Method of information protection based on the integration of probabilistic encryption and noise immune coding

Volodymyr Korchynskyi, Valerii Hordiichuk, Vitalii Kildishev, Oleksandr Riabukha, Sergii Staikutsa, Khaled Alfaiomi

Abstract


The subject matter of this article is the processes of increasing information security in communication systems to solve applied problems that are critical in the transmission of confidential data. The goal is to develop a multi-stage method for protecting information from unauthorized access, based on probabilistic encryption integration, error-correcting code, and error decorrelation. The tasks to be solved are as follows: to develop a probabilistic encryption algorithm that considers the entropy of the characters’ appearance in a message; to implement iterative coding with variable parameters of the information bits matrix; and to implement error decorrelation based on the generated matrix by interleaving information and check bits according to a given algorithm. Methodology: theory of signal communication and signal processing, theory of cryptography, theory of noise-resistant codes, probability theory, statistical analysis. The following results were obtained: a multi-stage method for protecting information from unauthorized access was proposed, in which at each step of data conversion, information secrecy is increased; probabilistic encryption was implemented, which considers the entropy of a discrete source of information when forming a space of random combinations; based on an iterative code with specified matrix parameters, an additional increase in the space of random combinations was implemented; error decorrelation reduces the multiplicity of errors in codewords and ensures mixing of bits according to a predetermined law. Conclusions. The scientific novelty of the results obtained is as follows: 1) an improved method of information protection from unauthorized access is proposed, based on probabilistic encryption integration, interference-resistant coding, and error decorrelation; 2) increasing information concealment is realized by eliminating the main shortcomings of probabilistic encryption, which did not take into account the entropy of the symbols of the open message; 3) it is proposed to form the space of random combinations taking into account the average probability of the appearance of a symbol in open texts, which will allow the output of a probabilistic cipher to form a stream of random combinations, which, according to its statistical properties, is close to the uniform distribution law; 4) further development of information protection methods based on interference-resistant coding and error decorrelation with encryption functions is received; 5) a further development of the statistical encryption method is the use of all redundant elements for both probabilistic encryption and interference-resistant coding.

Keywords


information protection; encryption; noise immunity; coding; random combination; decorrelation; ciphertext; statistics; probability; entropy

Full Text:

PDF

References


Serkov, A. A., Kasilov, O. V., Lazurenko, B. O., Pevnev, V. Y., & Trubchaninova, K. A. Strategy of building a wireless mobile communication system in the conditions of electronic counteraction. Radioelectronic and computer systems, 2023, no. 2(106), pp. 160-170. DOI: 10.32620/reks.2023.2.13.

Avramenko, V., & Demianenko, V. Serial encryption using the functions of real variable. Radioelectronic and computer system, 2021, no. 2(98), pp. 39-50. DOI: 10.32620/reks.2021.2.04.

Hordiichuk, V., Korchynskyi, V., Kildishev, V., & Zakharchenko, M. Timer Signals Transmission Security Increase Based on Spectrum Spreading Methods. IEEE 2nd Ukrainian Microwave Week (UkrMW), 2022, pp. 1-4. DOI: 10.1109/UkrMW58013.2022.10036952.

Vasyuta, K. V., Zbezhkhovska, U. R., Slobodyaniuk, V. V., Zakharchenko, I. V., Kashchyshyn, O. L., Dubynskyi, M. S., Ryabukha, Yu. M., & Koval, O. M. Metod pidvyshchennya skrytnosti system peredachi informatsiyi na osnovi moduliatsiyi z ortohonal'nym chastotnym rozdilennyam i mul'typleksuvannyam khaotychnykh pidnesuchykh [The method of increasing the stealthiness of information transmission systems based on modulating with orthogonal frequency division and multiplexing of chaotic subcarriers]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2021, no. 4, pp. 79-93. DOI: 10.32620/reks.2021.3.07. (In Ukrainian).

Grozov, V., Guirik, A., Budko, M., & Budko M., Cryptographic Strength Study of the Pseudorandom Sequences Generator Based on the Blender Algorithm 14th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2022, pp. 191-195. DOI: 10.1109/ICUMT57764.2022.9943350.

