Methodology for Forming a High-speed Imitator-resistant Cipher for Multi-alphabet Substitution

Корнієць, Віктор Анатолійович and Жданова, Юлія Дмитрівна (2024) Methodology for Forming a High-speed Imitator-resistant Cipher for Multi-alphabet Substitution Кібербезпека: освіта, наука, техніка, 2 (26). pp. 476-486. ISSN 2663-4023

[thumbnail of V_Korniets_Y_Zhdanovа_CEST_2(26)_2024_.pdf] Text
V_Korniets_Y_Zhdanovа_CEST_2(26)_2024_.pdf - Published Version

Download (651kB)

Abstract

The article considers the problems and tasks of forming requirements for the construction of a high-speed imitation-resistant multi-alphabet substitution cipher based on the principles of rotary systems, which is relevant in terms of ensuring cybersecurity of critical infrastructure facilities with an increased risk of disruption of stable operation. The ontological model of the functional security entities of automated process control systems (APCS) at critical infrastructure facilities (CIF) is analysed. It is determined that the tools for improving functional security in this case should be measures and means of cyber defence aimed at preventing the implementation of threats of interception, analysis and imitation of critical technological information and ensuring the adjustment of the chosen security policy. It is emphasised that an important component of the functional security of systems and complexes of critical infrastructure facilities is the protection of critical technological information during its transmission via public communication channels. An effective mechanism for counteracting these threats is the use of a multi-alphabet substitution cipher, for which purpose a corresponding model is proposed, based on the mathematical principles of constructing rotary encryption systems, which, within the framework of the model, are devoid of their inherent vulnerabilities. The model provides a two-stage transformation of open data using data from a pseudorandom sequence generator, which is a modified model of the A5/1 algorithm that has the necessary functional and cryptographic characteristics. The considered factors of ensuring the cryptographic security of the proposed model allowed us to reasonably propose a high-speed solution for calculating the message authentication code directly in the encryption process.

Item Type: Article
Uncontrolled Keywords: cybersecurity; encryption; cryptography; cryptographic protection; crypto algorithm; threat; information protection; confidentiality; integrity; tamper resistance, critical infrastructure object
Subjects: Статті у періодичних виданнях > Фахові (входять до переліку фахових, затверджений МОН)
Divisions: Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки ім. професора Володимира Бурячка
Depositing User: Ю. Д. Жданова
Date Deposited: 03 Apr 2025 10:33
Last Modified: 03 Apr 2025 10:33
URI: https://elibrary.kubg.edu.ua/id/eprint/51447

Actions (login required)

View Item View Item