CBC Mode of MPF Based Shannon Cipher Defined Over a Non-Commuting Platform Group

Commonly modern symmetric encryption schemes (e.g. AES) use rather simple actions repeated many times by defining several rounds to calculate the ciphertext. An idea we previously offered was to trade these multiple repeats for one non-linear operation. Recently we proposed a perfectly secure symmet...

Full description

Saved in:
Bibliographic Details
Published inInformatica (Vilnius, Lithuania) Vol. 33; no. 4; pp. 833 - 856
Main Authors Mihalkovich, Aleksejus, Levinskas, Matas, Dindiene, Lina, Sakalauskas, Eligijus
Format Journal Article
LanguageEnglish
Published London, England SAGE Publications 01.01.2022
IOS Press BV
Subjects
Online AccessGet full text
ISSN0868-4952
1822-8844
1822-8844
DOI10.15388/22-INFOR499

Cover

Abstract Commonly modern symmetric encryption schemes (e.g. AES) use rather simple actions repeated many times by defining several rounds to calculate the ciphertext. An idea we previously offered was to trade these multiple repeats for one non-linear operation. Recently we proposed a perfectly secure symmetric encryption scheme based on the matrix power function (MPF). However, the platform group we used was commuting. In this paper, we use a non-commuting group whose cardinality is a power of 2 as a platform for MPF. Due to the convenient cardinality value, our scheme is more suitable for practical implementation. Moreover, due to the non-commuting nature of the platform group, some “natural” constraints on the power matrices arise. We think that this fact complicates the cryptanalysis of our proposal. We demonstrate that the newly defined symmetric cipher possesses are perfectly secure as they were previously done for the commuting platform group. Furthermore, we show that the same secret key can be used multiple times to encrypt several plaintexts without loss of security. Relying on the proven properties we construct the cipher block chaining mode of the initial cipher and show that it can withstand an adaptive chosen plaintext attack.
AbstractList Commonly modern symmetric encryption schemes (e.g. AES) use rather simple actions repeated many times by defining several rounds to calculate the ciphertext. An idea we previously offered was to trade these multiple repeats for one non-linear operation. Recently we proposed a perfectly secure symmetric encryption scheme based on the matrix power function (MPF). However, the platform group we used was commuting. In this paper, we use a non-commuting group whose cardinality is a power of 2 as a platform for MPF. Due to the convenient cardinality value, our scheme is more suitable for practical implementation. Moreover, due to the non-commuting nature of the platform group, some “natural” constraints on the power matrices arise. We think that this fact complicates the cryptanalysis of our proposal. We demonstrate that the newly defined symmetric cipher possesses are perfectly secure as they were previously done for the commuting platform group. Furthermore, we show that the same secret key can be used multiple times to encrypt several plaintexts without loss of security. Relying on the proven properties we construct the cipher block chaining mode of the initial cipher and show that it can withstand an adaptive chosen plaintext attack.
Author Sakalauskas, Eligijus
Levinskas, Matas
Mihalkovich, Aleksejus
Dindiene, Lina
Author_xml – sequence: 1
  givenname: Aleksejus
  orcidid: 0000-0002-8661-3021
  surname: Mihalkovich
  fullname: Mihalkovich, Aleksejus
  organization: , Studentu str. 50-324
– sequence: 2
  givenname: Matas
  surname: Levinskas
  fullname: Levinskas, Matas
  organization: , Studentu str. 50-324
– sequence: 3
  givenname: Lina
