encryption

RSA ALGORITHM IN FRACTIONAL-RATIONAL N-ARY FORMS WHILE ENCRYPTION-DECRYPTION OF MONOCHROME IMAGES

The basis for image protection is the assumption that the image is a stochastic signal. But the image is a specific signal that possesses, in addition to typical informativeness (informativeness of data), also visual informativeness, which brings new challenges to the issue of protection. Therefore, the urgent task is to implement such application of the RSA algorithm that when encrypting an image: – the cryptographic stability of the RSA algorithm did not deteriorate; – achieves full image noise to prevent the use of visual image processing methods.

BIT OPERATIONS WITH ELEMENTS OF THE RSA ALGORITHM IN ENCRYPTION-DECRYPTION OF COLOR IMAGES

An image as a stochastic signal is one of the most common forms of information. Protecting images from unauthorized access and applying is a correspondingly urgent task. This causes the use of well-known classical encryption methods in the case of image encryption. But the image is a signal that possesses, in addition to typical informativeness, also visual informativeness. Informativeness for modern image processing methods makes it possible to ensure unauthorized access.

Розробка безпровідної системи завадостійкої сигналізації на базі технології LORA

The paper is devoted to the development of a wireless noise-proof system with feedback based on LoRa
technology. The relevance of the work lies in the fact that the issue of protecting your property from burglars is
always on the agenda. It is also important that the alarm system is universal, it should also be an inexpensive
thing that would pay for itself in a short period of time, while at the same time providing a high level of
protection. Currently, the next problem is that to buy even a simple protection system you will have to pay

Using Improved Homophonic Encryption on the Example of Code Zodiac Z408 to Transfer Encrypted Information Based on Data Traffic

The improvement of homophonic encryption using the well-known Z408 cipher as an example has been examined in this article. Their problems to further correct the main shortcomings of this type of encryption have been analyzed. In the practical part, an encryption system similar to Z408 has been created and the complexity of the language analysis for this cipher has been increased. The correlation data of the number of alternative characters has been used to improve the transmission of encrypted data depending on the load of the device.

Encryption of text messages using multilayer neural networks

The article considers an algorithm for encrypting / decrypting text messages using multilayer neural networks (MLNN). The algorithm involves three steps: training a neural network based on the training pairs formed from a basic set of characters found in the text; encryption of the message using the weight coefficients of the hidden layers; its decryption using the weight coefficients of the output layer. The conditions necessary for successful encryption / decryption with this algorithm are formed, its limitations are emphasized.

BINARY LINEAR TRANSFORMATIONS IN MODIFICATIONS OF RSA ALGORITHM OF IMAGES

The images are one of the most used kinds of the information in modern information company. Therefore actual problems is the organization of protection from unauthorized access and usage. An important characteristic of the image is the presence of contours in the image. The task of contour selection requires the use of operations on adjacent elements that are sensitive to change and suppress areas of constant levels of brightness, that is, contours are those areas where changes occur, becoming light, while other parts of the image remain dark.

RSA ALGORITHM ELEMENTS IN TERNARY AFFINE TRANSFORMATIONS IN ENCRYPTION-DECRYPTION OF IMAGES

Regarding image encryption, a crucial task is to implement the application of such an RSA algorithm which will provide an opportunity:

– not to decay the cryptographic stability of the RSA algorithm;

– to ensure complete noisiness of an image to prevent the application of methods of visual image processing.

Decentralized access management scheme to the cloud data storage

Consideration is given to enhancing storage security and maintaining data access control in cloud storage. Existing ways of controlling such access are analyzed. An enhancement of the encryption technique is proposed, based on the attributes of the ciphertext policy and its application in a decentralized data access management system in multi-user cloud storage systems. The main objective is to improve the security and privacy of the management of the cloud storage for which the existing management does not meet all the necessary requirements.

Encryption and decryption of grayscale and color images

Images used as a stochastic signal are among the most commonly used types of information. Accordingly, the actual task is to protect such images from unauthorized access and use. This leads to the use of known classic encryption methods in the case of image encryption. Offered algorithms of encryption-decryption are intended for the use of images in grayscale and are based on using the ideas of basic RSA algorithm. Encryption – decryption can be carried out with extra noising and without too.

Побітові операції й елементи алгоритму RSA в шифруванні-дешифруванні кольорових зображень.

Described combination of elements of the RSA algorithm and a bit-wise operations for the joint use for encryption - interpretation of images. Encryption - decryption is performed without additional noise.