationDateYYYYMMDD | 2022-01-01 |
| PublicationDate_xml | – month: 01 year: 2022 text: 2022-01-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | London, England |
| PublicationPlace_xml | – name: London, England – name: Vilnius |
| PublicationTitle | Informatica (Vilnius, Lithuania) |
| PublicationYear | 2022 |
| Publisher | SAGE Publications IOS Press BV |
| Publisher_xml | – name: SAGE Publications – name: IOS Press BV |
| References | Sakalauskas, Mihalkovich 2018; 10 Sylow 1872; 5 Sakalauskas, Dindiene, Kilciauskas, Luksys 2020; 12 Mihalkovich, Levinskas, Makauskas 2022; 8 Michailov 2007; 33 Sakalauskas, Mihalkovich, Uselis 2020; 14 Levinskas, Mihalkovich 2021; 7 Mihalkovich, Sakalauskas, Luksys 2020; 12 Sakalauskas, Luksys 2012; 8 Shannon 1949; 28 Grundman, Smith 2010; 8 Grundman, Smith 2010; 8(5) Mihalkovich 2018; 59 (2022121916251630464_j_infor499_ref_013) 2020; 14 (2022121916251630464_j_infor499_ref_016) 1872; 5 (2022121916251630464_j_infor499_ref_011) 2012; 8 (2022121916251630464_j_infor499_ref_003) 2010; 8(5) (2022121916251630464_j_infor499_ref_006) 2021; 7 (2022121916251630464_j_infor499_ref_008) 2018; 59 (2022121916251630464_j_infor499_ref_009) 2022; 8 2022121916251630464_j_infor499_ref_001 (2022121916251630464_j_infor499_ref_012) 2018; 10 (2022121916251630464_j_infor499_ref_010) 2020; 12 (2022121916251630464_j_infor499_ref_015) 1949; 28 (2022121916251630464_j_infor499_ref_002) 1996 (2022121916251630464_j_infor499_ref_004) 2010; 8 (2022121916251630464_j_infor499_ref_014) 2020; 12 (2022121916251630464_j_infor499_ref_005) 2007 (2022121916251630464_j_infor499_ref_007) 2007; 33 |
| References_xml | – volume: 10 start-page: 571 issue: 11 year: 2018 article-title: MPF problem over modified medial semigroup is NP-complete publication-title: Symmetry – volume: 14 start-page: 410 issue: 4 year: 2020 end-page: 418 article-title: Security analysis of KAP based on enhanced MPF publication-title: IET Information Security – volume: 12 year: 2020 article-title: Key exchange protocol defined over a non-commuting group based on an NP-complete decisional problem publication-title: Symmetry – volume: 8 start-page: 15 issue: 2 year: 2022 end-page: 25 article-title: MPF based symmetric cipher performance comparison to AES and TDES publication-title: Mathematical Models in Engineering – volume: 7 start-page: 50 issue: 3 year: 2021 end-page: 53 article-title: Avalanche effect and bit independence criterion of perfectly secure Shannon cipher based on matrix power publication-title: Mathematical Models in Engineering – volume: 12 start-page: 860 year: 2020 article-title: Perfectly secure Shannon Cipher construction based on the matrix power function publication-title: Symmetry – volume: 5 start-page: 584 year: 1872 end-page: 594 article-title: Théorèmes sur les groupes de substitutions publication-title: Mathematische Annalen – volume: 59 start-page: 7 year: 2018 end-page: 12 article-title: On the associativity property of MPF over M16 publication-title: Lietuvos matematikos rinkinys: Lietuvos matematiku draugijos darbai, Serija A – volume: 8 start-page: 2655 issue: 4 year: 2012 end-page: 2664 article-title: Matrix power function and its application to block cipher s-box construction publication-title: International Journal of Innovative Computing, Information and Control – volume: 28 start-page: 