Developing an algorithm and investigation its properties to generate protected data
DOI:
https://doi.org/10.32792/jeps.v12i2.172Keywords:
Limited length of the data,, Analysis of information blocks, Authentication control, Probability calculation of hashAbstract
Reliability plays an important role in increasing the protection of legal data exchanged between
systems and devices, as well as between the sender and the receiver, where it is necessary the device
receives legal data only from corresponding and authorized devices. Otherwise, the received data from
illegal device can be processed by the device, therefore may lead to denial of service or errors in the
device operation, or maybe possibly a loss of data or functioning. The potential attacker is the real threat
to the trusted channel of data exchange, who deliberately generates and transmits data to the receiving
device, which the device may mistakenly perceive as a trusted and authenticated source. In order to
determine the difficulties associated with the transfer of legal data, this study focuses on development and
investigation of the properties of algorithm for the formation of the protected data of small size. The
study of algorithm for the presence of uneven frequencies of the meeting different words of the sources. It
is shown that the absence of these uneven frequencies does not allow an attacker to use methods to
increase either the probability of opening the parameters of the algorithm, or the probability of successful
implementation of various types of attacks on the data transmission.
References
W. Zheng, S. Liu, Z. Liu и Q. Fu, «Security transmission of FTP data based on IPSec,» в 1st IEEE
Symposium on Web Society, Lanzhou, China, 2009.
T. Masaru, "An HTTP Extension for Secure Transfer of Confidential Data," in IEEE International
Conference on Networking, Architecture, and Storage, Guilin, China, 2009.
J. Amit, "Enhancement of secure data transmission," in Euro American conference on Telematics and
information systems, Faro, Portugal, 2007.
B. Wang, H. Qian, X. Sun, J. Shen and X. Xie, "A Secure Data Transmission Scheme Based on
Information Hiding in Wireless Sensor Networks," International Journal of Security and Its
Applications, vol. 9, no. 1, pp. 125-138, 2015.
M. Bellare, J. Kiliany and P. Rogawayz, "The Security of the Cipher Block Chaining Message
Authentication Code," Journal of Computer and System Sciences, vol. 61, no. 3, p. 362–399, 2000.
W. Stallings, "NIST Block Cipher Modes of Operation for Authentication and Combined
Confidentiality and Authentication," Cryptologia, vol. 34, p. 225–235, 2010.
L. Maruhnenko, "Analysis of potential vulnerabilities and modern methods of protecting multi-user
resources," in infocommunication and space technologies: status, problems and solutions, Russia,
Kursk, 2018.
M. A. Efremov, I. V. kaluutsky, M. O. Tanygin and I. I. Rudak, "Security of personal data, social
networks and advertising in the global INTERNET," News of Southwestern state University. Series:
Management, computer engineering, computer science. Medical instrumentation., vol. 1, no. 22, pp.
-33, 2017.
R. Sumathi, "A Secure Data Transfer Mechanism Using Single-Handed Re-Encryption Technique," in
International Conference on Emerging Trends in Science, Engineering and Technology,
Tiruchirapalli, India, 2012.
P. Hao and Q. Shi, "Matrix factorizations for reversible integer mapping," IEEE Transactions on
Signal Processing, vol. 49, no. 10, pp. 2314 - 2324, 2001.
M. Bellare, J. Kilian and P. Rogaway, "The security of the cipher block chaining message
authentication code," JCSS, vol. 3, no. 3, p. 341–358, 1994.
A. Gervais, O. Ghassan, K. Wüst, V. Glykantzis, H. Ritzdorf and S. Capkun, "On the Security and
Performance of Proof of Work Blockchains," 2006.
M. O. Tanygin and A. P. Tipikin, "System architecture for hardware restriction of access to
information on a computer hard disk," Telecommunications, vol. 3, pp. 44 - 46, 2006.
M. O. Tanygin, H. Y. Alshaeaa and V. Altukhova, "Establishing Trusted Channel for Data Exchange
between Source and Receiver by Modified One-time Password Method," in International Russian
Automation Conference, RusAutoCon, Sochi, Russian Federation, 2019.
J. Black, Authenticated Encryption. In Encyclopedia of Cryptography and Security, Tilborg: Springer,
V. P. Dobritsa, A. Plugatarev, A. A. Zakharyuta and L. A. Evlanova, "An Approach to Creating an
Adaptive Algorithm
for Transmitting Information in Open Channel with Mutual Authentication of the
Source and Receiver," in Intelligent Information Systems: Trends, Problems, Prospects; Materials of
Reports of the Vi all-Russian Scientific and Practical Conference "IIS-2018"., Kursk, 2018.
M. Tanygin, "Method of Control of Data Transmitted Between Software and Hardware," in Computer
Science and Engineering: Materials of the IV International Conference of Young Scientists CSE-
, Lviv, 2010.
Tanygin, M. O., Alshaeaa, H. Y., & Kuleshova, E. A. (2020). A METHOD OF THE
TRANSMITTED BLOCKS INFORMATION INTEGRITY CONTROL. Radio Electronics,
Computer Science, Control, (1), 181–189. https://doi.org/10.15588/1607-3274-2020-1-18
Tanygin M.O., Efremov M.A., Hyder Y.A. (2020) Analysis of the Secure Data Transmission System
Parameters. In: Radionov A., Karandaev A. (eds) Advances in Automation. RusAutoCon 2019.
Lecture Notes in Electrical Engineering, vol 641. Springer, Cham. https://doi.org/10.1007/978-3-030-
-3_74.
A. G. Sivakov, M. O. Tanygin and V. S. Panishev, Information security, Kurck: Southwest state
University, 2017, p. 196.
M. O. Tanygin, "Calculation of the probability of collisions when using the algorithm for controlling
the authenticity of messages," News of the southwest state University. series: management, computer
engineering, Informatics, vol. 2, pp. 179-182, 2012.
M. A. Ivanov, Cryptographic methods of security information in computer systems and networks,
Moscow: MEPhI, 2012, p. 400.
Downloads
Published
Issue
Section
License
The Authors understand that, the copyright of the articles shall be assigned to Journal of education for Pure Science (JEPS), University of Thi-Qar as publisher of the journal.
Copyright encompasses exclusive rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms and any other similar reproductions, as well as translations. The reproduction of any part of this journal, its storage in databases and its transmission by any form or media, such as electronic, electrostatic and mechanical copies, photocopies, recordings, magnetic media, etc. , will be allowed only with a written permission from Journal of education for Pure Science (JEPS), University of Thi-Qar.
Journal of education for Pure Science (JEPS), University of Thi-Qar, the Editors and the Advisory International Editorial Board make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in the Journal of education for Pure Science (JEPS), University of Thi-Qar are sole and exclusive responsibility of their respective authors and advertisers.