Improving the reliability of the process of matrix cryptographic transformation
DOI:
https://doi.org/10.15587/2312-8372.2015.51221Keywords:
cryptographic transformation, information security, privacy, information integrity, encoding, information encryptionAbstract
The high-speed cryptographic techniques that allow solving the most important problems and securing automated processing of data in real time have a great interest nowadays. High importance and lack of practical solving the problems of improving performance of cryptographic transformation of the information determining the obvious importance of this study and review the issues related to this subject has both theoretical and practical significance in modern conditions.
Considering that high-speed cryptographic data conversion is the most effective way to ensure these characteristics of safety of information resources as confidentiality and integrity, then surely a promising area of research is to develop methods to increase productivity of the cryptographic systems. Specifically, this study is based on improving the reliability of the cryptographic transformation results in the systems of cryptographic protection of the information.
This article was formed two approaches to improve the reliability of cryptographic transformation process. The first approach allows controlling the synthesis of matrix inverse transformation of information. The second approach allows monitoring the whole process of passing the inverse transformation of information, namely the inverse of the matrix and the results of decoding.
References
- Rudnytsky, V. M., Myronets, I. V., Babenko, V. G. (2010). Methodology increase of access to confidential information resources. Information processing systems, 5 (86), 15–19.
- Rudnytsky, V. M., Myronets, I. V., Babenko, V. G. (2010). Justification possibility of expanding feature set encoding data to protect sensitive information resources. Control systems, navigation and communication, 2 (14), 118–122.
- Chypyha, A. F. (2010). Information security of automated systems. M.: Gelios ARV, 336.
- Rostovtsev, A. G., Mahovenko, E. B. (2005). Theoretical cryptography. M.: Publishing House "Professyonal", 490.
- Vasilenko, V. S. (2004). Option immunity cryptographic transformation. Legal, normative and metrological support of information security Ukraine, 8, 101–108.
- Matov, O. J., Vasilenko, M. Y. (2011). Matrix noise stability cryptographic transformation. Storage and Processing, Vol. 13, № 4, 39–51.
- Matov, O. J., Vasilenko, V. S., Vasilenko, M. Y. (2012). Encryption of information objects by block transformation of the system of residual classes positional number system. Storage and Processing, Vol. 14, № 3, 99–103.
- Goldreich, O. (2001). Foundations of Cryptography. Volume 1. Basic Tools. Cambridge, United Kingdom: Cambridge University Press, 396. doi:10.1017/cbo9780511546891
- Goldreich, O. (2004). Foundations of Cryptography. Volume 2. Basic Applications. Cambridge, United Kingdom: Cambridge University Press, 452. doi:10.1017/cbo9780511721656
- Koblitz, N. (1998). Algebraic Aspects of Cryptography. Berlin: Springer-Verlag, 206. doi:10.1007/978-3-662-03642-6
- Menezes, A., van Oorschot, P., Vanstone, S. (1996). Handbook of Applied Cryptography. Discrete Mathematics and Its Applications. CRC Press, 780. doi:10.1201/9781439821916
- Golub, S. V., Babenko, V. G., Rudnytsky, S. V, Melnyk, R. P. (2012). Improvement synthesis method of cryptographic transformation operations based on discrete algebraic representation of operations. Collection Science Works "Systems of control, navigation and communication", 2 (22), 163–168.
- Rudnytsky, V. M., Babenko, V. G., Rudnytsky, S. V. (2012). Method of synthesis of matrix models cryptographic operations encoding and decoding information. Scientific works of Kharkiv Air Force University, 4 (33), 198–200.
- Rudnytsky, V. M., Babenko, V. G., Rudnytsky, S. V. (2012). Method of synthesis of matrix models cryptographic operations encoding information. Information security, 3 (56), 50–56.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 Ірина Валеріївна Миронець
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.