  surname: Dindiene
  fullname: Dindiene, Lina
  organization: , Studentu str. 50-324
– sequence: 4
  givenname: Eligijus
  orcidid: 0000-0002-4620-4469
  surname: Sakalauskas
  fullname: Sakalauskas, Eligijus
  organization: , Studentu str. 50-324
BookMark eNptkFtLwzAYhoMouE3v_AEBrwSrSXpIcumqm4Od8HBd0jXZOtqkJq2yf2-wije7-ng_Hh5e3iE41UZLAK4wusNxyNg9IcFsOVm9RJyfgAFmPjMWRadggFjCgojH5BwMndsjFFJOkwFYp-MULkwhoVFwsZ7AsXCygK87ob0cpmWzkxY-SlVq_159-iDg0uggNXXdtaXewnUlWmVsDafWdM0FOFOicvLy947A--TpLX0O5qvpLH2YBxvCSRvEXFGJKMol40JhzBmSNGRJhFEicpUUiuZxHGEqwpwrpSRThUAIsbhABc3DcASC3tvpRhy-RFVljS1rYQ8ZRtnPHBkhWal9NT-H5697vrHmo5Ouzfams9pXzAiNKeIRp9hTtz21scY5K9VR6d_GHr_pcSe28l94lP0GDmF64w
Cites_doi 10.21595/mme.2021.22234
10.3390/sym10110571
10.15388/LMR.A.2018.02
10.2478/s11533-009-0072-x
10.1007/BF01442913
10.3390/sym12091389
10.1002/j.1538-7305.1949.tb00928.x
10.1049/iet-ifs.2019.0333
10.21595/mme.2022.22517
10.3390/sym12050860
ContentType Journal Article
Copyright 2022 Vilnius University
Copyright IOS Press BV 2022
Copyright_xml – notice: 2022 Vilnius University
– notice: Copyright IOS Press BV 2022
DBID AFRWT
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
DOI 10.15388/22-INFOR499
DatabaseName Sage Journals GOLD Open Access 2024
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef

Computer and Information Systems Abstracts
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 2
  dbid: AFRWT
  name: Sage Journals GOLD Open Access 2024
  url: http://journals.sagepub.com/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1822-8844
EndPage 856
ExternalDocumentID 10.15388/22-infor499
10_15388_22_INFOR499
10.15388_22-INFOR499
GroupedDBID 4.4
AAOTM
ABDBF
ABJNI
ABUBZ
ACGFS
ACPQW
ACUHS
ADMLS
ADZMO
AENEX
AFRWT
AJNRN
ALMA_UNASSIGNED_HOLDINGS
AMVHM
CAG
COF
DU5
EBS
EJD
ESX
FEDTE
HZ~
I-F
IOS
MET
MIO
MK~
ML~
MV1
NGNOM
O9-
OK1
TR2
TUS
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
ID FETCH-LOGICAL-c292t-59f7e070be89af11980e73864106abf6df7b55417a3b9fffe8fda00085d0d7b33
IEDL.DBID UNPAY
ISSN 0868-4952
1822-8844
IngestDate Wed Oct 01 15:28:42 EDT 2025
Sun Jun 29 16:58:26 EDT 2025
Tue Jul 01 01:00:46 EDT 2025
Tue Jun 17 22:29:10 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords perfect secrecy
symmetric cryptography
non-commuting cryptography
matrix power function
Language English
License This article is distributed under the terms of the Creative Commons Attribution 4.0 License (https://creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work without further permission provided the original work is attributed as specified on the SAGE and Open Access page (https://us.sagepub.com/en-us/nam/open-access-at-sage).
http://creativecommons.org/licenses/by/4.0
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c292t-59f7e070be89af11980e73864106abf6df7b55417a3b9fffe8fda00085d0d7b33
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-4620-4469
0000-0002-8661-3021
OpenAccessLink https://proxy.k.utb.cz/login?url=https://informatica.vu.lt/journal/INFORMATICA/article/1277/file/pdf
PQID 2757094971
PQPubID 2048743
PageCount 24
ParticipantIDs unpaywall_primary_10_15388_22_infor499
proquest_journals_2757094971
crossref_primary_10_15388_22_INFOR499
sage_journals_10_15388_22_INFOR499
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-01-01
PublicationDateYYYYMMDD 2022-01-01
PublicationDate_xml – month: 01
  year: 2022
  text: 2022-01-01
  day: 01
PublicationDecade 2020
PublicationPlace London, England
PublicationPlace_xml – name: London, England
– name: Vilnius
PublicationTitle Informatica (Vilnius, Lithuania)
PublicationYear 2022
Publisher SAGE Publications
IOS Press BV
Publisher_xml – name: SAGE Publications
– name: IOS Press BV
References Sakalauskas, Mihalkovich 2018; 10
Sylow 1872; 5
