Cryptosystem Based on a Key Function of a Real Variable Viktor Avramenko1[0000-0002-6317-6711] and Volodymyr Demianenko2[0000-0002-1512-970X] 1,2 Sumy State University, Rimsky-Korsakov st., 2, Sumy, 40007, Ukraine 1 avramenko1938@gmail.com, 2vldemyan@gmail.com Abstract. Using the function of a real variable in cryptosystems as a key allows you to increase its cryptographic strength, because it is more difficult to pick up such key. Therefore, the development of such systems is relevant. A cryptosys- tem with a symmetric key is offered. This key is some function of a real vari- able that satisfies some restrictions. It can be either continuous or discrete. The transmitting and receiving parties select the key-function, the first transmitted character or the first transmitted value for the analog message, the function area of the key function, and the step of changing the function argu- ment. A Disproportion over first-order derivative is used to encrypt an analog message. The Cauchy problem is solving for decrypting this message. Discrete mes- sages are encrypted using the first-order disproportionality integral function. Decryption is performed by the inverse transformation of the formula for inte- gral disproportion. Algorithms for encrypting and decrypting messages are presented. The abil- ity to encrypt and decrypt text information, 2D graphic images, as well as ana- log messages are shown. The examples show the complexity to pick up the key function and the cryptographic strength of the proposed cryptosystem. A cryptosystem, in which the function of a real variable is used as a key and as well as disproportion functions are used, is suitable for encryption of both discrete and continuous messages. To “crack” such a system, it is required to pick up the form of the key function and to find the values of its parameters with very high accuracy. That is, the system has high cryptographic strength. Keywords: cryptosystems, disproportion functions, real variable func- tions, key-function, encryption, decryption, text messages, 2D images, analog messages. 1 Introduction It is difficult to imagine the modern world without systems of secrecy of the transmit- ted information in both the military and business fields. Therefore, it is not surprising that they are constantly being improved. In addition, new ways of hiding information are emerging. The most widely used encryption algorithms are divided into symmet- Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). ric and asymmetric. In symmetric systems, encryption and decryption are performed using the same key. Such systems include AES [1], GOST 28147-89 [2, 3]. Hacking them requires enumeration of possible keys. The complexity of exhaustive search is estimated as O (2k), where k is the key length in bits. In asymmetric systems (public key systems), RSA and El-Gamal algorithms are most widely used [4, 5]. The RSA algorithm is based on the computational complex- ity of the integer factorization problem. The reliability of the El-Gamal algorithm is based on the difficulty of computing the discrete logarithm. Of particular interest is the El-Gamal algorithm over the group of points of an elliptic curve [6]. For asymmetric algorithms, there are cryptanalysis methods that work faster than full search. Therefore, asymmetric algorithms have to use longer keys than keys in symmetric systems. The disadvantages of both symmetric and asymmetric systems include the fact that they are based on a set of integers. This allows you to develop various methods of hacking such cryptosystems up to the implementation of a simple selection of keys. To increase cryptographic strength, you have to gradually increase the length of the keys. However, due to the increasing capabilities of computer technology, the way to in- crease the length of keys is unpromising. Currently, great efforts are being made to create quantum computers [7]. It is expected that their use will significantly affect the cryptographic strength of existing cryptosystems [8]. The well-known Grover quan- tum algorithm [9] for restoring the key of a symmetric encryption algorithm from the message text and cipher text. Full search on a regular computer has complexity O (2k), where k is the key length. For a quantum computer, this complexity is 2 times less and amounts to O (2k / 2) [9]. That is, the efficiency of the key length is reduced by 2 times. Quantum