EVALUATION OF THE CRYPTOGRAPHIC QUALITIES OF A DATA SOURCE AUTHENTICATION MODEL BASED ON A STREAM CIPHER
DOI:
https://doi.org/10.28925/2663-4023.2025.27.752Keywords:
message authentication code; MAC; cybersecurity; threat; information security; encryption; confidentiality; integrity; imitation resistance; robotic system; communication network.Abstract
The article considers the problems and actual tasks of applying the methodology for constructing a high-speed imitation-resistant multi-alphabet substitution cipher based on a bit stream of pseudorandom data with simultaneous generation of a MAC authentication code. The issues of assessing the adequacy of the security level of its application in cases of realization of threats of the main types of cryptanalytic attacks by an attacker are studied. In particular, the cryptographic resistance to frequency analysis, linear and differential analysis, as well as to the “meeting in the middle” attack is analyzed. The question is provably answered positively. Investigating the cryptographic properties of the proposed model, it is noted that the most suitable for building a cipher overlay node are substitution substitutions that have certain structural characteristics. On the basis of the proposed cryptographic model, a secure protocol for implementing the friend-or-foe (IFF) identification procedure for mobile objects, including robotic systems, is built. The protocol takes into account the potential threat of man-in-the-middle (MIM) cryptanalytic attacks, for which purpose geolocation data is used as an additional factor in verifying the authenticity of identification information. The relevance of the proposed solution is constantly growing, due to the widespread use of robotic systems in wartime and the possibility of the presence of “friendly” UAVs performing various technical functions in the areas where critical infrastructure facilities are located. A separate direction for further research in terms of improving the proposed cryptographic model is to solve the problem of estimating the distribution of structural characteristics of random substitutions.
Downloads
References
Horbenko, I. D, & Horbenko, Yu. I. (2012). Applied cryptology: Theory. Practice. Application: monograph. Kharkiv: “Fort”.
On Electronic Trust Services, Law of Ukraine № 2155-VIII (2024) (Ukraine). https://zakon.rada.gov.ua/laws/show/2155-19#Text
Vorokhob, M., Kyrychok, R., Yaskevych, V., dobryshyn, y., & sydorenko, s. (2023). Modern perspectives of applying the concept of zero trust in building a corporate information security policy. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(21), 223–233. https://doi.org/10.28925/2663-4023.2023.21.223233
Horbenko, Yu. I. (2015). Construction and analysis of systems, protocols and means of cryptographic information protection: monograph - Part 1: Methods of construction and analysis. standardization and application of cryptographic systems. Kharkiv: “Fort”.
Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipher (ISO/IEC 9797-1:2011). (2011).
Information security — Message authentication codes (MACs) – Part 2: Mechanisms using a dedicated hash-function (ISO/IEC 9797-2:2021). (2021)
Chernenko, R. (2023). Performance evaluation of lightweight cryptography algorithms on constrained 8-bit devices. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(21). https://doi.org/10.28925/2663-4023.2023.21.273285
Bowden, L. (1985). The story of IFF (identification friend or foe). IEE Proceedings A - Physical Science, Measurement and Instrumentation, Management and Education, Reviews. 132(6), 435–437.
Alferov, O. P., et al. (2001). Fundamentals of cryptography. Helios ARV.
Hulak, H. M., & Skladannyi, P. M. (2017). Ensuring the reliability of automated control and data transmission systems for unmanned aerial vehicles. Mathematical machines and systems, 3, 154–161.
Korniiets, V., & Zhdanovа Y. (2024). Methodology for forming a high-speed imitator-resistant cipher for multi-alphabet substitution. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(26), 476–486. https://doi.org/10.28925/2663-4023.2024.26.723
Chandrasekharan, К. (2012). Introduction to Analytic. Number Theory. Springer-Verlag. Berlin Heidelberg New York.
Oleksiichuk, A. M., Koniushok, S. M. (2012). Fourier transforms and cryptographic properties of Boolean functions. K.: ISZZI NTUU “KPI”.
Marks II, R. J. (2009). Handbook of Fourier Analysis & Its Applications. Oxford: Oxford University Press.
Hulak, H., Zhdanovа Y., Skladannyi, P., Hulak, Y., & Korniiets, V. (2022). Vulnerabilities of short message encryption in mobile information and communication systems of critical infrastructure objects. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(17), 145–158. https://doi.org/10.28925/2663-4023.2022.17.145158
Korniiets, V., & Chernenko, R. (2023). Modification of the cryptographic algorithm a5/1 to ensure communication for iot devices. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(20), 253–271. https://doi.org/10.28925/2663-4023.2023.20.253271
Konheim, A. G. (1981). Cryptography: A prime. Wiley & Sons, Incorporated, New York.
Shannon, C. E. (1950) Communication Theory of Secrecy Systems. Bell Telephone Laboratories, Incorporated, New York.
Chernenko, R. (2023). Generation of pseudorandom sequences on microcontrollers with limited computational resources, entropy sources, and statistical properties testing. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(22), 191–203. https://doi.org/10.28925/2663-4023.2023.22.191203
Hulak, H. M., Zhiltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2024). Information and cyber security of the enterprise. Textbook. Lviv: Publisher Marchenko T. V.
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Віктор Корнієць

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.