Abstract
The article proposes a cryptosystem with symmetric keys, where the keys are functions of a real variable. These functions can be either continuous or discrete and must satisfy certain constraints. The number of key functions is determined by the number of binary digits that encode a character in the ASCII table. Each binary digit has its own key function. The cipher of a character is represented by a one-dimensional array of real numbers. These numbers are obtained by summing the key functions, which correspond to “1” in the ASCII code of the character. The amplitudes of these functions are random and unknown to the receiving party. Decryption is a multi-level process, in which integral disproportion functions are calculated at each level. To increase the cryptographic strength, the encryption/decryption process involves a permutation of the key-functions according to a secret scheme agreed upon by both parties. Computer simulation has demonstrated the high cryptographic resistance of the proposed system to the determination of the coefficients within the key functions, as well as to the rearrangement of the key functions themselves. It is shown that adjacent identical symbols in an encrypted message have different ciphers, which also complicates hacking the system.
Publisher
National Academy of Sciences of Ukraine (Co. LTD Ukrinformnauka) (Publications)
Reference20 articles.
1. 1. FIPS. (2001). Specification for the ADVANCED ENCRYPTION STANDARD (AES). In Federal Information Processing Standards Publication. https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.197.pdf
2. 2. Courtois, N. T. (2012). Security Evaluation of GOST 28147-89 in View of International Standardisation. In Cryptologia (Vol. 36, Issue 1). https://doi.org/10.1080/01611194.2011.632807
3. 3. Rivest, R. L., Shamir, A., Adleman, L. (1978). A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2). https://doi.org/10.1145/359340.359342
4. 4. Ladd, T. D., Jelezko, F., Laflamme, R., Nakamura, Y., Monroe, C., O'Brien, J. L. (2010). Quantum computers. Nature, 464(7285), 45-53. https://doi.org/10.1038/nature08812
5. 5. Ostrianska, Y. V., Yesina, M. V., Gorbenko, I. D. (2022). Analysis of views of the European Union on quantum-post-quantum limitations. Radiotekhnika, 210. https://doi.org/10.30837/rt.2022.3.210.06