Sakalauskas, Dindiene, Kilciauskas, Luksys 2020; 12
Mihalkovich, Levinskas, Makauskas 2022; 8
Michailov 2007; 33
Sakalauskas, Mihalkovich, Uselis 2020; 14
Levinskas, Mihalkovich 2021; 7
Mihalkovich, Sakalauskas, Luksys 2020; 12
Sakalauskas, Luksys 2012; 8
Shannon 1949; 28
Grundman, Smith 2010; 8
Grundman, Smith 2010; 8(5)
Mihalkovich 2018; 59
(2022121916251630464_j_infor499_ref_013) 2020; 14
(2022121916251630464_j_infor499_ref_016) 1872; 5
(2022121916251630464_j_infor499_ref_011) 2012; 8
(2022121916251630464_j_infor499_ref_003) 2010; 8(5)
(2022121916251630464_j_infor499_ref_006) 2021; 7
(2022121916251630464_j_infor499_ref_008) 2018; 59
(2022121916251630464_j_infor499_ref_009) 2022; 8
2022121916251630464_j_infor499_ref_001
(2022121916251630464_j_infor499_ref_012) 2018; 10
(2022121916251630464_j_infor499_ref_010) 2020; 12
(2022121916251630464_j_infor499_ref_015) 1949; 28
(2022121916251630464_j_infor499_ref_002) 1996
(2022121916251630464_j_infor499_ref_004) 2010; 8
(2022121916251630464_j_infor499_ref_014) 2020; 12
(2022121916251630464_j_infor499_ref_005) 2007
(2022121916251630464_j_infor499_ref_007) 2007; 33
References_xml – volume: 10
  start-page: 571
  issue: 11
  year: 2018
  article-title: MPF problem over modified medial semigroup is NP-complete
  publication-title: Symmetry
– volume: 14
  start-page: 410
  issue: 4
  year: 2020
  end-page: 418
  article-title: Security analysis of KAP based on enhanced MPF
  publication-title: IET Information Security
– volume: 12
  year: 2020
  article-title: Key exchange protocol defined over a non-commuting group based on an NP-complete decisional problem
  publication-title: Symmetry
– volume: 8
  start-page: 15
  issue: 2
  year: 2022
  end-page: 25
  article-title: MPF based symmetric cipher performance comparison to AES and TDES
  publication-title: Mathematical Models in Engineering
– volume: 7
  start-page: 50
  issue: 3
  year: 2021
  end-page: 53
  article-title: Avalanche effect and bit independence criterion of perfectly secure Shannon cipher based on matrix power
  publication-title: Mathematical Models in Engineering
– volume: 12
  start-page: 860
  year: 2020
  article-title: Perfectly secure Shannon Cipher construction based on the matrix power function
  publication-title: Symmetry
– volume: 5
  start-page: 584
  year: 1872
  end-page: 594
  article-title: Théorèmes sur les groupes de substitutions
  publication-title: Mathematische Annalen
– volume: 59
  start-page: 7
  year: 2018
  end-page: 12
  article-title: On the associativity property of MPF over M16
  publication-title: Lietuvos matematikos rinkinys: Lietuvos matematiku draugijos darbai, Serija A
– volume: 8
  start-page: 2655
  issue: 4
  year: 2012
  end-page: 2664
  article-title: Matrix power function and its application to block cipher s-box construction
  publication-title: International Journal of Innovative Computing, Information and Control
– volume: 28
  start-page: 656
  issue: 4
  year: 1949
  end-page: 715
  article-title: Communication theory of secrecy systems
  publication-title: The Bell System Technical Journal
– volume: 33
  start-page: 1
  issue: 1
  year: 2007
  end-page: 34
  article-title: Groups of order 32 as Galois groups
  publication-title: Serdica Mathematical Journal
– volume: 8(5)
  start-page: 846
  year: 2010
  end-page: 854
  article-title: Galois realizability of groups of order 64
  publication-title: Central European Journal of Mathematics
– volume: 8
  start-page: 244
  issue: 2
  year: 2010
  end-page: 260
  article-title: Realizability and automatic realizability of Galois groups of order 32
  publication-title: Central European Journal of Mathematics
– volume: 7
  start-page: 50
  issue: 3
  year: 2021
  ident: 2022121916251630464_j_infor499_ref_006
