Formation of Unique Characteristics of Hiding and Encoding of Data Blocks Based on the Fragmented Identifier of Information Processed by Cellular Automata †
Abstract
:1. Introduction
2. Related Studies
3. Materials and Methods
3.1. Data Conversion Scheme
3.2. Mathematical Model
- In accordance with the matrix bypass rule, the current bit of the processed data matrix segment is taken. In the simplest case of traversal (line by line from left to right) the first is the upper left bit.
- According to the formula (3), the coordinate of the center of the PRN is determined, the unit values of the bits of which determine the neighbors involved in the conversion of the current data bit. Thus, when moving along a segment, movement along the cipher matrix occurs.
- Due to the fact that matrix expansion along the perimeter is not required, a logical operation of the current matrix bit and single bits from the existing ones (taking into account the boundaries of the processed segment) and marked with the PRN rule is performed.
- If the result obtained in the previous step differs from the value of the current bit, it is inverted.
- If not the entire segment is processed, then the transition to the next bit is performed in accordance with the bypass rule.
- The processed chain of bits in the form of a matrix-result is unloaded into the output buffer, this completes the processing.
- The sign of processing the entire data stream is set to true when all segments created at the task scheduler level are processed.
3.3. Conversion Algorithm
4. Results and Discussion
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Harper, A.; Regalado, D.; Linn, R.; Sims, S.; Spasojevic, B.; Martinez, L.; Baucom, M.; Eagle, C.; Harris, S. Gray Hat Hacking: The Ethical Hacker’s Handbook; McGraw-Hill Education: New York, NY, USA, 2018; 640p. [Google Scholar]
- Liang, W.; Huang, Y.; Xu, J.; Xie, S. A distributed data secure transmission scheme in wireless sensor network. Int. J. Distrib. Sens. Netw. 2017, 13. [Google Scholar] [CrossRef] [Green Version]
- Rastogi, R.; Mishra, R.; Sharma, S.; Nigam, A.; Arya, P. Security of data transmission using logic gates and crypt analysis. In Proceedings of the 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 11–13 March 2015; pp. 101–105. [Google Scholar]
- Kaminsky, A.; Kurdziel, M.; Radziszowski, S. An overview of cryptanalysis research for the advanced encryption standard. In Proceedings of the IEEE Military Communications Conference 2010 (MILCOM 2010), San Jose, CA, USA, 31 October–3 November 2010; pp. 1853–1859. [Google Scholar]
- Marukhlenko, A.L.; Plugatarev, A.V.; Bobyntsev, D.O. Complex Evaluation of Information Security of an Object with the Application of a Mathematical Model for Calculation of Risk Indicators. In Lecture Notes in Electrical Engineering; Springer: Cham, Switzerland, 2019; pp. 771–778. [Google Scholar] [CrossRef]
- Borzov, D.B.; Chesnokova, E.O.; Marukhlenko, A.L.; Al-Ashval, M.M.Y. Search Device for Lower Estimation of Placement in Fully Connected Matrix Systems with Bi-Directional Transmission of Information. Russian Patent RUS 2421805, 24 November 2008. [Google Scholar]
- Tanygin, M.O.; Alshaia, H.Y.; Altukhova, V.A.; Marukhlenko, A.L. Establishing a confidence channel for exchanging data between a source and a receiver of information using the modified one-time password method. J. Izv. SWSU 2018, 8, 63–71. [Google Scholar]
- Sagheer, A.M.; Al-Ani, M.S.; Mahdi, O.A. Ensure Security of Compressed Data Transmission. In Proceedings of the Sixth International Conference on Developments in Systems Engineering, Abu Dhabi, UAE, 16–18 December 2013; pp. 270–275. [Google Scholar]
- Marukhlenko, A.L.; Seleznev, K.D.; Tanygin, M.O.; Marukhlenko, L.O. Organization of a network monitoring and assessment system for the information security status of an object. J. Izv. SWSU 2019, 23, 118–129. [Google Scholar] [CrossRef] [Green Version]
- Kuliamin, V.V.; Petrenko, A.K.; Pakoulin, N.V.; Kossatchev, A.S.; Bourdonov, I.B. Integration of Functional and Timed Testing of Real-Time and Concurrent Systems. In Perspectives of System Informatics, PSI 2003, LNCS Vol. 2890; Springer: Berlin/Heidelberg, Germany, 2019; pp. 450–461. [Google Scholar]
- Toffoli, T.; Margolus, N. Machines of cellular automata. In Theoretical Computer Science; EATCS Series; Mir: Moscow, Russia, 1991; 280p. [Google Scholar]
- Wuensche, A. Cellular automata encryption: The reverse algorithm, Z-parameter and chain-rules. J. Parallel Process. Lett. 2009, 19, 283–297. [Google Scholar] [CrossRef]
