Skip to main content

The New Cryptographic Method for Software and Hardware Protection of Communication Channels in Open Environments

  • Chapter
  • First Online:
Data-Centric Business and Applications

Abstract

The chapter is devoted to presenting theoretical bases and features of practical realization the new cryptographic method for software and hardware protection of communication channels in open environments. In the theoretical part of the chapter is shown the possibility of modeling the modes of deterministic chaos in the oscillations of discrete structures formed in the form of special matrix forms of the Latin square. A mathematical model is proposed for such discrete systems, on the basis of which an analysis of the combination of conditions for discrete structures and the requirements for transformations of their evolution operators ensuring the achievement of such modes is carried out. The results of simulation modeling of oscillatory processes according to the cycles of states of a discrete system, forming similarities of attractor trajectories, are presented. The possibility of simulating oscillation beat modes in discrete cellular structures organized in the form of two-level matrix forms of Sudoku grids is substantiated. The results of simulation modeling of oscillation beats in cycles of varying states of a discrete system for two types of beats are presented: similar to the result of the superposition of harmonic oscillations at multiple frequencies in the theory of radio signals, as well as noise-like beats. Analyzed the principles of creating devices to implement a closed communication channel in an open data transmission environment. To solve the protection problem, it is proposed to use the AES standard cryptographic algorithm, supplemented by the author’s system of dynamic generation of encryption keys. Is presented the description of the system for generating encryption keys, which based on the combinatorial properties of matrix structures in the Sudoku grids form. Are shown the results of external software testing of cipher text code sequences and computer tests of the proposed algorithm. Using the modified AES cryptographic algorithm, a working model of the system for protecting a remote control of a mobile object over the radio channel has been built.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Moldovyan AA et al (2002) Cryptography: high-speed ciphers. BHV-Peterburg, 496 p. (in Russian)

    Google Scholar 

  2. Andronov AA, Vitt AA, Haykin SE (1981) Oscillation theory. Moscow, Nauka, 568 p. (in Russian)

    Google Scholar 

  3. Lorenz E (1981) Deterministic non-periodic flow. In: Strange attractors, Moscow, Mir, pp 88–117. (in Russian)

    Google Scholar 

  4. Grebogi C, Ott E, Pelikan S, Yorke JA (1981) Strange attractors that are not chaotic. Phys D, Nonlinear Phenom 261–268

    Google Scholar 

  5. McKay BD, Wanless IM (2005) On the number of Latin squares. Ann Combin 335–344

    Google Scholar 

  6. Russel, Jarvis AF (2019) Mathematics of Sudoku II. www.afjarvis.staff.shef.ac.uk/sudoku/russell_jarvis_spec2.pdf, last accessed 2019/11/21

  7. McGuire G, Tugemann B, Civario G (2013) There is no 16-Clue Sudoku: solving the Sudoku minimum number of clues problem, 43

    Google Scholar 

  8. Crook JF (2009) A pencil-and-paper algorithm for solving Sudoku puzzles. Not Am Math Soc 460–468

    Google Scholar 

  9. Ercsey-Ravasz M, Toroczkai Z (2012) The chaos within sudoku. Sci Rep 2:725. https://doi.org/10.1038/srep00725

    Article  Google Scholar 

  10. Pikovsky A, Rosenblum M, Kurths J (2002) Synchronization: a universal concept in nonlinear sciences. Cambridge University Press, 411 p

    Google Scholar 

  11. RF patent No. 2309549 dated 10.27.2007. The method of cryptographic conversion of digital data

    Google Scholar 

  12. Patent of Ukraine for utilitiy model No. 129836 dated November 12, 2018 “A method for generating keys for symmetric block encryption alogrithms”

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu. M. Penkin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Penkin, Y.M., Khara, G.I., Fedoseeva, A.A. (2021). The New Cryptographic Method for Software and Hardware Protection of Communication Channels in Open Environments. In: Radivilova, T., Ageyev, D., Kryvinska, N. (eds) Data-Centric Business and Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 48. Springer, Cham. https://doi.org/10.1007/978-3-030-43070-2_26

Download citation

Publish with us

Policies and ethics