  article-title: Avalanche effect and bit independence criterion of perfectly secure Shannon cipher based on matrix power
  publication-title: Mathematical Models in Engineering
  doi: 10.21595/mme.2021.22234
– volume: 33
  start-page: 1
  issue: 1
  year: 2007
  ident: 2022121916251630464_j_infor499_ref_007
  article-title: Groups of order 32 as Galois groups
  publication-title: Serdica Mathematical Journal
– volume: 10
  start-page: 571
  issue: 11
  year: 2018
  ident: 2022121916251630464_j_infor499_ref_012
  article-title: MPF problem over modified medial semigroup is NP-complete
  publication-title: Symmetry
  doi: 10.3390/sym10110571
– volume: 59
  start-page: 7
  year: 2018
  ident: 2022121916251630464_j_infor499_ref_008
  article-title: On the associativity property of MPF over M16
  publication-title: Lietuvos matematikos rinkinys: Lietuvos matematiku draugijos darbai, Serija A
  doi: 10.15388/LMR.A.2018.02
– volume-title: Introduction to Modern Cryptography
  year: 2007
  ident: 2022121916251630464_j_infor499_ref_005
– volume: 8(5)
  start-page: 846
  year: 2010
  ident: 2022121916251630464_j_infor499_ref_003
  article-title: Galois realizability of groups of order 64
  publication-title: Central European Journal of Mathematics
– volume: 8
  start-page: 244
  issue: 2
  year: 2010
  ident: 2022121916251630464_j_infor499_ref_004
  article-title: Realizability and automatic realizability of Galois groups of order 32
  publication-title: Central European Journal of Mathematics
  doi: 10.2478/s11533-009-0072-x
– volume: 5
  start-page: 584
  year: 1872
  ident: 2022121916251630464_j_infor499_ref_016
  article-title: Théorèmes sur les groupes de substitutions
  publication-title: Mathematische Annalen
  doi: 10.1007/BF01442913
– ident: 2022121916251630464_j_infor499_ref_001
– start-page: 2631
  volume-title: Proceedings of the American Mathematical Society, AMS ’96
  year: 1996
  ident: 2022121916251630464_j_infor499_ref_002
– volume: 12
  year: 2020
  ident: 2022121916251630464_j_infor499_ref_010
  article-title: Key exchange protocol defined over a non-commuting group based on an NP-complete decisional problem
  publication-title: Symmetry
  doi: 10.3390/sym12091389
– volume: 8
  start-page: 2655
  issue: 4
  year: 2012
  ident: 2022121916251630464_j_infor499_ref_011
  article-title: Matrix power function and its application to block cipher s-box construction
  publication-title: International Journal of Innovative Computing, Information and Control
– volume: 28
  start-page: 656
  issue: 4
  year: 1949
  ident: 2022121916251630464_j_infor499_ref_015
  article-title: Communication theory of secrecy systems
  publication-title: The Bell System Technical Journal
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– volume: 14
  start-page: 410
  issue: 4
  year: 2020
  ident: 2022121916251630464_j_infor499_ref_013
  article-title: Security analysis of KAP based on enhanced MPF
  publication-title: IET Information Security
  doi: 10.1049/iet-ifs.2019.0333
– volume: 8
  start-page: 15
  issue: 2
  year: 2022
  ident: 2022121916251630464_j_infor499_ref_009
  article-title: MPF based symmetric cipher performance comparison to AES and TDES
  publication-title: Mathematical Models in Engineering
  doi: 10.21595/mme.2022.22517
– volume: 12
  start-page: 860
  year: 2020
  ident: 2022121916251630464_j_infor499_ref_014
  article-title: Perfectly secure Shannon Cipher construction based on the matrix power function
  publication-title: Symmetry
  doi: 10.3390/sym12050860
SSID ssj0037976
Score 2.2423618
Snippet Commonly modern symmetric encryption schemes (e.g. AES) use rather simple actions repeated many times by defining several rounds to calculate the ciphertext....
