The Repository of VNAU

MAIN | BY YEARS | COLLECTIONS| BY TYPES| BY DEPS | SEARCH| LOGIN | ABOUT| RSS |

id: 33686
Title: Research and simulation of the method of generation of the flow of matrix keys of permutations and their characteristics for encryption-masking of video frames
Authors: Krasilenko V., Pidlubnyi V., Nikitovich D.
Keywords: криптографія, матричні моделі криптографічних перетворень, метод генерування потоку ключів, секретний матричний ключ, матриця перестановок, текстографічний документ, електронний цифровий підпис, моделювання, Mathcad Professional, зашифрування-розшифр
Date of publication: 2023-08-07 12:13:35
Last changes: 2023-08-07 12:13:35
Year of publication: 2023
Summary: The article proposes and considers a method of generating and forming a stream of secret matrix keys (MK) in the form of permutation matrices. Based on consideration of the advantages of matrix models and algorithms for cryptographic transformations (CT) of images (I), textographic documents, aspects of the application of these matrix-type cryptosystems for creating blind electronic digital signatures (BEDS), masking of video frames, etc., the urgent need to form a set or a consistent series of secret keys. It is shown that, taking into account the peculiarities of crypto-transformations in multipage, block ciphers, in matrix affine-permutation ciphers, a series of keys in the form of permutation matrices (PM) is necessary. To solve this problem, the article proposes a new approach and method of generating a series of MK (PM), based on the use of a series of sequential cryptotransformations of the base key using affine encryption when changing the keys of this cipher in accordance with the generated random digital sequence. Functionality and advantages of the method of generating a series of secret keys in the form of permutation matrices (PM) are demonstrated by model experiments in the Mathcad Professional software environment, screenshots from the created software modules. The properties of a series of MK PM were investigated using correlation and mutually equivalent normalized functions, which are more effective than correlation functions, and the adequacy and stability of the method were confirmed. The advantage of the proposed method and its matrix models and computational procedures is the consideration of the specificity of images and the ease of adaptation to different types and formats of images, the clarity and isomorphism of the visualization of both the components of the MK PM and the entire flow of keys. Formulas and algorithmic steps of procedures for creating a set of secret matrix keys and intermediate steps of closing, encrypting and decrypting images are given. The obtained results of modeling the method and the processes of creating a series of secret keys of matrix permutations in the Mathcad software environment confirmed the correct functioning and advantages of the proposed method.
URI: http://81.30.162.23/repository/getfile.php/33686.pdf
Publication type: Статті у наукових фахових виданнях України (Copernicus та інші)
Publication: Вісник Хмельницького національного університету. Серія: технічні науки. 2023. № 3 (321). С. 339-347. DOI: 10.31891/2307-5732-2023-321-3-339-347
In the collections :
Published by: Адміністратор
File : 33686.pdf Size : 1525059 byte Format : Adobe PDF Access : For all

Enlarge

"Socrates" System  |   VNAU official site Copyright © 2013, coding by Y.Palamarchuck, design by R.Yatskovska