Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Additional Information
    • Abstract:
      To protect confidential data from computer crimes, the user must take care of the security of their information themselves, using existing modern software. One such tool is the implementation of message encryption by attaching a digital signature to the data. Three algorithms are required for cryptosystems to operate with a public key: an encryption algorithm, a decryption algorithm, and a key generation algorithm. One of the promising ways to develop public key encryption is to use the model of raising highly discrete logarithms to generate keys, the so-called Diffie-Hellman algorithm. The recurrent relations that form the basis of the Mandelbrot set provide chaotic behavior and a significant dependence of the process on the initial conditions. These properties allow you to create a cryptographic system that can use them to solve problems. The designed cryptographic system must combine the means of generating keys, encrypting text messages and generating a digital signature. The key exchange protocol provides for the establishment of a shared secret key between the participants, which can then be used to encrypt text or image messages with a digital signature. The tools with which it is possible to solve and implement a system of fractal algorithms for information protection are analyzed. The study implemented a software product in the C # programming language in Visual Studio 2010. The system is designed as part of an object-oriented approach to software development, so it uses software classes to distribute functionality. The implemented algorithm has a larger number of possible keys in comparison with the Diffie-Hellman key exchange scheme common today. The large size of the key space makes it difficult to implement a bust, also known as the method of "brute force". The chaotic properties of the fractal algorithm do not require the use of large numbers, but provide high quality encryption. Saving time on calculations allows you to reduce resource costs and increase system performance as a whole. [ABSTRACT FROM AUTHOR]
    • Abstract:
      Copyright of Automation of Technological & Business Processes / Avtomatizaciâ Tehnologiceskih i Biznes-Processov is the property of Odessa National Academy of Food Technologies and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)