SourceID unpaywall
proquest
crossref
sage
SourceType Open Access Repository
Aggregation Database
Index Database
Publisher
StartPage 833
SubjectTerms Algorithms
Commuting
Cryptography
Encryption
Mathematical analysis
SummonAdditionalLinks – databaseName: Sage Journals GOLD Open Access 2024
  dbid: AFRWT
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JTsMwEB1Be4ALO6JsshBwC2qcpk5OCApVQWqpWAS3yK5tAWpTBKkQf89MElNAHLgmke2M7fF7s3gA9utK-6EOyT9oBkhQAunFzVB4ihvDG7IZFEE03V6zc9e4fAgfZuDZ5cKUEnw7orAqHFGurGl3kzW6qNcTIGdDBnXRQ5qEeP14ko2SwtLtCmrQE3JNT0bk1R5QLOSH5zLbZqHKBbKiClRP2tf3t05vByLOS9Ehxo88pA28DJP_3d_PA2yKSsss_blJ-iI_3uVw-O2cai_BQgkw2UmxIpZhxqQrsOiKN7ByL69Cv3XaYlQJjY0t6_bb7BTPM81uHmWajlPWeqL7BtiZsQhDNbvCn2OS9capl6eUULA06w9lRpiX5QasNbhrn9-2Ol5ZXsEb8JhnXhhbYXDHKxPF0vp-HNUNlQBtIEuUyja1FQrBhi9koGJrrYmsljlG03UtVBCsQwUHZDaAhdyQNvAN17bh-yZSui5JjVqBeEVGNThwMkteils0EmIfJNuE88TJtgbbTqCJWwkJzpZAEhoLvwZ7JOTpq7_bOPyagj87y2-kxQ83_9PaFsxzSnjIjS7bUMleJ2YHYUimdsv18wksrtg7
  priority: 102
  providerName: SAGE Publications
Title CBC Mode of MPF Based Shannon Cipher Defined Over a Non-Commuting Platform Group
URI https://journals.sagepub.com/doi/full/10.15388/22-INFOR499
https://www.proquest.com/docview/2757094971
https://informatica.vu.lt/journal/INFORMATICA/article/1277/file/pdf
UnpaywallVersion publishedVersion
Volume 33
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: EBSCOhost Academic Search Ultimate
  customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn
  eissn: 1822-8844
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0037976
  issn: 0868-4952
  databaseCode: ABDBF
  dateStart: 20040301
  isFulltext: true
  titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn
  providerName: EBSCOhost
– providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1822-8844
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0037976
  issn: 0868-4952
  databaseCode: ADMLS
  dateStart: 20040101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVEBS
  databaseName: Mathematics Source
  customDbUrl:
  eissn: 1822-8844
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0037976
  issn: 0868-4952
  databaseCode: AMVHM
  dateStart: 20040301
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/mathematics-source
  providerName: EBSCOhost
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3db9MwED-N9gFeNj5F2ZgsBLylqZ0PJ49pRrQhtVTQivEU2bUtplVpNdIh-Os5u842oT0g8RQpjmL7zr77nX0fAG9HUtFEJfZ-UC_RQIlEkKcJDyTTmsUijXZONJNperqIP54n53tQ3sTCNB6roT1_vR2u2tDTNDybolk0KeZnZRF6qoaUcR7aBEbhRpkH0E8TBOQ96C-ms-Kbw49pFqAJ4O48URUGWRbH3v0dd3oW4ivXY-xyv95RTLdo00ffP9w2G_Hrp1it7uif6gBUN_Kd28nlcNvK4fL3X0kd_3Nqj2Hf41NS7NqfwJ5unsJBV_uBeFHwDGbluCS2kBpZGzKZVWSM6lCRL99F06wbUl7YdAXkRBtEsYp8wg1DBJmum8BFpFhfazJbidaOlbjzr-ewqD7My9PAV2cIlixnbZDkhmsUGFJnuTCU5tlI2wqiMRqZQppUGS4Rq1AuIpkbY3RmlHAQT40Ul1H0Ano4IP0SSMK0FSZUM2ViSnUm1UhYKWw4wh2RDeBdx5p6s0vCUVvjxbKwZqx29EMWDuCo41vtafujZjzhaMPmnA7gjeXlbdP9_3h_w-l7O-vWy6t__fAQHjEbM-HObY6g115t9WtEMq08hn4xPhlX9ll9_jo_9iv3DxNZ8p8
