Utilization of fractal geometry possibilities for information systems security
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28140%2F20%3A63526200" target="_blank" >RIV/70883521:28140/20:63526200 - isvavai.cz</a>
Výsledek na webu
<a href="http://eds.b.ebscohost.com/eds/pdfviewer/pdfviewer?vid=4&sid=32d1bb87-b61c-45f0-9831-037917e381b2%40pdc-v-sessmgr04" target="_blank" >http://eds.b.ebscohost.com/eds/pdfviewer/pdfviewer?vid=4&sid=32d1bb87-b61c-45f0-9831-037917e381b2%40pdc-v-sessmgr04</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.2507/31th.daaam.proceedings.085" target="_blank" >10.2507/31th.daaam.proceedings.085</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Utilization of fractal geometry possibilities for information systems security
Popis výsledku v původním jazyce
This article deals with the use of the principles of fractal geometry applicable in the field of cryptographic security of communication within information systems. The theory of the proposed solution is based on the field of iterative fractals created using the TEA (Time Escape Algorithm) algorithm. The acquired knowledge proved the usability of the proposed solution for the selected area of its use.aim of this research is to design a suitable design for a diagnostic device that will periodically monitor and record selected quantities in the device. The diagnostic equipment must be as flexible as possible, as the design will be applicable to all output electronic equipment of this project. This means that the diagnostic design can be applied to all control units, add-on modules or turnstile controllers. Each checked element contains different quantities that are valid for correct diagnostics. Therefore, there is a desire for a uniform design that can be customized based on the device. The main benefit is finding a way to secure data against unwanted retrieval of its content. The involvement of the branch of fractal geometry in the field of information security opens up new possibilities, given the different conception of fractals, in contrast to the objects of classical Euclidean or other geometry. The proposed system works with complex fractal structures, which can be described by relatively trivial equations, which allows using this system with high speed both for encoding the message and for its retrospective reconstruction. This fact opens the way to the use of the proposed system for information security even in devices with limited computing capacity. The system emphasizes resistance to cryptanalytic methods, such as brute force attack, statistical methods, or analytical methods. The objectives are summarized in the following points: Find a suitable category of fractals, usable in the field of information systems security, Design and verify a method suitable for fractal information security, Determine the resistance of the proposed solution to cryptanalytic methods.
Název v anglickém jazyce
Utilization of fractal geometry possibilities for information systems security
Popis výsledku anglicky
This article deals with the use of the principles of fractal geometry applicable in the field of cryptographic security of communication within information systems. The theory of the proposed solution is based on the field of iterative fractals created using the TEA (Time Escape Algorithm) algorithm. The acquired knowledge proved the usability of the proposed solution for the selected area of its use.aim of this research is to design a suitable design for a diagnostic device that will periodically monitor and record selected quantities in the device. The diagnostic equipment must be as flexible as possible, as the design will be applicable to all output electronic equipment of this project. This means that the diagnostic design can be applied to all control units, add-on modules or turnstile controllers. Each checked element contains different quantities that are valid for correct diagnostics. Therefore, there is a desire for a uniform design that can be customized based on the device. The main benefit is finding a way to secure data against unwanted retrieval of its content. The involvement of the branch of fractal geometry in the field of information security opens up new possibilities, given the different conception of fractals, in contrast to the objects of classical Euclidean or other geometry. The proposed system works with complex fractal structures, which can be described by relatively trivial equations, which allows using this system with high speed both for encoding the message and for its retrospective reconstruction. This fact opens the way to the use of the proposed system for information security even in devices with limited computing capacity. The system emphasizes resistance to cryptanalytic methods, such as brute force attack, statistical methods, or analytical methods. The objectives are summarized in the following points: Find a suitable category of fractals, usable in the field of information systems security, Design and verify a method suitable for fractal information security, Determine the resistance of the proposed solution to cryptanalytic methods.
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
—
OECD FORD obor
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Návaznosti výsledku
Projekt
—
Návaznosti
S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2020
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
Annals of DAAAM and Proceedings of the International DAAAM Symposium
ISBN
978-390273429-7
ISSN
17269679
e-ISSN
—
Počet stran výsledku
7
Strana od-do
619-625
Název nakladatele
DAAAM International Vienna
Místo vydání
Vienna
Místo konání akce
Mostar
Datum konání akce
21. 10. 2020
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—