Security is a category that is immeasurably
greater than greatness.

Cardinal Richelieu (1585-1642)

Stochastic Systems and Cryptography.
Security Provision Technology


Strongly pronounced chaotic behavior and properties that are inherent in and produced by Stochastic systems, which are based on a new algebraic basis (Pre-Arithmetic) presented by the Random Method (Randomization Method, Stochastic Method) and having a superior functionality over the Recurrence Method and Galois Fields have been used to create Stochastic cryptography.
Stochastic Cryptography (Minimalistic Cryptography, Light-Weight Cryptography) is the most developed part of Stochastic Technologies (Random Method, Stochastic Method), designed for rapid development and transfer of Security Technologies (Security Provision Technology) to a qualitatively new level, large-scale coverage of segments of the world economy, and the fastest practical results. The latter is due to 20-year-old independent scientific and technological research and development, classified for some time for obvious reasons and being successfully promoted at present (see article – Conference RusCrypto 2006).

Stochastic technologies are based on the Dichotomic Properties inherent in natural phenomena and processes. The technologies cover all sections of Symmetric Cryptography, are open to review not to the detriment of cryptographic resistance. Of course, if it does not conflict with commercial interests, they are transparent to the expertise, have an overwhelming advantage in all respects over the known analogues.
Besides, as reflected in the long-term innovation Program Initiative 2011, Stochastic technologies yield new results, especially in the sphere of Security provisioning of integration platforms and the Internet systems of different assignments, in the field of ultra-wideband (UWB), wireless and adaptive network processing. These technologies make it possible to create Cyber-Systems, including global Cyber-Systems, favour the development of Microsensor (Micro-Sensor, RFID) technology, including nano- and organic technologies, to master new smart- and nano-materials.

Thus, the software implementation of cryptographic primitives, included in the Stochastic technologies, has been brought to the prototypes, based on cryptanalysis models, whereas the hardware implementation has been brought to the circuit solutions, needed to design the topology and manufacture microchips.

As shown by studies performed in the framework of the research since 2004, Stochastic technologies allow one to make an innovative breakthrough in the field of Security Provisioning, RFID techno- logy, and then in the field of microsensor and network technologies (Appendix I). In turn, according to IDTechEx and individual market research and forecasts, it will make it possible to repeatedly increase the social and financial returns of technological market and industrial production, represented by the leaders of the world economy, and to obtain a dominant superiority.
The first step in this direction can be the Pilot Project on Sub- stantiation and Implementation of Minimalist (Low-Cost) Authentication Protocols of Microelectronic (RFID) Devices, followed by the creation of technologies of high-quality and super-power Generators of Random Numbers (Random Number Generator, RNG, PRNG, TRNG), including those built-in into microprocessors and coprocessors of computers (e.g., into Intel processors, Security Driver), intended for the use in most cryptographic applications.
Due to the extremely high profitability and efficiency of the Stochastic technologies and very low hardware costs, the use of reliable in-built cryptographic protection, unlike the solutions obtained in the framework of European projects (ECRYPT I/II, BRIDGE, SToP), does not increase the cost and power consumption and does not decrease the range of low-cost RFID tags, but extends (at minimum cost within 150-200 logic elements and cryptographic strength of the order of формула) these results both to very critical organic and to supercritical printed radio frequency (RFID) tags.

In addition, circuit realizations (represented by Stochastic Technologies and Systems) of the constituent cryptographic primitives, being hundreds or thousands of times more efficient than those known today, which is evidenced by the results of computer simulations, make it possible – even now at the existing technology base and advanced technical level – to serve (unprecedentedly, in real time, and without delay) billions of users by their password and identification keys, to authenticate hundreds of millions of objects, to implement the hidden (at the level of noise) signal transmission, encryption and hashing of information flows, with a capacity of hundreds of gigabits per second.

Igor Kulakov, Игорь Кулаков