Improving the reliability of the process of matrix cryptographic transformation

Authors

DOI:

https://doi.org/10.15587/2312-8372.2015.51221

Keywords:

cryptographic transformation, information security, privacy, information integrity, encoding, information encryption

Abstract

The high-speed cryptographic techniques that allow solving the most important problems and securing automated processing of data in real time have a great interest nowadays. High importance and lack of practical solving the problems of improving performance of cryptographic transformation of the information determining the obvious importance of this study and review the issues related to this subject has both theoretical and practical significance in modern conditions.

Considering that high-speed cryptographic data conversion is the most effective way to ensure these characteristics of safety of information resources as confidentiality and integrity, then surely a promising area of research is to develop methods to increase productivity of the cryptographic systems. Specifically, this study is based on improving the reliability of the cryptographic transformation results in the systems of cryptographic protection of the information.

This article was formed two approaches to improve the reliability of cryptographic transformation process. The first approach allows controlling the synthesis of matrix inverse transformation of information. The second approach allows monitoring the whole process of passing the inverse transformation of information, namely the inverse of the matrix and the results of decoding.

Author Biography

Ірина Валеріївна Миронець, Cherkasy State Technological University, 460, Avenue Shevchenko, Cherkassy, Ukraine, 18006

Candidate of Technical Sciences, Associate Professor

Department of Information Security and Computer Engineering

References

  1. Rudnytsky, V. M., Myronets, I. V., Babenko, V. G. (2010). Methodology increase of access to confidential information resources. Information processing systems, 5 (86), 15–19.
  2. Rudnytsky, V. M., Myronets, I. V., Babenko, V. G. (2010). Justification possibility of expanding feature set encoding data to protect sensitive information resources. Control systems, navigation and communication, 2 (14), 118–122.
  3. Chypyha, A. F. (2010). Information security of automated systems. M.: Gelios ARV, 336.
  4. Rostovtsev, A. G., Mahovenko, E. B. (2005). Theoretical cryptography. M.: Publishing House "Professyonal", 490.
  5. Vasilenko, V. S. (2004). Option immunity cryptographic transformation. Legal, normative and metrological support of information security Ukraine, 8, 101–108.
  6. Matov, O. J., Vasilenko, M. Y. (2011). Matrix noise stability cryptographic transformation. Storage and Processing, Vol. 13, № 4, 39–51.
  7. Matov, O. J., Vasilenko, V. S., Vasilenko, M. Y. (2012). Encryption of information objects by block transformation of the system of residual classes positional number system. Storage and Processing, Vol. 14, № 3, 99–103.
  8. Goldreich, O. (2001). Foundations of Cryptography. Volume 1. Basic Tools. Cambridge, United Kingdom: Cambridge University Press, 396. doi:10.1017/cbo9780511546891
  9. Goldreich, O. (2004). Foundations of Cryptography. Volume 2. Basic Applications. Cambridge, United Kingdom: Cambridge University Press, 452. doi:10.1017/cbo9780511721656
  10. Koblitz, N. (1998). Algebraic Aspects of Cryptography. Berlin: Springer-Verlag, 206. doi:10.1007/978-3-662-03642-6
  11. Menezes, A., van Oorschot, P., Vanstone, S. (1996). Handbook of Applied Cryptography. Discrete Mathematics and Its Applications. CRC Press, 780. doi:10.1201/9781439821916
  12. Golub, S. V., Babenko, V. G., Rudnytsky, S. V, Melnyk, R. P. (2012). Improvement synthesis method of cryptographic transformation operations based on discrete algebraic representation of operations. Collection Science Works "Systems of control, navigation and communication", 2 (22), 163–168.
  13. Rudnytsky, V. M., Babenko, V. G., Rudnytsky, S. V. (2012). Method of synthesis of matrix models cryptographic operations encoding and decoding information. Scientific works of Kharkiv Air Force University, 4 (33), 198–200.
  14. Rudnytsky, V. M., Babenko, V. G., Rudnytsky, S. V. (2012). Method of synthesis of matrix models cryptographic operations encoding information. Information security, 3 (56), 50–56.

Published

2015-09-22

How to Cite

Миронець, І. В. (2015). Improving the reliability of the process of matrix cryptographic transformation. Technology Audit and Production Reserves, 5(6(25), 52–54. https://doi.org/10.15587/2312-8372.2015.51221