Developing an algorithm and investigation its properties to generate protected data


  • Computer Science Department, College of Education for Pure Sciences, University of Thi-Qar. Thi-Qar, Iraq.


Limited length of the data,, Analysis of information blocks, Authentication control, Probability calculation of hash


Reliability plays an important role in increasing the protection of legal data exchanged between
systems and devices, as well as between the sender and the receiver, where it is necessary the device
receives legal data only from corresponding and authorized devices. Otherwise, the received data from
illegal device can be processed by the device, therefore may lead to denial of service or errors in the
device operation, or maybe possibly a loss of data or functioning. The potential attacker is the real threat
to the trusted channel of data exchange, who deliberately generates and transmits data to the receiving
device, which the device may mistakenly perceive as a trusted and authenticated source. In order to
determine the difficulties associated with the transfer of legal data, this study focuses on development and
investigation of the properties of algorithm for the formation of the protected data of small size. The
study of algorithm for the presence of uneven frequencies of the meeting different words of the sources. It
is shown that the absence of these uneven frequencies does not allow an attacker to use methods to
increase either the probability of opening the parameters of the algorithm, or the probability of successful
implementation of various types of attacks on the data transmission.


W. Zheng, S. Liu, Z. Liu и Q. Fu, «Security transmission of FTP data based on IPSec,» в 1st IEEE

Symposium on Web Society, Lanzhou, China, 2009.

T. Masaru, "An HTTP Extension for Secure Transfer of Confidential Data," in IEEE International

Conference on Networking, Architecture, and Storage, Guilin, China, 2009.

J. Amit, "Enhancement of secure data transmission," in Euro American conference on Telematics and

information systems, Faro, Portugal, 2007.

B. Wang, H. Qian, X. Sun, J. Shen and X. Xie, "A Secure Data Transmission Scheme Based on

Information Hiding in Wireless Sensor Networks," International Journal of Security and Its

Applications, vol. 9, no. 1, pp. 125-138, 2015.

M. Bellare, J. Kiliany and P. Rogawayz, "The Security of the Cipher Block Chaining Message

Authentication Code," Journal of Computer and System Sciences, vol. 61, no. 3, p. 362–399, 2000.

W. Stallings, "NIST Block Cipher Modes of Operation for Authentication and Combined

Confidentiality and Authentication," Cryptologia, vol. 34, p. 225–235, 2010.

L. Maruhnenko, "Analysis of potential vulnerabilities and modern methods of protecting multi-user

resources," in infocommunication and space technologies: status, problems and solutions, Russia,

Kursk, 2018.

M. A. Efremov, I. V. kaluutsky, M. O. Tanygin and I. I. Rudak, "Security of personal data, social

networks and advertising in the global INTERNET," News of Southwestern state University. Series:

Management, computer engineering, computer science. Medical instrumentation., vol. 1, no. 22, pp.

-33, 2017.

R. Sumathi, "A Secure Data Transfer Mechanism Using Single-Handed Re-Encryption Technique," in

International Conference on Emerging Trends in Science, Engineering and Technology,

Tiruchirapalli, India, 2012.

P. Hao and Q. Shi, "Matrix factorizations for reversible integer mapping," IEEE Transactions on

Signal Processing, vol. 49, no. 10, pp. 2314 - 2324, 2001.

M. Bellare, J. Kilian and P. Rogaway, "The security of the cipher block chaining message

authentication code," JCSS, vol. 3, no. 3, p. 341–358, 1994.

A. Gervais, O. Ghassan, K. Wüst, V. Glykantzis, H. Ritzdorf and S. Capkun, "On the Security and

Performance of Proof of Work Blockchains," 2006.

M. O. Tanygin and A. P. Tipikin, "System architecture for hardware restriction of access to

information on a computer hard disk," Telecommunications, vol. 3, pp. 44 - 46, 2006.

M. O. Tanygin, H. Y. Alshaeaa and V. Altukhova, "Establishing Trusted Channel for Data Exchange

between Source and Receiver by Modified One-time Password Method," in International Russian

Automation Conference, RusAutoCon, Sochi, Russian Federation, 2019.

J. Black, Authenticated Encryption. In Encyclopedia of Cryptography and Security, Tilborg: Springer,

V. P. Dobritsa, A. Plugatarev, A. A. Zakharyuta and L. A. Evlanova, "An Approach to Creating an

Adaptive Algorithm

for Transmitting Information in Open Channel with Mutual Authentication of the

Source and Receiver," in Intelligent Information Systems: Trends, Problems, Prospects; Materials of

Reports of the Vi all-Russian Scientific and Practical Conference "IIS-2018"., Kursk, 2018.

M. Tanygin, "Method of Control of Data Transmitted Between Software and Hardware," in Computer

Science and Engineering: Materials of the IV International Conference of Young Scientists CSE-

, Lviv, 2010.

Tanygin, M. O., Alshaeaa, H. Y., & Kuleshova, E. A. (2020). A METHOD OF THE


Computer Science, Control, (1), 181–189.

Tanygin M.O., Efremov M.A., Hyder Y.A. (2020) Analysis of the Secure Data Transmission System

Parameters. In: Radionov A., Karandaev A. (eds) Advances in Automation. RusAutoCon 2019.

Lecture Notes in Electrical Engineering, vol 641. Springer, Cham.


A. G. Sivakov, M. O. Tanygin and V. S. Panishev, Information security, Kurck: Southwest state

University, 2017, p. 196.

M. O. Tanygin, "Calculation of the probability of collisions when using the algorithm for controlling

the authenticity of messages," News of the southwest state University. series: management, computer

engineering, Informatics, vol. 2, pp. 179-182, 2012.

M. A. Ivanov, Cryptographic methods of security information in computer systems and networks,

Moscow: MEPhI, 2012, p. 400.