cryptography

An efficient and lightweight image encryption technique using Lorenz chaotic system

In the past few years, to store and transmit image data securely, numerous research initiatives on image encoding have been conducted.  The primary objective of the image encryption technique is to safeguard the image by sabotaging the pixel pattern.

Research and Improvement of Computing Algorithms for Calculating the Trigonometrical Coefficients of the Hashing Algorithm MD5

The paper examines the problems of ensuring the authenticity of messages, as well as analyzes the modern requirements for hash functions and the problems of designing algorithms for calculating hash functions.

Maximal extractable value (MEV) in blockchain networks and its impact on blockchain ecosystem

The advent of smart contract technology in blockchain networks has ushered in a new era of possibilities for implementing complex decentralized finance protocols. Over time, these protocols have gained significant traction, reaching a Total Value Locked (TVL) of over 150 billion US dollars. While blockchain networks offer inherent benefits such as immutability, transparency, decentralization, and security, they still grapple with a critical challenge – the inability to ensure a predictable order of transactions within produced blocks.

Synthesis method for s-boxes based on galois field transform matrices

Cryptographic methods today are a crucial tool for constructing information security systems. At the same time, to solve the problem of encrypting large amounts of information, block or stream symmetric ciphers are mainly preferred because of their efficiency and proven cryptographic strength, including against perspective quantum cryptanalysis.

Concept of usage of modified block ciphers in telecommunications environments of cyberphysical systems

This research work proposes concept of usage of modified block ciphers combining with widely used security methods. The proposed concept is based on the analysis of peculiarities of functioning and characteristics of telecommunications environments of cyberphysical systems. Peculiarities of usage of the newly introduced cryptography method on the basis of static and dynamic inclusion of masking symbols are overviewed.