Abstract
The urgency of the work is determined by the need to transfer confidential information through open communication channels. Such information can be of two types: symmetric encryption keys and directly informational messages that are encrypted with encryption keys. The article deals with the problem of improving the transmission of closed information over open channels using the Diffie- Hellman algorithm. The improvement is due to the introduction of a new type of one-sided function based on the numerical solution of the system of ordinary differential equations describing the dynamics of the phase coordinate movement of the strange attractor. For this purpose, the classic Diffie-Hellman algorithm based on the one-sided function of the discrete logarithm was considered. The required properties of one-sided functions in the general case were considered. Next, the peculiarities of algorithm modification in the case of transition to a one-sided function based on the use of a strange attractor were considered. It is assumed that at the beginning of the operation of the modified algorithm, through a secret channel, the exchange parties (agents) exchange information regarding the properties of the strange attractor to be used, namely, the definition of the differential equations describing the dynamics of a strange attractor, the values of the parameters of the equations, the initial integration conditions and the integration step (for methods with a constant step of integration). After that, all exchanges are conducted exclusively through open channels. The paper also considers the case of information exchange between more than two agents, in particular, the approach of hiding the number of agents participating in the exchange. Approbation of the method is carried out and intermediate and final results of the one-sided function based on strange attractors are given. Possibilities regarding partial disclosure by agents of certain parameters of the use of one-way functions are discussed. But at the same time, the safety of revealing such information is justified in the general case (both in the classical and in the modified Diffie-Hellman method). It was determined that depending on the needs of users, the complexity of the encryption keys can be increased by changing the initial parameters of the attractor, which will also allow controlling speed of key generation and encryption in general. The software that implements the proposed modified algorithm is implemented in three programming languages, C#, Python, and MatLab. This made it possible to perform a comparative analysis of the results and consciously choose the programming language of individual parts of the software to optimize the encryption key generation process for specific conditions.
Publisher
National Academy of Sciences of Ukraine (Co. LTD Ukrinformnauka) (Publications)
Reference14 articles.
1. 1. Shevchenko V.L., Nesterenko O.V., Netesin I.E., Shevchenko A.V., Polishchuk V.B. Prognostic modeling of computer virus epidemics. - K.: UkrSC IND, 2019. - 152 p.
2. 2. Viktor Shevchenko, Alina Shevchenko. The Epidemiological Approach to Information Security Incidents Forecasting for Decision Making Systems. - 2017 13-th International Conference Perspective Technologies and Methods in MEMS Design (MEMSTECH). Proceeding. - Polyana, April 20-23, 2017. - p.174-177. doi.org/10.1109/MEMSTECH.2017.7937561.
3. 3. Shevchenko Viktor, Alina Shevchenko, Ruslan Fedorenko, Yurii Shmorhun, Asadi Hrebennikov. Designing of Functionally Stable Information Systems Optimal for a Minimum of Losses. - CADSM 2019, 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM), February 26 - March 2, 2019, Polyana-Svalyava (Zakarpattya), UKRAINE, IEEE Ukraine Section, IEEE Ukraine Section (West), MTT/ED/AP/EP/SSC Societies Joint Chapter Part Number: CFP19508-USB ISBN: 978-1-7281-0053-1 pp.36-40.
4. 4. Mitsuru Matsui Robert - Selected Areas in Cryptography / Zuccherato Henri Gilbert, Helena Handschuh // Security Analysis of SHA-256 and Sisters
5. - August 14 - August 15, 2003, Ottawa, Canada, pp. 175 - 193. doi.org/10.1007/978-3-540-24654-1_13