Abstract
The chapter is devoted to presenting theoretical bases and features of practical realization the new cryptographic method for software and hardware protection of communication channels in open environments. In the theoretical part of the chapter is shown the possibility of modeling the modes of deterministic chaos in the oscillations of discrete structures formed in the form of special matrix forms of the Latin square. A mathematical model is proposed for such discrete systems, on the basis of which an analysis of the combination of conditions for discrete structures and the requirements for transformations of their evolution operators ensuring the achievement of such modes is carried out. The results of simulation modeling of oscillatory processes according to the cycles of states of a discrete system, forming similarities of attractor trajectories, are presented. The possibility of simulating oscillation beat modes in discrete cellular structures organized in the form of two-level matrix forms of Sudoku grids is substantiated. The results of simulation modeling of oscillation beats in cycles of varying states of a discrete system for two types of beats are presented: similar to the result of the superposition of harmonic oscillations at multiple frequencies in the theory of radio signals, as well as noise-like beats. Analyzed the principles of creating devices to implement a closed communication channel in an open data transmission environment. To solve the protection problem, it is proposed to use the AES standard cryptographic algorithm, supplemented by the author’s system of dynamic generation of encryption keys. Is presented the description of the system for generating encryption keys, which based on the combinatorial properties of matrix structures in the Sudoku grids form. Are shown the results of external software testing of cipher text code sequences and computer tests of the proposed algorithm. Using the modified AES cryptographic algorithm, a working model of the system for protecting a remote control of a mobile object over the radio channel has been built.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Moldovyan AA et al (2002) Cryptography: high-speed ciphers. BHV-Peterburg, 496 p. (in Russian)
Andronov AA, Vitt AA, Haykin SE (1981) Oscillation theory. Moscow, Nauka, 568 p. (in Russian)
Lorenz E (1981) Deterministic non-periodic flow. In: Strange attractors, Moscow, Mir, pp 88–117. (in Russian)
Grebogi C, Ott E, Pelikan S, Yorke JA (1981) Strange attractors that are not chaotic. Phys D, Nonlinear Phenom 261–268
McKay BD, Wanless IM (2005) On the number of Latin squares. Ann Combin 335–344
Russel, Jarvis AF (2019) Mathematics of Sudoku II. www.afjarvis.staff.shef.ac.uk/sudoku/russell_jarvis_spec2.pdf, last accessed 2019/11/21
McGuire G, Tugemann B, Civario G (2013) There is no 16-Clue Sudoku: solving the Sudoku minimum number of clues problem, 43
Crook JF (2009) A pencil-and-paper algorithm for solving Sudoku puzzles. Not Am Math Soc 460–468
Ercsey-Ravasz M, Toroczkai Z (2012) The chaos within sudoku. Sci Rep 2:725. https://doi.org/10.1038/srep00725
Pikovsky A, Rosenblum M, Kurths J (2002) Synchronization: a universal concept in nonlinear sciences. Cambridge University Press, 411 p
RF patent No. 2309549 dated 10.27.2007. The method of cryptographic conversion of digital data
Patent of Ukraine for utilitiy model No. 129836 dated November 12, 2018 “A method for generating keys for symmetric block encryption alogrithms”
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Penkin, Y.M., Khara, G.I., Fedoseeva, A.A. (2021). The New Cryptographic Method for Software and Hardware Protection of Communication Channels in Open Environments. In: Radivilova, T., Ageyev, D., Kryvinska, N. (eds) Data-Centric Business and Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 48. Springer, Cham. https://doi.org/10.1007/978-3-030-43070-2_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-43070-2_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43069-6
Online ISBN: 978-3-030-43070-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)