Mohammad Khalid Imam, R. Cryptographic Algorithms and Protocols. Chapter 2 in A Step Towards Society 5.0. Research, Innovations, and Developments in Cloud-Based Computing Technologies Boca Raton: CRC Press, 2021, pp. 32-42. DOI: 10.1201/9781003138037-2.

Zakharchenko, M., Korchynskii, V., Kildishev, V. Integrated methods of information security in telecommunication systems. International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo’2017), proceeding, 2017, pp. 78-81. DOI: 10.1109/UkrMiCo.2017.8095428.

Information technology. Security techniques. Code of practice for information security controls.: ISO/IEC 27002:2013. [Effective from 2013-09-25]. Geneva, ISO, 2013. 80 p. Available at: https://www.iso.org/obp/ui/#iso:std:iso-iec:27002:ed-2:v1:en (accessed November 10, 2023).

Korchinskyi, V., Hadzhyiev, M., Pozdniakov, P., Kildishev, V., & Hordiichuk, V. Development of the procedure for forming nonstationary signal structures based on multicomponent LFM signals. Eastern-European Journal of Enterprise Technologies, 2018, vol. 6, no. 9 (96), pp. 29-37. DOI: 10.15587/1729-4061.2018.151816.

Shannon, C. E. Communication theory of secrecy systems. The Bell System Technical Journal, 1949, vol. 28, no. 4, pp. 656-715. Doi: 10.1002/j.1538-7305.1949.tb00928.x.

Goldwasser, S., Micali, S. Probabilistic Encryption. Journal of Computer and System Sciences, 1984, no.28, pp.270-299, DOI: 10.1016/0022-0000(84)90070-9

Yong Zhang, Ruiyou Li, Yuwen Shi & Fan Luo The Probabilistic Image Encryption Algorithm Based on Galois Field GF(257), IETE Journal of Research, Published online: 22 Nov 2023. DOI: 10.1080/03772063.2023.2284956

Munoz, F. D., & Watson, J. P. A scalable solution framework for stochastic transmission and generation planning problems. Computational Management Science, 2015, no. 12, pp. 491-518, DOI: 12.10.1007/s10287-015-0229-y.

George Asante, James Ben Hayfron-Acquah, Michael Asante, Joshua Caleb Dagadu. A Symmetric, Probabilistic, NonCircuit Based Fully Homomorphic Encryption Scheme, International Journal of Computer Networks and Applications, 2022, no. 9(2), pp. 160-168, DOI: 10.22247/ijcna/2022/212332.

Maltsev, G. N. Pomehoustojchivost i skrytnost peredachi informacii po radiokanalam na osnove kombinirovannogo sluchajnogo kodirovanija [Noise immunity and secrecy of transmitting information over radio channels based on combined random coding]. Informacionno upravliajushchie sistemy – Information control systems, 2015, no. 2 (75), pp. 82-89. (In Russian).

Dhall, S.; Pal, S.K.; Sharma, K. A chaos-based probabilistic block cipher for image encryption. Journal of King Saud University - Computer and Information Sciences, 2022, no. 34 (1), pp. 1533-1543. DOI: 10.1016/j.jksuci.2018.09.015.

Korchynskyi, V. V., Kildishev, V. I., Holev, D. V., & Berdnikov, O. M. Increasing the secrecy of transmission information based on combined random coding. Radio Electronics, Computer Science, Control, 2019, no. 3, pp. 108-116. DOI: 10.15588/1607-3274-2019-3-12.

Shafique, A., Mehmood, A., Elhadef, M., Hesham khan, K. A lightweight noise-tolerant encryption scheme for secure communication: An unmanned aerial vehicle application, PLoS ONE, 2022, no. 17(9), Published online: 19 Sep, 2022. DOI: 10.1371/journal.pone.0273661.




DOI: https://doi.org/10.32620/reks.2023.4.13

Refbacks

  • There are currently no refbacks.