- Klyucharyov, P.G. Investigation of strength of block ciphers based on generalized cellular automata against linear cryptanalysis. J. Sci. Educ. Bauman MSTU 2013, 5, 235–246. [Google Scholar] [CrossRef]
- Kari, J. Reversibility and surjectivity problems of cellular automata. J. Comput. Syst. Sci. 1994, 48, 149–182. [Google Scholar] [CrossRef] [Green Version]
- Seredynski, M.; Bouvry, P. Block cipher based on reversible cellular automata. CEC 2004, 2, 2138–2143. [Google Scholar]
- Saracevic, M.; Adamovic, S.; Bisevac, E. Applications of Catalan numbers and Lattice Path combinatorial problem in cryptography. Acta Polytech. Hung. 2018, 15, 91–110. [Google Scholar]
- Saracevic, M.; Adamovic, S.; Miskovic, V.; Macek, N.; Sarac, M. A novel approach to steganography based on the properties of Catalan numbers and Dyck words. Future Gener. Comput. Syst. 2019, 100, 186–197. [Google Scholar] [CrossRef]
- Rososhek, S.K.; Borovkov, S.I.; Evsyutin, O.O. Cryptosystems of cellular automata. J. Appl. Discret. Math. 2008, 1, 43–49. [Google Scholar]
- Asyutikov, A.A.; Dobritsa, V.P.; Efremov, M.A.; Zarubin, D.M. A cellular automata on a partition in encryption. J. Inf. Secur. Socio-Tech. Syst. 2017, 1, 72–79. [Google Scholar]
- Khoroshilov, A.V.; Kuliamin, V.V.; Petrenko, A.K. Verification of Operating System Components. J. Syst. Inform. 2017, 10, 11–12. [Google Scholar]
- Bista, R.; Jo, K.; Chang, J. A New Approach to Secure Aggregation of Private Data in Wireless Sensor Networks. In Proceedings of the IEEE International Conference on Dependable, Autonomic and Secure Computing, Chengdu, China, 12–14 December 2009; pp. 394–399. [Google Scholar]
- Clarridge, A.; Salomaa, K. A cryptosystem based on the composition of reversible cellular automata. In Language and Automata Theory and Applications, LNCS Vol. 5457; Dediu, A., Ionescu, A., Martın-Vide, C., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 314–325. [Google Scholar]
- Fu, S.; Kuai, X.; Zheng, R.; Yang, G.; Hou, Z. Compressive sensing approach based mapping and localization for mobile robot in an indoor wireless sensor network. In Proceedings of the IEEE International Conference on Networking, Sensing and Control (ICNSC), Chicago, IL, USA, 10–12 April 2010; pp. 122–127. [Google Scholar]
- Luo, C.; Wu, F.; Sun, J.; Chen, C. Compressive data gathering for largescale wireless sensor networks. In Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, Beijing, China, 20–25 September 2009; pp. 145–156. [Google Scholar]
- Tanygin, M.O.; Alshaeaa, H.Y.; Altukhova, V.A. Establishing Trusted Channel for Data Exchange between Source and Receiver by Modified One-time Password Method. In Proceedings of the International Russian Automation Conference (RusAutoCon), Sochi, Russia, 8–14 September 2019; pp. 1–5. [Google Scholar]
- Tanygin, M.O.; Alshaeaa, H.Y.; Efremov, M.A. Analysis of the Secure Data Transmission System Parameters. In Proceedings of the International Russian Automation Conference (RusAutoCon), Sochi, Russia, 8–14 September 2019; pp. 675–683. [Google Scholar]
- Seredynski, M.; Bouvry, P. Block encryption using reversible cellular automata. In Cellular Automata, ACRI 2004, LNCS Vol. 3305; Sloot, P.M.A., Chopard, B., Hoekstra, A.G., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 785–792. [Google Scholar]
Matrix Element | |||||||||
---|---|---|---|---|---|---|---|---|---|
Bit Serial Number | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kuleshova, E.; Marukhlenko, A.; Dobritsa, V.; Tanygin, M. Formation of Unique Characteristics of Hiding and Encoding of Data Blocks Based on the Fragmented Identifier of Information Processed by Cellular Automata. Computers 2020, 9, 51. https://doi.org/10.3390/computers9020051
Kuleshova E, Marukhlenko A, Dobritsa V, Tanygin M. Formation of Unique Characteristics of Hiding and Encoding of Data Blocks Based on the Fragmented Identifier of Information Processed by Cellular Automata. Computers. 2020; 9(2):51. https://doi.org/10.3390/computers9020051
Chicago/Turabian StyleKuleshova, Elena, Anatoly Marukhlenko, Vyacheslav Dobritsa, and Maxim Tanygin. 2020. "Formation of Unique Characteristics of Hiding and Encoding of Data Blocks Based on the Fragmented Identifier of Information Processed by Cellular Automata" Computers 9, no. 2: 51. https://doi.org/10.3390/computers9020051
APA StyleKuleshova, E., Marukhlenko, A., Dobritsa, V., & Tanygin, M. (2020). Formation of Unique Characteristics of Hiding and Encoding of Data Blocks Based on the Fragmented Identifier of Information Processed by Cellular Automata. Computers, 9(2), 51. https://doi.org/10.3390/computers9020051