linkProvider Unpaywall
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFH9BOODFbyOK2hj1NmXdSrcjoAQUkChEbktL22hCgCjE-N_7OjZRw8Hztq55r6_v92vfB8B5SSqXKWbvB_UQCYonnLDMuCOp1tQXZW8RRNPulBt9_27ABhlgaS5MIsH3KxtWhTOKN-vUutE4g2skT80OMiSE6muQ8xk67SzkKvXH5166BXs8jLvKIVwPHGQANIl4__v9b1-0BJhJwn1-Pp6Kzw8xGv1wOfUt2EiwIqkslLsNGT3egc20DwNJzHIXurVqjdimZmRiSLtbJ1V0TYo8vYgxkntSe7WlA8iNNogoFXnAxUsE6UzGTpwdYuOeSXckZha-kvgsag_69dtereEknRKcIQ3pzGGh4RqNV-ogFMZ1w6CkbTdPHwmfkKasDJeIG1wuPBkaY3RglIjhliopLj1vH7I4IX0AhFFtDdvVVBnfdXUgVUnYHdFwhB4iKMBFKrNouiiIEVkiYWUbURqlsi1AMRVolCo1opxx5JMhdwtwZoW8fLR6jMtvFaz8WVxcFl88_M9op5Bv9NqtqNXs3B_BOrV5DPFZShGys7e5PkZ0MZMnyVr6AjLexZk
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JTsMwELWglYALO6JQwELALShxFifHLkQt0BJBK7hFdm0LpCqtIBXi7xlnoQX1wDmJY409M-_ZYz-ELkwuLFe4en9QjoCg2MwIPJcanEhJHObZeRFNr-91hs7ti_uyIPVVWPDjWpdVQY-yYK29eypULtdjA2UDAtXtA0sCuL6KqsBobOBd1Ub4-Dwow7BNg0xZDiC7bwALIEXV-9_vf-ejOcgsDt2vz5Ip-_pk4_FC2gm30WaBF3EjH-AdtCKTXbRVajHgwjX3UNRqtrAWNsMThXtRiJuQngR-emUJEHzcetPXB-C2VIAqBX6ACYwZ7k8SIzshomufcTRmqYawOFuP2kfD8GbQ6hiFWoIxIgFJDTdQVIIDc-kHTFlW4JtSK3o6QPoYV55QlAN2sCizeaCUkr4SLINcwhSU2_YBqkCH5CHCLpHauS1JhHIsS_pcmExHRUUBfjC_hi5Lm8XT_FKMWJMJbduYkLi0bQ3VS4PG5cDGhLoUOGVArRo610aeP1rextXPECz9WXbBLLx49J_WztBa1A7j-27_7hhtEH2UIVtOqaNK-j6TJwAwUn5aTKVvWY3Gsg
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dT9swED-x8sBeYJ-ijCFr2nhLUzsfdh5LoIJJ7SpBJXiK7NrWJqq0ghS0_fU7uw6giQekvcZRfLmz735n3wfA177SNNOZux80M3RQEhkVecYjxYxhqcyTdRDNaJyfTtPvl9nlBpQPuTB1wGroz9-tevMmDjyNz8boFo0GF2flIA5cjSnjPHYFjOKltq9gM88QkHdgczqeDK48fsxFhC6Av_NEUxgJkaYh_B13uojxkZ8x9bVfnximR7QZsu-3VvVS_r6X8_kT-zPcAd1Svg47ue6tGtWb_fmnqON__tob2A74lAzW429hw9TvYKft_UCCKngPk_KoJK6RGllYMpoMyRGaQ03Of8q6XtSk_OXKFZBjYxHFavIDNwyRZLyoI5-R4mKtyWQuG0cr8edfH2A6PLkoT6PQnSGasYI1UVZYblBhKCMKaSktRN-4DqIpOplS2VxbrhCrUC4TVVhrjbBaeoin-5qrJPkIHSTI7ALJmHHKhBqmbUqpEUr3pdPCliPckaIL31rRVMt1EY7KOS9OhBVjlecfirAL-63cqsDb24rxjKMPW3DahS9Olo9Dz3_j8EHSz07Wrpe9l774CV4zlzPhz232odPcrMxnRDKNOggr9S8GbO-G
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=CBC+Mode+of+MPF+Based+Shannon+Cipher+Defined+Over+a+Non-Commuting+Platform+Group&rft.jtitle=Informatica+%28Vilnius%2C+Lithuania%29&rft.au=Mihalkovich%2C+Aleksejus&rft.au=Levinskas%2C+Matas&rft.au=Dindiene%2C+Lina&rft.au=Sakalauskas%2C+Eligijus&rft.date=2022-01-01&rft.pub=SAGE+Publications&rft.issn=0868-4952&rft.eissn=1822-8844&rft.volume=33&rft.issue=4&rft.spage=833&rft.epage=856&rft_id=info:doi/10.15388%2F22-INFOR499&rft.externalDocID=10.15388_22-INFOR499
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0868-4952&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0868-4952&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0868-4952&client=summon