Peer-reviewed articles 17,970 +



Title: SECURING INFORMATION SYSTEMS USING FRACTAL GEOMETRY

SECURING INFORMATION SYSTEMS USING FRACTAL GEOMETRY
Marta Blahova
10.5593/sgem2022/2.1
1314-2704
English
22
2.1
•    Prof. DSc. Oleksandr Trofymchuk, UKRAINE 
•    Prof. Dr. hab. oec. Baiba Rivza, LATVIA
This article deals with the use of the principles of fractal geometry applicable in the field of cryptographic security of communication within information systems. The theory of the proposed solution is based on the field of iterative fractals created using the TEA (Time Escape Algorithm) algorithm. The introductory part deals with the issue of choosing a suitable category of fractals for the purpose of securing information systems. The next part deals with the issue of generation, analysis of fractal structures, which is a prerequisite for the implementation of the proposed encryption process. The outputs from the performed fractal analysis are also used for the decryption process. The methodology of testing the proposed solution against cryptanalytic methods is described here. In the final part, the individual elements of the proposed process were implemented using a programmed interface in C #. It continues by testing the resistance of the given encryption method to cryptanalytic methods. Statistical methods, analytical methods, and brute force attacks were used to investigate resilience.
The acquired knowledge proved the usability of the proposed solution for the selected area of its use.aim of this research is to design a suitable design for a diagnosticdevice that will periodically monitor and record selected quantities in the device. The diagnostic equipment must be as flexible as possible, as the design will be applicable to all output electronic equipment of this project. This means that the diagnostic design can be applied to all control units, add-on modules or turnstile controllers. Each checked element contains different quantities that are valid for correct diagnostics. Therefore, there is a desire for a uniform design that can be customized based on the device. The main benefit is finding a way to secure data against unwanted retrieval of its content. The involvement of the branch of fractal geometry in the field of information security opens up new possibilities, given the different conception of fractals, in contrast to the objects of classical Euclidean or other geometry. The proposed system works with complex fractal structures, which can be described by relatively trivial equations, which allows using this system with high speed both for encoding the message and for its retrospective reconstruction. This fact opens the way to the use of the proposed system for information security even in devices with limited computing capacity. The system emphasizes resistance to cryptanalytic methods, such as brute force attack, statistical methods, or analytical methods.
[1] Champlain, J. J. Auditing information systems. 1. vyd. New York: John Wiley and sons, 2003. 430 s. ISBN 0-471-28117-4.
[2] Stinson, D. R. Cryptography: theoryand practice. 3. vyd. Chapman and Hall/CRC, 2006. 593 s. ISBN 1584885084.
[3] Stallings, W. Cryptography and Network Security: Principles and Practice. 5. vyd. USA: Prentice Hall, 2010. 719 s. ISBN: 9780136097044.
[4] Stamp, M. Information Security: Principles and Practice. 2. vyd. John Wiley & Sons, 2011.606 s. ISBN: 0470626399.
[5] Mandelbrot, B. B., Fractals nad chaos: the Mandelbrot set and beyond. New York: Springer, 2004. 308 s. ISBN 0-387-20158-0.
[6] Piper, F., Murphy, S. Cryptography - A Guide for Everyone. 1st ed. Prague: Dokoran, 2006. 157 pp. ISBN 80-7363-074-5.
[7] Kenan, K. Cryptography in the database: The last line of defense. 1. vyd. USA: Michigan university, 2006. 277 s. ISBN: 0321320735.
[8] Kahate, A. Cryptography in the database. 2. vyd. New York: Tata McGraw-Hill Education, 2008. 792 s. ISBN: 9780070648234.
[9] Feiu, T., Sinkov, A. Elementary Cryptanalysis. 2. vyd. USA: Michigan university, 2009. 226 s. ISBN: 9780883856475.
[10] Bunatova, P. Asymmetric cryptography [online] c2006, [cit. 2011-05-17]. Available on the World Wide Web: <http://volny.cz/tbu/asym_sifra.html>.
[11] Bunatova, P. Symmetric cryptography [online] c2006, [cit. 2011-05-17]. Available on the World Wide Web: <http://volny.cz/tbu/sym_sifra.html>.
[12] Zelinka, I. Aplikovana informatika, aneb, Uvod do fraktalni geometrie, bunecne automaty. 2. vyd. Zlin: Univerzita Tomase Bati - Fakulta technologicka, 2005. 183 s. ISBN: 8073182750.
[13] Mach, V., Adamek, M., Valouch, J., Tomasek, P., (2018). Software Extension for Advanced Technology Zone. Proceedings of the 29th DAAAM International Symposium, 2018, DAAAM International, ISBN 978- 3-902734-20-4, ISSN 1726- 9679, Vienna, Austria DOI: 10.2507/29th.daaam.proceedings.105.
[14] Meyers, M. Mike Meyers' CISSP(R) Certification Passport. 1. vyd. California: McGraw-Hill/Osborne, Inc., 2002. 425 s. ISBN 0-07-222578-5.
[15] Zelinka, I., Vcelar, F., Candik, M. Fractal geometry principles and applications. 1st ed. Prague: BEN, 2006. 160 pp. ISBN 80-7300-191-8.
This research was based on the support of the Internal Grant Agency of Tomas Bata University in Zlin, the IGA / FAI / 2022/002 project and the Department of Security Engineering, Faculty of Applied Informatics.
conference
Proceedings of 22nd International Multidisciplinary Scientific GeoConference SGEM 2022
22nd International Multidisciplinary Scientific GeoConference SGEM 2022, 04 - 10 July, 2022
Proceedings Paper
STEF92 Technology
International Multidisciplinary Scientific GeoConference SGEM
SWS Scholarly Society; Acad Sci Czech Republ; Latvian Acad Sci; Polish Acad Sci; Serbian Acad Sci and Arts; Natl Acad Sci Ukraine; Natl Acad Sci Armenia; Sci Council Japan; European Acad Sci, Arts and Letters; Acad Fine Arts Zagreb Croatia; Croatian Acad Sci and Arts; Acad Sci Moldova; Montenegrin Acad Sci and Arts; Georgian Acad Sci; Acad Fine Arts and Design Bratislava; Turkish Acad Sci.
81-90
04 - 10 July, 2022
website
8477
Fractal geometry; cryptography; encryption; encrypted information