The application of fractal functions for data encryption in information security systems
DOI: 10.31673/2412-4338.2020.011524
Abstract
Information security is an important issue nowadays. Data should be protected from unauthorized users. At present, there are many different text and image encryption methods aimed at providing a high level of security. Fractals, which have an interesting chaotic structure, can be used to develop new document security methods. In the encryption theory, fractal functions are used as reliable detectors for pseudorandom sequences that turn input character sets into a numerical sequence. It is almost impossible to analyse this sequence. However, knowing the initial function and its initial parameters makes it easy to restore the original character set. Fractal objects also help to improve the tools for increasing the quality of printed products protection by means of creating fractal nets that cannot be reproduced with regular copying. This article deals with the development and implementation of a new mathematical model for data encryption based on a class of singular Cantor-type functions. The values of initial sets of these functions are randomly generated. The inverse solution is impossible, because finding the initial digits in the argument image is time-consuming. The algorithm of graphing, the key properties of functions and their use in creating a cryptographic key are investigated. The dependence between the information transmission through the communication channels and the initial numerical function sets and its effect on the increase in the information security are analyzed. The cryptographic stability of the obtained algorithm based on fractal functions and the development of new classes of functions that will give the minimum key size with the maximum stability of the encryption system are the subjects of further research.
Keywords: fractal, fractal functions, singular functions of Cantor type, fractal analysis, data encryption, information security.
References
1. Pratsovytyi M.V. (1998) "Fractal Approach in Singular Distribution Studies". Kyiv: NPU imeni M.P. Draghomanova. 296 p.
2. Zajczeva E.Е., Skoblev В.G. (2007) "Cipher based on the Mandelbrot mapping". Vestnik TGU. Prilozhenie, No. 23. P.107 – 113.
3. Karpukhin A.V., Kirichenko L.O., Gricziv D.I., Tkachenko A.A. (2014) "Application of the methods of nonlinear dynamics and fractal analysis to evaluate the operation of infocommunication systems with the TCP protocol". Elektronnyj zhurnal Cloud of Science, Vol. 1, No. 2. P. 258 – 271.
4. Mandelbrot B. (2002) Nature's fractal geometry. Moskva: Instytut komp’iuternykh doslidzhen. 656 p.
5. Potapov А.А. (2002) Fractals in radiophysics and radiolocation. Moskva: Logos. 664 p.
6. Uelstid S. (2003) Fractals and wavelets to compress images in action. Moskva: Triumf. 320 p.
7. Almazov A.A. (2009) Fractal theory of Forex market. Moskva: Admiral Markets. 291 p.
8. Vorob’ev A.D. (2006) "The use of fractal theory in strategic planning and management". Menedzhment v Rossii i za rubezhom. No. 1. P. 178 – 188.
9. Mandel’brot B. (2004) Fractals, Case and Finance. Moskva-Izhevsk: Regulyarnaya i khaoticheskaya dinamika. 256 p.
10. Mykhailovska O.V. (2009) "Self-organization of the world investment process in the conditions of globalization: possibilities of fractal analysis". Aktualni problemy ekonomiky, No. 1. P. 218 – 228.
11. Peters E. (2004) Fractal analysis of financial markets. Moskva: Internet-Trejding. 286 p.
12. Pratsovytyi M.V., Svynchuk O. V. (2018) "Spread of values a Canor-type fractal continuous nonmonotone function". Neliniini kolyvannia, Vol. 21, No. 1. P. 116 – 130.
13. Loktev A.A., Zaletdinov A.V. (2010) "The use of fractals in the tasks of ensuring information security". Vestnik TGU, No. 15 (2). P. 599 – 604.
14. Kyrychok P.O., Korostil Yu.M., Shevchuk A.V. (2008) Methods of protection of securities and documents of strict accounting. Kyiv: KPI. 368 p.
15. Avramenko V.P., Tkachenko V.P., Chibiriev A.D. (2010) "Methods to improve the quality of information protection based on the use of fractal functions". Bionika intelektu, No. 1 (72). P. 55 – 60.
16. Droniuk I., Rybalko Ye. (2012) "A method of protecting documents based on fractals". Visnyk Natsionalnoho universytetu "Lvivska politekhnika": Komp’iuterni nauky ta informatsiini tekhnolohii. No. 732. P. 389 – 394.
17. Nazarkevych M.A., Droniuk I.M., Troian O.A., Tomashchuk T.Yu. (2015) "Developing a Method for Securing Documents with Fractal-Based Latent Elements". Zakhyst informatsii, No. 17 (1). P. 21 – 26.
18. Nikonov V.G., Zobov A.I. (2017) "On the Possibility of Using Fractal Models in Building Information Security Systems". Computational nanotechnology, No. 1. P. 39 – 49.
19. Ortiz S.M., Parra O., Miguel J. Espitia R. (2017) Encryption through the use of fractals International Journal of Mathematical Analysis, Vol. 11 (21). P.1029 – 1040.
20. Agarwal S. (2019) Symmetric Key Encryption using Iterated Fractal Functions. International Journal of Computer Network and Information Security (IJCNIS), Vol. 9 (4). P. 1 – 9.