algorithms also pose a threat to systems with asymmetric encryption. The cryptographic strength of the RSA encryption system is based on the super- polynomial computational complexity of factoring natural numbers. However, there is a quantum algorithm, whose complexity is polynomial O (n3) [10]. There is also a Shore quantum algorithm for computing the discrete logarithm. In [11], the Shor algorithm for a group of points of an elliptic curve over a field GF (p) with complexity O (n3) is presented. At the same time, it is known [12] that the set of real numbers has a greater power in comparison with the set of natural numbers. Therefore, the development of crypto- systems using real numbers is of practical interest. It can be expected that they may be more persistent in the event of an attempt to select a key by enumeration. This paper presents one of the many possible options for such the cryptosystem. 2 Problem statement It is necessary to develop algorithms for encrypting and decrypting analog and dis- crete messages using a function of a real variable as a key. 3 Literature review Mostly modern cryptosystems use a block cipher. It operates with groups of bits of a fixed length - blocks. Their size can be from 64 to 256 bits. The widely used block symmetric ciphers (BSS) are based on the use of several symmetric cryptographic transformations (elementary ciphers). When constructing them, three main approaches are used: - based on Feistel chains; - IDEA-like ciphers; - SPN (Substitution Permutation Network) structure. The AES system belongs to SPN based BSN [1]. In it, cryptographic conversions are performed in the simple substitution mode over 128-bit blocks (16 bytes), which has a block length of 128 bits. The key length has several options: 128, 192, 256 bits. The number of cycles of conversion depends on the length of the key. It is, re- spectively, 10, 12 or 14 cycles. The encryption algorithm GOST 28147-89 [2, 3] also belongs to the category of block ciphers, where two parts of the selected block of information are of equal size. It is a classical symmetric encryption algorithm based on the Feistel network and is characterized by high cryptographic strength. However, this algorithm also has disad- vantages: 1) In comparison with the byte-oriented algorithm, AES on 8-bit platforms GOST loses in speed by 4 times. 2) In the text of the standard GOST 28147-89, there are no clear criteria for the se- lection of replacement nodes. Quite often, fears are expressed that there are weak replacement nodes. In 1978, three authors: Ronald Rivest, Adi Shamir, Leonard Adleman proposed the RSA algorithm [4, 5]. This algorithm was the first full-fledged public key algorithm. Encryption is carried out without the transfer of secret keys. In addition to classical cryptosystems using integers as keys, systems based on functions of real variables were proposed [13]. Symbols from the ASCII code table are encrypted with a sum of 10 key functions with coefficients before them zero or one. The amplitudes of these functions during encryption of each new character are taken randomly. At the receiving end, using the disproportion functions [14-16], fragments of key functions that are present in the received encrypted signal are recog- nized. It allows to decrypt the character transmitted at the current time. In [17, 18], a variant was proposed when, three key functions of a real variable are used to encrypt a binary codes. Next symbols are coded: "1", "0", "space", "the transi- tion to a new row". Any other character is recognized as the transition to a new row. For unauthorized access to the intercepted message, you need to select the type and parameters of the key functions. Both cryptosystems in the process of computer simulation showed high crypto- graphic strength when trying to select the parameters of key functions even if their type is known. However, using the sum of key functions and the need to recognize them at the re- ceiving end complicates the algorithm. In addition, the encrypted message is much longer than the original. Therefore, the task is to develop a cryptosystem using only one key function of a real variable. 