Cryptography is a mix of mathematical rigor
with disorder, whereas without disorder
mathematical rigor can be used against you.

Jan Cassells
]RUSSIAN[ AUTHOR’S RECOMMENDATIONS

Stochastic Technology and Cryptography.
Stream and Block Ciphers

With the introduction of computer technology, Stream and Block Cipher algorithms (Encryption, RACH) have become widely used.
Stream Cipher algorithms (Stream Cipher) are based on the principles of overlapping of the gamma block on the block containing classified information. Gamma blocks are formed on the basis of cryptographically strong Pseudorandom Number Generators (Random Generator, Randomization Generator, RAGN).
Block Cipher algorithms (Block Cipher) are based on a mutually reversible cryptographic transformation of a data block that includes one or more repeatedly performed One-Sided Functions.
As practice shows, the most popular encryption algorithms rely on fundamental algebraic basis. Other approaches, eventually, turn into failure.

Comparative analysis of Stream and Block Cipher algorithms shows a paradoxical situation, which consists in the fact that simpler Stream Cipher algorithms are inferior in performance to Block Cipher algorithms. The main reason for this is that the gamma block is usually represented by one bit, formed per cycle of the generator operation whereas the cryptographic transformation – by a sufficiently long block (64, 128, 256 bits), which greatly increases the efficiency of Block Ciphers.

With the discovery of a new algebraic basis provided by Pre-Arithmetic (Prearithmetic), and with it the development of Stochastic Technologies (Random Method, Stochastic Method), as well as Stochastic Systems and Stochastic Cryptography (Minimalistic Cryptography, Light-Weight Cryptography), the situation changes drastically.
With the introduction of the Random Method representing symmetric cryptography (Randomization Method, Stochastic Method), as well as of the Regular Random Method, and Non-Regular Random Method, it is possible to produce encrypting gamma blocks of arbitrarily length. As a result, Stream Ciphers, constructed on the basis of Random methods, have a huge advantage over Block Ciphers in performance, hardware cost and power consumption.

PATENTS, ANALYTICS and ANALYSIS

Cryptographic primitives, introduced by the stochastic technologies and the Random Method, do not affect the cryptographic strength when they are open for review if, of course, it does not contradict commercial interests. They are transparent to examination, have an overwhelming advantage in all respects over the well-known counterparts, yield new results and create real conditions for bringing encryption algorithms to a qualitatively new level.
Stream Cipher algorithms, represented by the Regular and Non-Regular Random Method, are well developed (see results of the analysis).
Block Cipher algorithms are based on the Non-Regular Random method, and according to preliminary research results, can successfully compete with the best and most promising approaches to date.

Igor Kulakov, Игорь Кулаков