USE OF SYMMETRIC ENCRYPTION ALGORITHMS FOR SIGNAL TRANSMISSION IN WIRELESS DATA INPUT DEVICES

Authors

DOI:

https://doi.org/10.17721/ISTS.2020.4.71-80

Keywords:

cryptography, encryption, symmetric encryption, block encryption, signal encryption, wireless data entry devices

Abstract

Today, there are many computer systems that are designed to improve, facilitate and improve human life. As more and more researchers become interested in information processing, the development of computer systems is gaining momentum every year. With the development of information systems, possible threats, such as breaches of confidentiality, integrity and availability of processed information, are developing at an equally rapid pace. In order to prevent possible losses, the latest information security systems are constantly updated and improved. Since it is impossible to create a completely secure system, there is always the possibility of data theft, so the problem of protection of information and telecommunications systems is becoming increasingly important. Given that no protection can be perfect, a way has been developed to significantly reduce data breaches. Today, cryptosystems are mostly used to protect information and telecommunications systems and other technologies, including the protection of critical information of the state, enterprise, person or other critical data, including corporate secrets, intelligence or trade secrets.This article presents ways to use symmetric algorithms for signal transmission in remote data input devices. Information on existing algorithms of encryption and use of hash functions is given. A distinction is made between single-key and two-key methods of information encryption. The AES algorithm of its function, work of rounds, schemes of data encryption are considered in detail. The description of each algorithm is accompanied by an example which explains the features of their use. A mathematical model and an example of a block encryption algorithm are presented. The principles of operation of wireless devices are highlighted. Vulnerabilities related to wireless devices are considered and solutions for their protection are proposed.

Downloads

Download data is not yet available.

References

Dan Boneh, Victor Shoup, A Graduate Course in Applied Cryptography, version 0.4, Stanford University, September 2017.

Mohamed Barakat, Christian Eder. An Introduction to Cryptography, September 20, 2018.

Steven D Galbraith, Mathematics of Public Key Cryptography, version 2.0.

William Stallings, Cryptography and Network Security Principles and Practices, Fourth Edition, Prentice Hall, November 16, 2005.

Information on https://www.pvsm.ru/algoritmy/225093#begin.

Information on https://ru.wikipedia.org/wiki/%D0%A5%D0%B5%D1%88-%D1%84%D1%83%D0%BD%D0%BA%D1%86%D0%B8%D1%8F.

Joseph Sterling Grah, Hash Functions In Cryptography, The University of Bergen, June 1, 2008.

Information on https://www.binance.vision/security/what-is-symmetric-key-cryptography.

Nigel Smart, Cryptography: An Introduction, 3rd edition, Mcgraw-Hill College, December 30, 2004.

Information on https://en.wikipedia.org/wiki/Symmetric-key_algorithm.

Nigel Smart, Cryptography: An Introduction, 3rd edition, Mcgraw-Hill College, December 30, 2004.

Information on https://en.wikipedia.org/wiki/Symmetric-key_algorithm.

Christof Paar, Jan Pelzl, Understanding Cryptography, Springer-Verlag Berlin Heidelberg, 2010.

Joan Daemen, Vincent Rijmen, AES Proposal: Rijndael, October 1999.

Joan Daemen, Vincent Rijmen, The Design of Rijndael, Springer-Verlag, November 26, 2001.

Information on https://ru.wikipedia.org/wiki/%D0%9F%D1%80%84%D1%81%D0%B0.

Information on https://dic.academic.ru/dic.nsf/ruwiki/12112.

А.В. Яковлев, А.А. Безбогов, В.В. Родин, В.Н. Ша мкин, Криптографическая защита информации. Издательст во ТГТУ, 2016.

Information on https://studref.com/403682/informatika/blochnye_shifry.

Roberto Avanzi, A Salad of Block Ciphers, Munich, August 1, 2017.

Bruce Schneier, A self-study course in block-cipher cryptanalysis, Cryptologia, January 2000.

Information on https://sites.google.com/site/anisimovkhv/learning/kripto/lecture/tema4.

Lars R. Knudsen,Matthew J.B. Robshaw, The Block Cipher Companion, Springer-Verlag Berlin Heidelberg, 2011.

Information on https://techspirited.com/how-does-wireless-keyboard-mouse-work.

Information on https://compfonyk.com/kak-rabotaet-besprovodnaya-klaviatura-dlya-kompyutera/.

Information on https://xakep.ru/2016/02/25/mousejack/.

Information on https://www.securitylab.ru/news/381480.php.

Information on https://www.mousejack.com/faq.

Information on https://ru.wikipedia.org/wiki/%D0%AD%D0%BB%D1%8E%D1%87.

Published

2020-12-29

Issue

Section

Computer engineering and software

How to Cite

USE OF SYMMETRIC ENCRYPTION ALGORITHMS FOR SIGNAL TRANSMISSION IN WIRELESS DATA INPUT DEVICES. (2020). Information Systems and Technologies Security, 1(3-4), 70-79. https://doi.org/10.17721/ISTS.2020.4.71-80