Abstract
The subject of the research is methods and algorithms for developing the GERT networks that provide a hidden transition along the branches of the control logic graph and the ability to encode digital watermarks in the context of existing threats to the licensing security of software systems. The aim of the work is to develop a system of a software product licensed security based on hidden transition algorithms in GERT networks that carry the properties of digital watermarks. The article solves the following goal: development of a model of a software licensed security system based on the developed algorithms using GERT networks. Methods of mathematical modeling, numerical experiment, complexity theory and cryptography are used. The following results were obtained: on the basis of the analysis of existing models for ensuring software licensed security, the main requirements for the algorithms synthesized within the framework of the developed model, as well as for the machine implementation of the algorithm, were identified. Based on the investigation of existing watermark systems, methods of attack on them, as well as the requirements put forward for the developed model, a licensing security algorithm was formed based on the watermark system. Conclusions: for the first time, algorithms for safe transition in GERT-networks were developed, which are used as a graph of the control logic of a software product. This logic is implemented depending on the identification or serial number; a model of a licensed security system has been developed, which has not only empirical, but also theoretical substantiation of resistance to attacks by an intruder.
Publisher
Ivan Kozhedub Kharkiv National Air Force University KNAFU
Reference28 articles.
1. Henk, C.A. and Tiborg, V. (2007), Encyclopedia of cryptography and security, Eindhoven University of Technology. Springer, Boston, MA, 684 p. https://doi.org/10.1007/978-1-4419-5906-5.
2. Kumar, P. and Kumar, V.R. (2019), Secure Cyber Network to Sharing Information through Cryptography & Stenography, Engineering technology open access journal, Vol. 2 Is. 5, pp. 129-133. https://doi.org/10.19080/ETOAJ.2019.02.555598.
3. Myles, G. and Collberg, C. (2004), Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks, Information Security and Cryptology - ICISC 2003. ICISC 2003. Lecture Notes in Computer Science, Vol. 2971. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24691-6_21.
4. Nematollahi, M.A., Vorakulpipat, C. and Rosales, H.G. (2017), Software Watermarking, Digital Watermarking, Springer Topics in Signal Processing, Vol 11. Springer, Singapore. https://doi.org/10.1007/978-981-10-2095-7_9.
5. Barak, B. (2001), On the (Im)possibility of Obfuscating Programs, Cryptology - CRYPTO 2001. CRYPTO 2001, Lecture Notes in Computer Science, Vol. 2139, Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44647-8_1.