4 Mathematical statement of the problem A message that is encrypted is a sequence of numerical character codes (or numerical values of the components of the brightness of the pixels in the case of a graphic im- age), which is described by a discrete function yi, i = 0, 1, ..., N-1, where N is the number of characters in the message. It is replaced by a sequence of ciphers that are calculated using the key function, which can be either discrete fi, i = 0, 1, ..., M (M > N), or continuous f(x). Here x = iꞏh, where i is the sequence number of the char- acter in the message, and h is the step with which the argument x changes. This step should be the same for both sides of the message transfer. Disproportion functions are used for encryption. 5 Disproportion functions Several types of the disproportion function are known: the disproportion over n-th order derivative, the disproportion over n-th order value, relative and sequential dis- proportions. Virtually all of them are characteristics of numerical functions. Below is a summary of those that are used in this work. The disproportion over n-th order derivative of the function y(x) with respect to x is described by the expression: y 1 dny @ d x( n ) y    (1) x n n! dx n Here, the @ symbol is chosen to indicate the operation of calculating dispropor- tion. The symbol “d” means “derivative”. The order is indicated in parentheses. The left side of (1) reads “at d n y with respect to x”. If for any value of x, the function y(x) has the form y = kxn, then disproportion (1) is equal to zero regardless of the value of the coefficient k. The disproportion over 1-st order derivative (n = 1) has the form: y dy @ d x(1) y   (2) x dx In case of a parametric specification of functions, when x = φ(t), y = ψ(t), where t is a parameter, disproportion (2) takes the form: d  (t ) dt @d (1)  (t )   (3) (t ) (t ) d  dt For ψ(t) = kφ(t) disproportion (3) is equal to zero in the entire area of existence x = φ(t), regardless of the value of k. If y(x) is a sum of known functions taken with unknown coefficients, then the dis- proportion functions allow us to calculate the values of these coefficients from the data obtained for the current value of the argument. This opportunity was used both for creating cryptosystems [13, 17, 18], and in solving a number of more general problems [15, 16]. For the case when the first derivative does not exist or is equal to zero on any in- terval, it is proposed to use the first-order integral disproportion [19, 20]. This dispro- portion of the function y(x) with respect to f(x) has the form: x @I (1) y ( x)   xh y ( x)dx  y ( x) , (4) f ( x) x f ( x)  xh f ( x)dx where h is the preset time interval. In the discrete representation of signals, this is a time quantization step. In this case, y(x) and f(x) are represented by one-dimensional arrays. If the ap- proximate values of the integrals in (4) are calculated using the trapezoidal formula, then for the same step h for y(x) and f(x), disproportion (4) takes the form: yi 1  yi yi @ I (f1i ) yi   (5) f i 1  f i f i 6 Encryption and decryption of text and image messages Text messages are a sequence of character codes, for example, from an ASCII ta- ble. That is, it is a sequence of integers. When transmitting color graphic images, the brightness components of pixel-integer numbers from 0 to 255 are transmitted. As a key function, you can take any function of a real variable. It can be either a continu- ous or a discrete function. However, due to the fact that the message is represented by a discrete function that does not have a first derivative, in any case, integral dispro- portion should be used for encryption (5). If the key function is continuous, you need to calculate an array of its values, changing the argument from the initial xmin to the final xmax values in increments of h. The parameters xmin, xmax, h must be the same for the transmitting and receiving sides. When encrypting the characters from the ASCII table or pixel luminance components, their numerical representations differ by one. In these cases, the step h of changing the argument must be equal to one. In addition, the transmission and, accordingly, the reception must begin with a cer- tain symbol known to the transmitting and receiving sides. Therefore, the encryption algorithm is as follows: 1. The start character that is known to both sides must be entered. 2. Enter an array of values of key function. 