656 issue: 4 year: 1949 end-page: 715 article-title: Communication theory of secrecy systems publication-title: The Bell System Technical Journal – volume: 33 start-page: 1 issue: 1 year: 2007 end-page: 34 article-title: Groups of order 32 as Galois groups publication-title: Serdica Mathematical Journal – volume: 8(5) start-page: 846 year: 2010 end-page: 854 article-title: Galois realizability of groups of order 64 publication-title: Central European Journal of Mathematics – volume: 8 start-page: 244 issue: 2 year: 2010 end-page: 260 article-title: Realizability and automatic realizability of Galois groups of order 32 publication-title: Central European Journal of Mathematics – volume: 7 start-page: 50 issue: 3 year: 2021 ident: 2022121916251630464_j_infor499_ref_006 article-title: Avalanche effect and bit independence criterion of perfectly secure Shannon cipher based on matrix power publication-title: Mathematical Models in Engineering doi: 10.21595/mme.2021.22234 – volume: 33 start-page: 1 issue: 1 year: 2007 ident: 2022121916251630464_j_infor499_ref_007 article-title: Groups of order 32 as Galois groups publication-title: Serdica Mathematical Journal – volume: 10 start-page: 571 issue: 11 year: 2018 ident: 2022121916251630464_j_infor499_ref_012 article-title: MPF problem over modified medial semigroup is NP-complete publication-title: Symmetry doi: 10.3390/sym10110571 – volume: 59 start-page: 7 year: 2018 ident: 2022121916251630464_j_infor499_ref_008 article-title: On the associativity property of MPF over M16 publication-title: Lietuvos matematikos rinkinys: Lietuvos matematiku draugijos darbai, Serija A doi: 10.15388/LMR.A.2018.02 – volume-title: Introduction to Modern Cryptography year: 2007 ident: 2022121916251630464_j_infor499_ref_005 – volume: 8(5) start-page: 846 year: 2010 ident: 2022121916251630464_j_infor499_ref_003 article-title: Galois realizability of groups of order 64 publication-title: Central European Journal of Mathematics – volume: 8 start-page: 244 issue: 2 year: 2010 ident: 2022121916251630464_j_infor499_ref_004 article-title: Realizability and automatic realizability of Galois groups of order 32 publication-title: Central European Journal of Mathematics doi: 10.2478/s11533-009-0072-x – volume: 5 start-page: 584 year: 1872 ident: 2022121916251630464_j_infor499_ref_016 article-title: Théorèmes sur les groupes de substitutions publication-title: Mathematische Annalen doi: 10.1007/BF01442913 – ident: 2022121916251630464_j_infor499_ref_001 – start-page: 2631 volume-title: Proceedings of the American Mathematical Society, AMS ’96 year: 1996 ident: 2022121916251630464_j_infor499_ref_002 – volume: 12 year: 2020 ident: 2022121916251630464_j_infor499_ref_010 article-title: Key exchange protocol defined over a non-commuting group based on an NP-complete decisional problem publication-title: Symmetry doi: 10.3390/sym12091389 – volume: 8 start-page: 2655 issue: 4 year: 2012 ident: 2022121916251630464_j_infor499_ref_011 article-title: Matrix power function and its application to block cipher s-box construction publication-title: International Journal of Innovative Computing, Information and Control – volume: 28 start-page: 656 issue: 4 year: 1949 ident: 2022121916251630464_j_infor499_ref_015 article-title: Communication theory of secrecy systems publication-title: The