SECURING INFORMATION SYSTEMS USING FRACTAL GEOMETRY

Marta Blahová
{"title":"SECURING INFORMATION SYSTEMS USING FRACTAL GEOMETRY","authors":"Marta Blahová","doi":"10.5593/sgem2022/2.1/s07.11","DOIUrl":null,"url":null,"abstract":"This article deals with the use of the principles of fractal geometry applicable in the field of cryptographic security of communication within information systems. The theory of the proposed solution is based on the field of iterative fractals created using the TEA (Time Escape Algorithm) algorithm. The introductory part deals with the issue of choosing a suitable category of fractals for the purpose of securing information systems. The next part deals with the issue of generation, analysis of fractal structures, which is a prerequisite for the implementation of the proposed encryption process. The outputs from the performed fractal analysis are also used for the decryption process. The methodology of testing the proposed solution against cryptanalytic methods is described here. In the final part, the individual elements of the proposed process were implemented using a programmed interface in C #. It continues by testing the resistance of the given encryption method to cryptanalytic methods. Statistical methods, analytical methods, and brute force attacks were used to investigate resilience. \nThe acquired knowledge proved the usability of the proposed solution for the selected area of its use.aim of this research is to design a suitable design for a diagnosticdevice that will periodically monitor and record selected quantities in the device. The diagnostic equipment must be as flexible as possible, as the design will be applicable to all output electronic equipment of this project. This means that the diagnostic design can be applied to all control units, add-on modules or turnstile controllers. Each checked element contains different quantities that are valid for correct diagnostics. Therefore, there is a desire for a uniform design that can be customized based on the device. The main benefit is finding a way to secure data against unwanted retrieval of its content. The involvement of the branch of fractal geometry in the field of information security opens up new possibilities, given the different conception of fractals, in contrast to the objects of classical Euclidean or other geometry. The proposed system works with complex fractal structures, which can be described by relatively trivial equations, which allows using this system with high speed both for encoding the message and for its retrospective reconstruction. This fact opens the way to the use of the proposed system for information security even in devices with limited computing capacity. The system emphasizes resistance to cryptanalytic methods, such as brute force attack, statistical methods, or analytical methods.","PeriodicalId":375880,"journal":{"name":"22nd SGEM International Multidisciplinary Scientific GeoConference Proceedings 2022, Informatics, Geoinformatics and Remote Sensing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"22nd SGEM International Multidisciplinary Scientific GeoConference Proceedings 2022, Informatics, Geoinformatics and Remote Sensing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5593/sgem2022/2.1/s07.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This article deals with the use of the principles of fractal geometry applicable in the field of cryptographic security of communication within information systems. The theory of the proposed solution is based on the field of iterative fractals created using the TEA (Time Escape Algorithm) algorithm. The introductory part deals with the issue of choosing a suitable category of fractals for the purpose of securing information systems. The next part deals with the issue of generation, analysis of fractal structures, which is a prerequisite for the implementation of the proposed encryption process. The outputs from the performed fractal analysis are also used for the decryption process. The methodology of testing the proposed solution against cryptanalytic methods is described here. In the final part, the individual elements of the proposed process were implemented using a programmed interface in C #. It continues by testing the resistance of the given encryption method to cryptanalytic methods. Statistical methods, analytical methods, and brute force attacks were used to investigate resilience. The acquired knowledge proved the usability of the proposed solution for the selected area of its use.aim of this research is to design a suitable design for a diagnosticdevice that will periodically monitor and record selected quantities in the device. The diagnostic equipment must be as flexible as possible, as the design will be applicable to all output electronic equipment of this project. This means that the diagnostic design can be applied to all control units, add-on modules or turnstile controllers. Each checked element contains different quantities that are valid for correct diagnostics. Therefore, there is a desire for a uniform design that can be customized based on the device. The main benefit is finding a way to secure data against unwanted retrieval of its content. The involvement of the branch of fractal geometry in the field of information security opens up new possibilities, given the different conception of fractals, in contrast to the objects of classical Euclidean or other geometry. The proposed system works with complex fractal structures, which can be described by relatively trivial equations, which allows using this system with high speed both for encoding the message and for its retrospective reconstruction. This fact opens the way to the use of the proposed system for information security even in devices with limited computing capacity. The system emphasizes resistance to cryptanalytic methods, such as brute force attack, statistical methods, or analytical methods.
使用分形几何保护信息系统
本文讨论了分形几何原理在信息系统通信加密安全领域的应用。所提出的解决方案的理论是基于使用TEA (Time Escape Algorithm)算法创建的迭代分形域。引言部分讨论了为了保护信息系统而选择合适的分形类别的问题。下一部分讨论了分形结构的生成和分析问题,这是实现所提出的加密过程的先决条件。执行分形分析的输出也用于解密过程。这里描述了针对密码分析方法测试所提出的解决方案的方法。在最后一部分中,使用c#编程接口实现了所提出流程的各个元素。它继续测试给定的加密方法对密码分析方法的抵抗力。使用统计方法、分析方法和蛮力攻击来调查弹性。所获得的知识证明了所提出的解决方案在其使用的选定领域的可用性。本研究的目的是设计一种合适的诊断设备设计,该设备将定期监测和记录设备中的选定数量。诊断设备必须尽可能灵活,因为该设计将适用于本项目的所有输出电子设备。这意味着诊断设计可以应用于所有控制单元,附加模块或旋转门控制器。每个被检查的元素包含不同的数量,这些数量对于正确的诊断是有效的。因此,人们希望有一种统一的设计,可以根据设备定制。主要的好处是找到一种方法来保护数据,防止对其内容进行不必要的检索。分形几何分支在信息安全领域的参与开辟了新的可能性,考虑到分形的不同概念,与古典欧几里得或其他几何的对象形成对比。所提出的系统适用于复杂的分形结构,这些分形结构可以用相对简单的方程来描述,这使得该系统可以高速地对信息进行编码和追溯重建。这一事实为在计算能力有限的设备中使用所建议的信息安全系统开辟了道路。该系统强调抵抗密码分析方法,如蛮力攻击、统计方法或分析方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信