3. Read from the file or enter from the keyboard a sequence of message characters and convert them to the numbers. In this case, for text symbols the ASCII table can be used. As a result, the array yi, i = 0, 1, ... N-1 will be get. 4. Using the code of the given initial character y0, calculate the disproportion I i  @ I (f1) yi , i = 1, 2, …, N-1 for each next character in accordance with (5) and i transmit them over the communication channel. 7 Decryption algorithm for text and image messages 1. Enter the start character y0 that is known for the transmitting side. 2. If the key function is discrete, enter the array of its values. If the key function is continuous, calculate the array of its values in accordance with the instructions above. 3. Read from the file the accepted disproportion values for each of the symbols Ii, i = 1, 2, ... N-1. 4. Use the known initial symbol y0, and the accepted disproportions Ii, i = 1, 2, ... N-1, for calculating the estimated codes of the recovered message according to the for- mula (6). ( yi  I i  ( f i 1  f i ))  f i yi  (6) f i 1 Round off estimated codes to the nearest integers to get recovered codes. 5. Using the recovered codes found, reproduce the message in symbolic form (when transmitting a graphic image, reproduce the corresponding pixel attributes). 8 Examples of encryption and decryption of discrete messages Example 1 An example of encryption and decryption of characters from the ASCII code table is provided. The key function has the form: f ( x)  aex  sin( x)  ln(ax  ) (7) x = iꞏh is an argument; i is the sequence number of the character in the encrypted message; h = b + c is the step of changing the argument. Here a = 0.1, β = 0.01, b = 0.65, c = 0.35 are constants. Since in the example the characters are encrypted from the ASCII table, in accor- dance with the above algorithm, the sum of the constants b and c is equal to one. The sequence of numerical codes yi, i = 1, 2, ... N-1, corresponding to the transmit- ted characters, is encrypted. When transmitting messages, let's the first character is “G”. In the ASCII table, its code is 71 (that is, y0 = 71). Given the discrete nature of the message, integral disproportion (5) is used to en- crypt it. Decryption is carried out using (6) and according to the above algorithm. Table 1 shows the transmitted characters, their ciphers, and the corresponding de- crypted characters. Table 1. Codes of transmitted characters and the results of their decryption. Charac- Source Character De- Charac- Source Character De- ter charac- code crypted ter charac- code crypted number ter charac- number ter charac- ter ter 1 -0,33745 19 @ -14,9626 @ 2 C 18,56566 C 20 17,18209 3 o 35,05402 o 21 # -0,50861 # 4 n 23,38864 n 22 2,084013 5 t 45,28726 t 23 $ -1,0013 $ 6 r 75,66021 r 24 2,205811 7 o 215,5424 o 25 % -1,38787 % 8 l 3638,486 l 26 2,342513 9 1392,007 27 ^ -21,4272 ^ 10 e -49,5932 e 28 22,22681 11 x 36,34984 x 29 & -1,64792 & 12 a 60,50844 a 30 2,295671 13 m 7,687781 m 31 * -2,84342 * 14 p 11,55305 p 32 3,393497 15 l 13,07326 l 33 ( -2,13477 ( 16 e 11,94166 e 34 2,607738 17 ! 44,92703 ! 35 ) -2,34347 ) 18 2,001215 It can be seen from it that the cipher of each character is a real number with both an integer and a fractional part. Encrypted and decrypted characters match. In order to “crack” a message, you need to select the type of the key function and the values of its parameters. The following is an example that illustrates the cryptographic strength of the sys- tem to obtain a key, even if somehow it was possible to find out the type of key- function. Suppose that the above sequence of characters is encrypted using function (7), and decrypted using the same type of function, but the constant a instead of the value 0.1 during decryption is chosen incorrectly and is 0.1005. Table 2 shows the results, from which it is seen that even such a slight deviation of the parameter of the key function does not allow to decrypt transmitted characters correctly. Table 2. Codes of transmitted characters and the results of their decryption with an incorrectly selected key function. Char- Source Character De- Charac- Source Character De- acter charac- code crypt- ter charac- code crypted num- ter ed number ter charac- ber char- ter acter 1 -0,33745 19 @ -14,9626 D 2 C 18,56566 B 20 17,18209 3 o 35,05402 n 21 # -0,50861 М 4 n 23,38864 l 22 2,084013 Ѓ 5 t 45,28726 q 23 $ -1,0013 - 6 r 75,66021 n 24 2,205811 Г 7 o 215,5424 g 25 % -1,38787 T 8 l 3638,486 5 26 2,342513 П 9 1392,007 ќ 27 ^ -21,4272 ‚ 10 e -49,5932 X 28 22,22681 ® 11 x 36,34984 ” 29 & -1,64792 12 a 60,50844 f 30 2,295671 e 13 m 7,687781 ( 31 * -2,84342 ѕ 14 p 11,55305 ґ 32 3,393497 ъ 15 l 13,07326 33 ( -2,13477 A 16 e 11,94166 L 34 2,607738 q 17 ! 