Abstract

Context. Using the functions of a real variable in cryptosystems as keys allow increasing their cryptographic strength since it is more difficult to select such keys. Therefore, the development of such systems is relevant. Objective. Cryptosystems with symmetric keys are proposed for encrypting and decrypting a sequence of characters represented as a one-dimensional numerical array of ASCII codes. These keys are functions of a real variable that satisfies certain restrictions. They can be both continuous and discrete. Method. Two cryptosystem options are proposed. In the first embodiment, the transmitting and receiving sides select two functions, the first transmitted symbol, the area of the function definition, and the step of changing the function argument. Discrete messages are encrypted by calculating the first-order integral disproportion of the encrypted array using a function. The corresponding value of the second function is added to the obtained cipher of each symbol for scrambling to complicate the analysis of the intercepted message. On the receiving side, the second function is subtracted and decryption performed by the inverse transformation of the formula for integral disproportion. In the second version, sequential encryption is performed when the cipher obtained using one of the key functions in the first stage is encrypted again by calculating the disproportion using the second function, the key. Accordingly, in two stages, decryption is performed. Results. Examples of encryption and decryption of a sequence of text characters are presented. It is shown that the same character is encoded differently depending on its position in the message. In the given examples it is presented the difficulty of key functions parameters choosing and the cryptographic strength of the proposed cryptosystem. Conclusions. Variants of the cryptosystem using the first-order integral disproportion function are proposed, in which the functions of a real variable serve as keys. To “crack” such a system, it is necessary not only to select the form of each function but also to find the values of its parameters with high accuracy. The system has high cryptographic strength.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call