id: 38619
Title: A cryptographic protocol for creating a joint secret key-permutation of significant dimension and its modeling
Authors: Kychak V., Krasilenko V., Nikitovych D.A.
Keywords: matrix-algebraic model, matrix representations, isomorphic permutation key, cryptogram, cryptographic transformations, affine-permutation cipher, protocol, matrix-type cryptosystem
Date of publication: 2025-03-25 08:46:20
Last changes: 2025-03-25 08:46:20
Year of publication: 2025
Summary: The significant growth of information volumes, the rapid development of mass communications, telecommunication networks, the latest tools and means of information technology have led to the increasingly widespread use of image and video processing technologies. Since video processing is the most general and promising area of image processing in the latest research and development of such equipment, in this work we will focus our attention on advanced technologies of masking, encryptiondecryption of images and frames of video files, which require the creation of appropriate secret keys for their joint use by a certain group of users. The paper considers the issues of creating a so-called cooperative protocol for the negotiation of secret keys-permutations of significant dimension by a group of user parties. Various possible types of representations of such keys are considered and the advantages and features of their new isomorphic matrix representations are shown. The need to create such secret keys-permutations is justified to increase the cryptographic stability of matrix affine-permutation ciphers and other cryptosystems of a new matrix type is justified. The results of modeling the main procedures of the proposed protocol for the negotiation of keys in the form of isomorphic permutations of significant dimension are presented, namely, the processes of generating permutation matrices and their matrix powers. Model experiments of the protocol as a whole are described and demonstrated, including accelerated methods of matrix raising permutations to significant powers. For such methods, sets of fixed permutation matrices were used, which are matrix powers of the main permutation matrix. Matrices, i.e. permutation keys, and all procedures over them were given and visualized in their isomorphic representations. The values of fixed matrix powers correspond to the corresponding weights of the bits of the binary or other code representation of the selected random numbers.
URI: http://repository.vsau.org/repository/getfile.php/38619.pdf
Publication type: Доповідь конференції
Publication: Proceedings of the III International Scientific and Practical Conference. Bergen, Norway. 2025. P. 10-22.
In the collections :
Published by: Адміністратор
File : 38619.pdf Size : 1802171 byte Format : Adobe PDF Access : For all
| |
|
|