Devising methods to synthesize discrete complex signals with required properties for application in modern information and communication systems
DOI:
https://doi.org/10.15587/1729-4061.2021.234674Keywords:
noise immunity of reception, noise immunity, secrecy, information security, discrete sequences, signal synthesisAbstract
Information and communication systems (ICSs) must comply with increasingly stringent requirements to ensure the reliability and speed of information transmission, noise immunity, information security. This paper reports the methods to synthesize discrete complex cryptographic signals, underlying the construction of which are random (pseudo-random) processes; the methods for synthesizing characteristic discrete complex signals whose construction is based on using the nature of the multiplicative group of a finite field; the results of studying the properties of the specified signal systems. It is shown that the methods built provide a higher synthesis performance than known methods and make it possible to algorithmize the synthesis processes for the construction of software and hardware devices to form such signals. The win in the time when synthesizing nonlinear signals in finite fields using the devised method is, compared to the known method, for the period of 9,972 elements is 1,039.6 times. The proposed method for synthesizing the entire system of such signals, based on decimation operation, outperforms the known method of difference sets in performance. Thus, for a signal period of 2,380 elements, the win in time exceeds 28 times. It has also been shown that the application of such systems of complex signals could improve the efficiency indicators of modern ICSs. Thus, the imitation resistance of the system, when using complex discrete cryptographic signals with a signal period of 1,023 elements, is four orders of magnitude higher than when applying the linear signal classes (for example, M-sequences). For a signal period of 1,023 elements, the win (in terms of structural secrecy) when using the signal systems reported in this work exceeds 300 times at a period of 8,192, compared to the signals of the linear form (M-sequences)
References
- Varakin, L. E. (1985). Sistemy svyazi s shumopodobnymi signalami. Moscow: Radio i svyaz', 384.
- Sverdlik, M. B. (1975). Optimal'nye diskretnye signaly. Moscow: Radio i svyaz', 200.
- Liang, Q., Liu, X., Na, Z., Wang, W., Mu, J., Zhang, B (2018). Communications, Signal Processing, and Systems. Proceedings of the CSPS Volume III: Systems. Springer, 1219. doi: https://doi.org/10.1007/978-981-13-6508-9
- Ipatov, V. P. (2005). Spread Spectrum and CDMA. Principles and Applications. John Wiley & Sons Ltd. doi: https://doi.org/10.1002/0470091800
- Michael Yang, S.-M. (2019). Modern Digital Radio Communication Signals and Systems. Springer, 664. doi: https://doi.org/10.1007/978-3-319-71568-1
- Gantmaher, V. E., Bystrov, N. E., Chebotarev, D. V. (2005). SHumopodobnye signaly. Analiz, sintez, obrabotka. Sankt-Peterburg: Nauka i Tekhnika, 400.
- Gorbenko, I. D., Zamula, А. А., Morozov, V. L. (2017). Information security and noise immunity of telecommunication systems under conditions of various internal and external impacts. Telecommunications and Radio Engineering, 76 (19), 1705–1717. doi: https://doi.org/10.1615/telecomradeng.v76.i19.30
- Gorbenko, I. D., Zamula, А. А. (2017). Cryptographic signals: requirements, methods of synthesis, properties, application in telecommunication systems. Telecommunications and Radio Engineering, 76 (12), 1079–1100. doi: https://doi.org/10.1615/telecomradeng.v76.i12.50
- DSTU 7624:2014. Informatsiyni tekhnolohiyi. Kryptohrafichnyi zakhyst informatsiyi. Alhorytm symetrychnoho blokovoho peretvorennia (2015). Kyiv: Minekonomrozvytku Ukrainy.
- Kuznetsov, A. A., Moskovchenko, I. V., Prokopovych-Tkachenko, D. I., Kuznetsova, T. Y. (2019). Heuristic methods of gradient search for the cryptographic boolean functions. Telecommunications and Radio Engineering, 78(10), 879–899. doi: https://doi.org/10.1615/telecomradeng.v78.i10.40
- NIST 800-90 b. Recommendation for the Entropy Sources Used for Random Bit Generation (2012).
- Tesař, P. (2017). Influence of Non-Linearity on Selected Cryptographic Criteria of 8x8 S-Boxes. Acta Informatica Pragensia, 6 (2), 162–173. doi: https://doi.org/10.18267/j.aip.107
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Ivan Gorbenko, Oleksandr Zamula
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.