Bell System Technical Journal doi: 10.1002/j.1538-7305.1949.tb00928.x – volume: 14 start-page: 410 issue: 4 year: 2020 ident: 2022121916251630464_j_infor499_ref_013 article-title: Security analysis of KAP based on enhanced MPF publication-title: IET Information Security doi: 10.1049/iet-ifs.2019.0333 – volume: 8 start-page: 15 issue: 2 year: 2022 ident: 2022121916251630464_j_infor499_ref_009 article-title: MPF based symmetric cipher performance comparison to AES and TDES publication-title: Mathematical Models in Engineering doi: 10.21595/mme.2022.22517 – volume: 12 start-page: 860 year: 2020 ident: 2022121916251630464_j_infor499_ref_014 article-title: Perfectly secure Shannon Cipher construction based on the matrix power function publication-title: Symmetry doi: 10.3390/sym12050860 |
| SSID | ssj0037976 |
| Score | 2.2423618 |
| Snippet | Commonly modern symmetric encryption schemes (e.g. AES) use rather simple actions repeated many times by defining several rounds to calculate the ciphertext.... |
| SourceID | unpaywall proquest crossref sage |
| SourceType | Open Access Repository Aggregation Database Index Database Publisher |
| StartPage | 833 |
| SubjectTerms | Algorithms Commuting Cryptography Encryption Mathematical analysis |
| SummonAdditionalLinks | – databaseName: Sage Journals GOLD Open Access 2024 dbid: AFRWT link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JTsMwEB1Be4ALO6JsshBwC2qcpk5OCApVQWqpWAS3yK5tAWpTBKkQf89MElNAHLgmke2M7fF7s3gA9utK-6EOyT9oBkhQAunFzVB4ihvDG7IZFEE03V6zc9e4fAgfZuDZ5cKUEnw7orAqHFGurGl3kzW6qNcTIGdDBnXRQ5qEeP14ko2SwtLtCmrQE3JNT0bk1R5QLOSH5zLbZqHKBbKiClRP2tf3t05vByLOS9Ehxo88pA28DJP_3d_PA2yKSsss_blJ-iI_3uVw-O2cai_BQgkw2UmxIpZhxqQrsOiKN7ByL69Cv3XaYlQJjY0t6_bb7BTPM81uHmWajlPWeqL7BtiZsQhDNbvCn2OS9capl6eUULA06w9lRpiX5QasNbhrn9-2Ol5ZXsEb8JhnXhhbYXDHKxPF0vp-HNUNlQBtIEuUyja1FQrBhi9koGJrrYmsljlG03UtVBCsQwUHZDaAhdyQNvAN17bh-yZSui5JjVqBeEVGNThwMkteils0EmIfJNuE88TJtgbbTqCJWwkJzpZAEhoLvwZ7JOTpq7_bOPyagj87y2-kxQ83_9PaFsxzSnjIjS7bUMleJ2YHYUimdsv18wksrtg7 priority: 102 providerName: SAGE Publications |
| Title | CBC Mode of MPF Based Shannon Cipher Defined Over a Non-Commuting Platform Group |
| URI | https://journals.sagepub.com/doi/full/10.15388/22-INFOR499 https://www.proquest.com/docview/2757094971 https://informatica.vu.lt/journal/INFORMATICA/article/1277/file/pdf |
| UnpaywallVersion | publishedVersion |
| Volume | 33 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: EBSCOhost Academic Search Ultimate customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn eissn: 1822-8844 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0037976 issn: 0868-4952 databaseCode: ABDBF dateStart: 20040301 isFulltext: true titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn providerName: EBSCOhost – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1822-8844 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0037976 issn: 0868-4952 databaseCode: ADMLS dateStart: 20040101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVEBS databaseName: Mathematics Source customDbUrl: eissn: 1822-8844 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0037976 issn: 0868-4952 databaseCode: AMVHM dateStart: 20040301 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/mathematics-source providerName: EBSCOhost |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3db9MwED-N9gFeNj5F2ZgsBLylqZ0PJ49pRrQhtVTQivEU2bUtplVpNdIh-Os5u842oT0g8RQpjmL7zr77nX0fAG9HUtFEJfZ-UC_RQIlEkKcJDyTTmsUijXZONJNperqIP54n53tQ3sTCNB6roT1_vR2u2tDTNDybolk0KeZnZRF6qoaUcR7aBEbhRpkH0E8TBOQ96C-ms-Kbw49pFqAJ4O48URUGWRbH3v0dd3oW4ivXY-xyv95RTLdo00ffP9w2G_Hrp1it7uif6gBUN_Kd28nlcNvK4fL3X0kd_3Nqj2Hf41NS7NqfwJ5unsJBV_uBeFHwDGbluCS2kBpZGzKZVWSM6lCRL99F06wbUl7YdAXkRBtEsYp8wg1DBJmum8BFpFhfazJbidaOlbjzr-ewqD7My9PAV2cIlixnbZDkhmsUGFJnuTCU5tlI2wqiMRqZQppUGS4Rq1AuIpkbY3RmlHAQT40Ul1H0Ano4IP0SSMK0FSZUM2ViSnUm1UhYKWw4wh2RDeBdx5p6s0vCUVvjxbKwZqx29EMWDuCo41vtafujZjzhaMPmnA7gjeXlbdP9_3h_w-l7O-vWy6t__fAQHjEbM-HObY6g115t9WtEMq08hn4xPhlX9ll9_jo_9iv3DxNZ8p8 |
| linkProvider | Unpaywall |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFH9BOODFbyOK2hj1NmXdSrcjoAQUkChEbktL22hCgCjE-N_7OjZRw8Hztq55r6_v92vfB8B5SSqXKWbvB_UQCYonnLDMuCOp1tQXZW8RRNPulBt9_27ABhlgaS5MIsH3KxtWhTOKN-vUutE4g2skT80OMiSE6muQ8xk67SzkKvXH5166BXs8jLvKIVwPHGQANIl4__v9b1-0BJhJwn1-Pp6Kzw8xGv1wOfUt2EiwIqkslLsNGT3egc20DwNJzHIXurVqjdimZmRiSLtbJ1V0TYo8vYgxkntSe7WlA8iNNogoFXnAxUsE6UzGTpwdYuOeSXckZha-kvgsag_69dtereEknRKcIQ3pzGGh4RqNV-ogFMZ1w6CkbTdPHwmfkKasDJeIG1wuPBkaY3RglIjhliopLj1vH7I4IX0AhFFtDdvVVBnfdXUgVUnYHdFwhB4iKMBFKrNouiiIEVkiYWUbURqlsi1AMRVolCo1opxx5JMhdwtwZoW8fLR6jMtvFaz8WVxcFl88_M9op5Bv9NqtqNXs3B_BOrV5DPFZShGys7e5PkZ0MZMnyVr6AjLexZk |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JTsMwELWglYALO6JQwELALShxFifHLkQt0BJBK7hFdm0LpCqtIBXi7xlnoQX1wDmJY409M-_ZYz-ELkwuLFe4en9QjoCg2MwIPJcanEhJHObZeRFNr-91hs7ti_uyIPVVWPDjWpdVQY-yYK29eypULtdjA2UDAtXtA0sCuL6KqsBobOBd1Ub4-Dwow7BNg0xZDiC7bwALIEXV-9_vf-ejOcgsDt2vz5Ip-_pk4_FC2gm30WaBF3EjH-AdtCKTXbRVajHgwjX3UNRqtrAWNsMThXtRiJuQngR-emUJEHzcetPXB-C2VIAqBX6ACYwZ7k8SIzshomufcTRmqYawOFuP2kfD8GbQ6hiFWoIxIgFJDTdQVIIDc-kHTFlW4JtSK3o6QPoYV55QlAN2sCizeaCUkr4SLINcwhSU2_YBqkCH5CHCLpHauS1JhHIsS_pcmExHRUUBfjC_hi5Lm8XT_FKMWJMJbduYkLi0bQ3VS4PG5cDGhLoUOGVArRo610aeP1rextXPECz9WXbBLLx49J_WztBa1A7j-27_7hhtEH2UIVtOqaNK-j6TJwAwUn5aTKVvWY3Gsg |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dT9swED-x8sBeYJ-ijCFr2nhLUzsfdh5LoIJJ7SpBJXiK7NrWJqq0ghS0_fU7uw6giQekvcZRfLmz735n3wfA177SNNOZux80M3RQEhkVecYjxYxhqcyTdRDNaJyfTtPvl9nlBpQPuTB1wGroz9-tevMmDjyNz8boFo0GF2flIA5cjSnjPHYFjOKltq9gM88QkHdgczqeDK48fsxFhC6Av_NEUxgJkaYh_B13uojxkZ8x9bVfnximR7QZsu-3VvVS_r6X8_kT-zPcAd1Svg47ue6tGtWb_fmnqON__tob2A74lAzW429hw9TvYKft_UCCKngPk_KoJK6RGllYMpoMyRGaQ03Of8q6XtSk_OXKFZBjYxHFavIDNwyRZLyoI5-R4mKtyWQuG0cr8edfH2A6PLkoT6PQnSGasYI1UVZYblBhKCMKaSktRN-4DqIpOplS2VxbrhCrUC4TVVhrjbBaeoin-5qrJPkIHSTI7ALJmHHKhBqmbUqpEUr3pdPCliPckaIL31rRVMt1EY7KOS9OhBVjlecfirAL-63cqsDb24rxjKMPW3DahS9Olo9Dz3_j8EHSz07Wrpe9l774CV4zlzPhz232odPcrMxnRDKNOggr9S8GbO-G |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=CBC+Mode+of+MPF+Based+Shannon+Cipher+Defined+Over+a+Non-Commuting+Platform+Group&rft.jtitle=Informatica+%28Vilnius%2C+Lithuania%29&rft.au=Mihalkovich%2C+Aleksejus&rft.au=Levinskas%2C+Matas&rft.au=Dindiene%2C+Lina&rft.au=Sakalauskas%2C+Eligijus&rft.date=2022-01-01&rft.pub=SAGE+Publications&rft.issn=0868-4952&rft.eissn=1822-8844&rft.volume=33&rft.issue=4&rft.spage=833&rft.epage=856&rft_id=info:doi/10.15388%2F22-INFOR499&rft.externalDocID=10.15388_22-INFOR499 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0868-4952&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0868-4952&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0868-4952&client=summon |