44,92703 + 35 ) -2,34347 « 18 2,001215 2 A positive feature of the proposed encryption system is that the cipher of one and the same symbol is not repeated and depends on its number in the message. Table 3 shows the repeated characters, their ciphers, and decryption results. Table 3. Results of decryption of the sequence of identical characters. Char Sou Character De- Charac- Source Character De- acter rce code crypt ter charac- code crypt- num- char ed number ter ed ber ac- char- char- ter acter acter 1 a 42,89534 a 23 % -1,07004 % 2 a 55,98126 a 24 % 0,230793 % 3 a 223,1301 a 25 % 0,211779 % 4 a -2722 a 26 % 0,195132 % 5 a 193,6388 a 27 % 0,180462 % 6 a 47,19846 a 28 % 0,167453 % 7 a 21,12258 a 29 % 0,155856 % 8 a 12,02764 a 30 % 0,145461 % 9 a 7,807816 a 31 % 0,136099 % 10 a 5,504747 a 32 % 0,127629 % 11 31,8935 33 1,189454 12 A -12,0762 A 34 9 -5,17547 9 13 A 1,71819 A 35 9 0,164057 9 14 A 1,413497 A 36 9 0,154966 9 15 A 1,186178 A 37 9 0,146586 9 16 A 1,011796 A 38 9 0,138837 9 17 A 0,874885 A 39 9 0,131652 9 18 A 0,765272 A 40 9 0,124967 9 19 A 0,67603 A 41 9 0,118735 9 20 A 0,602313 A 42 9 0,112905 9 21 A 0,540641 A 43 9 0,10744 9 22 9,210041 44 4,816542 From Table 3 it can be seen that the ciphers of the same characters differ from each other, but at the same time, their decryption is error-free. This once again shows that for hacking it is necessary to find the type of the key function, and then select the values of its parameters with high accuracy. Example 2 The encryption of a graphic message is considered - a 2D image using the key function of a real variable f (q)  aesin(( b  c ) q  a ) , (8) where q is the sequence number of the pixel; a = 100, b = 0.65, с = 0,35. The image of a seagull on the seashore is encrypted. According to the algorithm, transmission begins with a pixel known to the receiving side. Pixel brightness is also represented by integers with a step equal to one. Therefore, according to the algorithm in this case, it is required that the sum of a and b is equal to one. Table 4 shows the disproportions of the brightness components for the first 23 pix- els. Table 4. Components brightness pixels’ codes. pixel disproportion of component red component green component blue number component A disproportion disproportion disproportion 1 -0,17260194 -0,052654658 -0,079113617 -0,109100438 2 0,249815554 0,122038436 0,147606293 0,183288106 3 -0,25138517 -0,066806224 -0,080056209 -0,073489858 4 -1,54785813 -0,671606862 -0,746100819 -0,895078346 5 -2,11017572 -1,141977451 -1,198335871 -1,339798239 6 0,638962347 0,336698458 0,322878349 0,344784243 7 0,904695026 0,493147485 0,536886675 0,603130017 8 0,35818895 0,185034305 0,203422857 0,224748673 9 -0,0619523 -0,079999226 -0,074320205 -0,069612985 10 -1,08142099 -0,6158245 -0,699207099 -0,762820098 11 -2,35243212 -1,569025352 -1,733111253 -1,953901199 12 -0,07899416 -0,025833335 -0,031099612 -0,000303777 13 1,059101779 0,630917816 0,701524602 0,778998655 14 0,482163337 0,302525074 0,337339747 0,360361396 15 0,079311391 0,042700382 0,052726876 0,071145629 16 -0,68481115 -0,484134182 -0,526938708 -0,575032293 17 -2,19903004 -1,601314543 -1,722045604 -1,879955093 18 -0,9877602 -0,663217085 -0,68687686 -0,706872244 19 1,094772111 0,607081863 0,704520639 0,846261488 20 0,632160636 0,56848388 0,574362813 0,580312445 21 0,193576492 0,084571962 0,09345652 0,077852313 22 -0,3793663 -0,320611934 -0,339514003 -0,33505087 23 -1,80013937 -1,01073232 -1,126174205 -1,185141129 It can be seen from it that the ciphers are real numbers with both an integer and a fractional part, the nature of the changes of which is difficult to predict. Figure 1 shows the original (left) and decrypted (in the middle) images according to the disproportions received at the receiving end, known to the first pixel and the key function. Fig. 1 Original image (left), decrypted (in the middle), decrypted with an incorrectly selected key-function parameter (right). Figure 1 on the right shows the result when instead of a = 100, when decrypting the image, the value a = 99.9999 was mistakenly selected. Despite a slight difference from the value of this parameter during encryption, it was not possible to “crack” the image. The same result if b + c = 0.999999 is selected instead of unity. This indicates the cryptographic strength of the encryption system and how diffi- cult it is to get a key function by enumeration. 