Development of Mobile Facilities of Neuro-like Cryptographic Encryption and Decryption of Data in Real Time

2021;
: pp. 84 - 95
1
Lviv Polytechnic National University, Lviv, Ukraine
2
Department of Radio Physics and Computer Technologies Ivan Franko National University of Lviv
3
Lviv Polytechnic National University, Lviv, Ukraine

The requirements are formed, the method is chosen and the main stages of development of mobile means of neuro-like cryptographic encryption and real-time data decryption are considered. It is shown that the development of mobile means of neuro-like cryptographic encryption and decryption of real-time data with high efficiency of equipment is reduced to minimize hardware costs while providing a variety of requirements, characteristics and limitations. The tabular-algorithmic method of calculating the scalar product has been improved. Namely, the ability to work with floating-point operands has been added and it is focused on hardware and software implementation. Developed on the basis of a universal processor core, supplemented by specialized modules, mobile means of neuro-like cryptographic encryption and data decryption. Which due to the combination of universal and specialized approaches, software and hardware provides effective implementation of algorithms for cryptographic encryption and decryption of data in real time. It is proposed to use a multioperand approach, tables of macroparticle products and bases of elementary arithmetic operations to achieve high technical and economic indicators in the implementation of specialized modules of neuro-like cryptographic encryption and real-time data decryption. Specialized modules of neuro-like cryptographic encryption and data decryption have been implemented using the VHDL hardware programming language and the Quartus II development environment (version 13.1) on the FPGA. The evaluation of hardware and time parameters of the developed specialized module of neurosimilar cryptographic data decryption is carried out.

  1. Volna E., Kotyrba M., Kocian V., Janosek M. (2012). Cryptography Based On Neural Network. Proceedings of the 26th European Conference on Modeling and Simulation, pp. 386-391. phttps://doi.org/10.7148/2012-0386-0391
  2. Shihab K. (2006). A backpropagation neural network for computer network security. Journal of Computer Science, Vol. 2, No. 9, pp. 710-715. phttps://doi.org/10.3844/jcssp.2006.710.715
  3. Sagar V., Kumar K. (2014). A Symmetric Key Cryptographic Algorithm Using Counter Propagation Network (CPN). Proceedings of the 2014 ACM International Conference on Information and Communication Technology for Competitive Strategies, ISBN 978-1-4503-3216-3. phttps://doi.org/10.1145/2677855.2677906
  4. Arvandi M., Wu S., Sadeghian A., Melek W.W., Woungang I. (2006). Symmetric cipher design using recurrent neural networks. Proceedings of the IEEE International Joint Conference on Neural Networks, pp. 2039- 2046. phttps://doi.org/10.1109/IJCNN.2006.246972
  5. Tsimbal Yu. V. (2018). Neural network method of symmetric data encryption. Bulletin of the National University «Lviv Polytechnic». Series: Information systems and networks. № 901. S. 118-122.
  6. Tsmots I., Tsymbal Y., Skorokhoda O., Tkachenko R. (2019). Neural-like methods and hardware structures for real-time data encryption and decryption. Computer Science and Information Technology, CSIT-2019: Proceedings of the XIV International Scientific and Technical Conference, September 17-20, 2019, Lviv, Ukraine. C. 248-253. phttps://doi.org/10.1109/STC-CSIT.2019.8929809
  7. Khavalko Viktor, Tsmots Ivan. (2019). Image classification and recognition on the base of autoassociative neural network usage. 2019 IEEE 2-nd Ukraine conference on electrical and computer engineering, UKRCON-2019 : conference proceedings (Lviv, Ukraine, July 2-6, 2019). C. 1118-1121. phttps://doi.org/10.1109/UKRCON.2019.8879774
  8. Tsmots Ivan, Rabyk Vasyl, Skorokhoda Oleksa, Teslyuk Taras. (2019). Neural element of parallel-stream type with preliminary formation of group partial products. Electronics and information technologies (ELIT-2019) : proceedings of the XI-th International scientific and practical conference, 16 -18 September, 2019, Lviv, Ukraine. C. 154-158. phttps://doi.org/10.1109/ELIT.2019.8892334
  9. Tsmots I., Rabyk V., Skorokhoda O., Tsymbal Y. (2021). Neural-like real-time data protection and transmission system. Advances in Intelligent Systems and Computing (AISC). Vol. 1293 : Advances in Intelligent Systems and Computing V. Selected papers from the International conference on computer science and information technologies. phttps://doi.org/10.1007/978-3-030-63270-0_8
  10. Tsmots I. G, Lukaschuk Yu. A., Havalko V. M, Rabik V. G. (2019). Models of neuro-like element of parallel-parallel type. Modeling and information technology. Vip. 86. S. 119-126.
  11. Tsmots Ivan, Skorokhoda Oleksa, Ignatyev Ihor, Rabyk Vasyl. (2017). Basic Vertical-Parallel Real Time Neural Network Components. Proceedings of XIIth International Scientific and Technical Conference CSIT 2017. 5-8 September 2017. Lviv, Ukraine, pp. 344-347. phttps://doi.org/10.1109/STC-CSIT.2017.8098801
  12. Tsmots I. G, Skorokhoda O. V. (2011). Device for calculating the scalar product. Patent of Ukraine for utility model №66138, bull. № 24.
  13. Tsmots I. G, Skorokhoda O. V., Teslyuk V. M. (2013). Device for calculating the scalar product. Patent of Ukraine for the invention №101922, 13.05.2013 bull. № 9.
  14. Tsmots I. G, Skorokhoda O. V., Medikovsky M. O. (2019). Device for calculating the scalar product. Patent of Ukraine for the invention №118596, 11.02.2019, bull. № 3.
  15. Tsmots I. G, Teslyuk V. M, Teslyuk T. V, Medikovsky M. O, Tsymbal Y. V. (2019). Device for calculating the sums of paired products. Patent of Ukraine № 120210, 25.10.2019, bull. № 20/2019.