Information encryption using pseudorandom gaussian sequences

Authors

  • Руслан Леонідович Політанський Jurij Fed’kovych Chernivtsi National University 58012, Ukraine, Chernivtsi, Kotsyubinskogo street, 2, Ukraine
  • Петро Михайлович Шпатар Jurij Fed’kovych Chernivtsi National University 58012, Ukraine, Chernivtsi, Kotsyubinskogo street, 2, Ukraine
  • Олександр Володимирович Гресь Jurij Fed’kovych Chernivtsi National University 58012, Ukraine, Chernivtsi, Kotsyubinskogo street, 2, Ukraine
  • Василь Яремович Ляшкевич Jurij Fed’kovych Chernivtsi National University 58012, Ukraine, Chernivtsi, Kotsyubinskogo street, 2, Ukraine

DOI:

https://doi.org/10.15587/1729-4061.2012.5992

Keywords:

pseudorandom sequence, generator, Gaussian distribution, cryptographic security

Abstract

The rapid progress of the electronic telecommunications has contributed to the development of the innovative methods of encoding, encryption and transmission of information, including the cryptographic techniques. The cryptographic techniques of information security in its transmission are the most stable and secure.

The article suggests an algorithm of the information encryption using sequences of pseudorandom real numbers distributed according to Gauss law, which is a good model of noise.  The encryption algorithm is based on the pseudorandom key guns, which are based on two linear congruous generators of pseudorandom sequences.

Practically, the algorithm was implemented in the software environment Delphi 7.0. The effectiveness of the algorithm was tested using a quantitative index of the correlation coefficient, the range of which is 0,01 ÷ 0,06 for the encrypted image. The results indicate the high cryptographic security of the suggested algorithm

Author Biographies

Руслан Леонідович Політанський, Jurij Fed’kovych Chernivtsi National University 58012, Ukraine, Chernivtsi, Kotsyubinskogo street, 2

Candidate of Physical and Mathematical Sciences, Associate Professor

Department of the Radio Engineering and Information Security

Петро Михайлович Шпатар, Jurij Fed’kovych Chernivtsi National University 58012, Ukraine, Chernivtsi, Kotsyubinskogo street, 2

Candidate of Technical Sciences, Associate Professor

Department of the Radio Engineering and Information Security

Олександр Володимирович Гресь, Jurij Fed’kovych Chernivtsi National University 58012, Ukraine, Chernivtsi, Kotsyubinskogo street, 2

Postgraduate student

Department of the Radio Engineering and Information Security

Василь Яремович Ляшкевич, Jurij Fed’kovych Chernivtsi National University 58012, Ukraine, Chernivtsi, Kotsyubinskogo street, 2

Candidate of Technical Sciences, Associate Professor

Department of the Computer Systems and Networks

References

  1. Долгов, В.А. Криптографические методы защиты информации. Курс лекцій [Текст] / В.А. Долгов, В.В. Анисимов. – Хабаровск.: Издательство ДВГУПС, 2008. – 155с.
  2. Преобразование Бокса-Мюллера. Доступно на: http://ru.wikipedia.org
  3. Pareek, N.K Image encryption using chaotic logistic map [Текст] / Pareek N.K., Vinod Patidara, Sud K.K. // Image and Vision Computing 24 – 2006 – Pp. 926–934.
  4. Болтенко, В.А. Анализ алгоритмов хаотического шифрования зображений [Текст] / Болтенков В.А., Никольский Е.С. // Цифрові технології/ № 7 – 2010 – С. 61-66.
  5. Pareek, N.K. Cryptography using multiple one-dimensional chaotic maps [Текст] / Pareek N.K., Patidar V, Sud K.// Commun. Nonlinear Sci. Numer. Simul./ №10(7) – 2005 – Pp.715–723.
  6. Liu, S.An Improved Image Encryption Algorithm Based on Chaotic System [Текст] / Liu S., Sun J., Xu Zh.// Journal of Computers./ №11.Vol.4 – 2009 – Pp. 1091-1100.
  7. Іванюк, П.В. Дослідження хаотичних процесів, генерованих системою Лю [Текст] / П.В. Іванюк, Л.Ф. Політанський, Р.Л. Політанський // Восточно-Европейский журнал передовых технологий. – 2011. – №4/9(52). – С. 11 – 15.

Published

2012-12-25

How to Cite

Політанський, Р. Л., Шпатар, П. М., Гресь, О. В., & Ляшкевич, В. Я. (2012). Information encryption using pseudorandom gaussian sequences. Eastern-European Journal of Enterprise Technologies, 6(11(60), 8–10. https://doi.org/10.15587/1729-4061.2012.5992

Issue

Section

Radio engineering information tools