Method of information protection based on the integration of probabilistic encryption and noise immune coding
Abstract
Keywords
Full Text:
PDFReferences
Serkov, A. A., Kasilov, O. V., Lazurenko, B. O., Pevnev, V. Y., & Trubchaninova, K. A. Strategy of building a wireless mobile communication system in the conditions of electronic counteraction. Radioelectronic and computer systems, 2023, no. 2(106), pp. 160-170. DOI: 10.32620/reks.2023.2.13.
Avramenko, V., & Demianenko, V. Serial encryption using the functions of real variable. Radioelectronic and computer system, 2021, no. 2(98), pp. 39-50. DOI: 10.32620/reks.2021.2.04.
Hordiichuk, V., Korchynskyi, V., Kildishev, V., & Zakharchenko, M. Timer Signals Transmission Security Increase Based on Spectrum Spreading Methods. IEEE 2nd Ukrainian Microwave Week (UkrMW), 2022, pp. 1-4. DOI: 10.1109/UkrMW58013.2022.10036952.
Vasyuta, K. V., Zbezhkhovska, U. R., Slobodyaniuk, V. V., Zakharchenko, I. V., Kashchyshyn, O. L., Dubynskyi, M. S., Ryabukha, Yu. M., & Koval, O. M. Metod pidvyshchennya skrytnosti system peredachi informatsiyi na osnovi moduliatsiyi z ortohonal'nym chastotnym rozdilennyam i mul'typleksuvannyam khaotychnykh pidnesuchykh [The method of increasing the stealthiness of information transmission systems based on modulating with orthogonal frequency division and multiplexing of chaotic subcarriers]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2021, no. 4, pp. 79-93. DOI: 10.32620/reks.2021.3.07. (In Ukrainian).
Grozov, V., Guirik, A., Budko, M., & Budko M., Cryptographic Strength Study of the Pseudorandom Sequences Generator Based on the Blender Algorithm 14th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2022, pp. 191-195. DOI: 10.1109/ICUMT57764.2022.9943350.
Mohammad Khalid Imam, R. Cryptographic Algorithms and Protocols. Chapter 2 in A Step Towards Society 5.0. Research, Innovations, and Developments in Cloud-Based Computing Technologies Boca Raton: CRC Press, 2021, pp. 32-42. DOI: 10.1201/9781003138037-2.
Zakharchenko, M., Korchynskii, V., Kildishev, V. Integrated methods of information security in telecommunication systems. International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo’2017), proceeding, 2017, pp. 78-81. DOI: 10.1109/UkrMiCo.2017.8095428.
Information technology. Security techniques. Code of practice for information security controls.: ISO/IEC 27002:2013. [Effective from 2013-09-25]. Geneva, ISO, 2013. 80 p. Available at: https://www.iso.org/obp/ui/#iso:std:iso-iec:27002:ed-2:v1:en (accessed November 10, 2023).
Korchinskyi, V., Hadzhyiev, M., Pozdniakov, P., Kildishev, V., & Hordiichuk, V. Development of the procedure for forming nonstationary signal structures based on multicomponent LFM signals. Eastern-European Journal of Enterprise Technologies, 2018, vol. 6, no. 9 (96), pp. 29-37. DOI: 10.15587/1729-4061.2018.151816.
Shannon, C. E. Communication theory of secrecy systems. The Bell System Technical Journal, 1949, vol. 28, no. 4, pp. 656-715. Doi: 10.1002/j.1538-7305.1949.tb00928.x.
Goldwasser, S., Micali, S. Probabilistic Encryption. Journal of Computer and System Sciences, 1984, no.28, pp.270-299, DOI: 10.1016/0022-0000(84)90070-9
Yong Zhang, Ruiyou Li, Yuwen Shi & Fan Luo The Probabilistic Image Encryption Algorithm Based on Galois Field GF(257), IETE Journal of Research, Published online: 22 Nov 2023. DOI: 10.1080/03772063.2023.2284956
Munoz, F. D., & Watson, J. P. A scalable solution framework for stochastic transmission and generation planning problems. Computational Management Science, 2015, no. 12, pp. 491-518, DOI: 12.10.1007/s10287-015-0229-y.
George Asante, James Ben Hayfron-Acquah, Michael Asante, Joshua Caleb Dagadu. A Symmetric, Probabilistic, NonCircuit Based Fully Homomorphic Encryption Scheme, International Journal of Computer Networks and Applications, 2022, no. 9(2), pp. 160-168, DOI: 10.22247/ijcna/2022/212332.
Maltsev, G. N. Pomehoustojchivost i skrytnost peredachi informacii po radiokanalam na osnove kombinirovannogo sluchajnogo kodirovanija [Noise immunity and secrecy of transmitting information over radio channels based on combined random coding]. Informacionno upravliajushchie sistemy – Information control systems, 2015, no. 2 (75), pp. 82-89. (In Russian).
Dhall, S.; Pal, S.K.; Sharma, K. A chaos-based probabilistic block cipher for image encryption. Journal of King Saud University - Computer and Information Sciences, 2022, no. 34 (1), pp. 1533-1543. DOI: 10.1016/j.jksuci.2018.09.015.
Korchynskyi, V. V., Kildishev, V. I., Holev, D. V., & Berdnikov, O. M. Increasing the secrecy of transmission information based on combined random coding. Radio Electronics, Computer Science, Control, 2019, no. 3, pp. 108-116. DOI: 10.15588/1607-3274-2019-3-12.
Shafique, A., Mehmood, A., Elhadef, M., Hesham khan, K. A lightweight noise-tolerant encryption scheme for secure communication: An unmanned aerial vehicle application, PLoS ONE, 2022, no. 17(9), Published online: 19 Sep, 2022. DOI: 10.1371/journal.pone.0273661.
DOI: https://doi.org/10.32620/reks.2023.4.13
Refbacks
- There are currently no refbacks.