9 Examples of encryption and decryption of the analog message The case is considered when the message y(x) and the key function f(x) are con- tinuous, smooth, having a first derivative. The transmitting and receiving parties agree on the key function, the initial value of the argument x0, the step of its change h and the initial value of the transmitted mes- sage y(x0). In practice, most often, there is a need to encrypt signals from moving objects. In this case, the signal is represented by a function of time y(t). To encrypt it using the key function f(t), disproportion (3) should be calculated, which in this case has the form: dy y (t ) z (t )  @ d (1) f (t ) y (t )   dt (8) f (t ) df dt In this case the time change step h is selected from the representation condition y(t) with the necessary accuracy. The decrypted values are calculated from equation (9) obtained from (8):  y (t )  y(t )  f (t )  z (t )  (9)  f (t )  The decrypted message is found from (9) by solving the Cauchy problem using the known y(t0), h and z(t) values obtained via the communication channel (8). Example 3. Analog message encryption For simulation, suppose that an analog message is described by the following ex- pression: y (t )  k  exp((a  t ) cos(bt )) sin 2 (bx) (10) The key function has the form: f (t )  a  exp(bt )  sin(bt )  ln(at  b) , (11) where a = 1, b = 10, k = 100 are constants. The time t varies from 0.1 to 4 in increments of h = 0.0025. The derivatives were calculated numerically using the values of three points. The results of the cryptosystem simulation are shown in table 5. Table 5. Transmitted and decrypted values of a numerical function. account transmitted decrypted value number value 1 0,16938 0,173057 2 0,674778 0,68059 3 1,51054 1,51856 4 2,66904 2,67926 5 4,14073 4,15308 6 5,91425 5,93181 7 7,97656 7,99589 8 10,313 10,3338 9 12,9076 12,9296 10 15,743 15,7656 11 18,8006 18,8234 12 22,061 22,0834 13 25,5038 25,5252 14 29,1082 29,1278 15 32,8525 32,8735 16 36,715 36,7328 17 40,6737 40,6874 18 44,7066 44,7188 19 48,7916 48,7979 20 52,9072 52,9066 21 57,0322 57,0268 22 61,1458 61,1315 23 65,228 65,2037 24 69,2595 69,2267 25 73,2218 73,1769 26 77,0975 77,0394 27 80,8701 80,7977 28 84,5241 84,4363 29 88,0453 87,9424 30 91,4207 91,3003 Obtained results indicate that even with a rough calculation of the derivatives, the decryption error in this example is a fraction of a percent. This error can be reduced by decreasing the step h, and by applying more accurate methods of numerical differ- entiation, for example, the Newton-Stirling method [21]. 10 Constraints on the key-function of a real variable When implementing the proposed cryptosystem, it is necessary to take into account the restrictions imposed on the key function. 1. The function must be defined on the set of real numbers. 2. The function should not be constant and not take zero values. 3. When using the key function, a situation should not arise when the number is di- vided by a number close to zero, which leads to the appearance of an unacceptable calculation error. To this end, it is recommended to test the cryptosystem for the entire alphabet of characters that will be used in messages. 4. Before sending an encrypted message, first check what it looks like after decryp- tion. This will avoid mistakes that may occur because of not taking into account the previous paragraphs. It should also be noted that in the system there is an effect similar to the “avalanche effect” in the AES cryptosystem. It consists in the fact that behind an incorrectly de- crypted character the remaining message is decrypted incorrectly. 11 Conclusions A cryptosystem with a symmetric key is offered. For the first time, a function of a real variable is used as a key, which satisfies some restrictions. It can be either continuous or discrete. Encryption is performed using disproportion functions. The specific ex- amples show the possibility of encryption and decryption of text information, 2D- graphic images, as well as analog messages. Examples are also given that demonstrate the cryptographic strength of the proposed cryptosystem. In the practical application of the proposed cryptosystem, the above limitations on the key function should be taken into account. References 1. Federal Information Processing Standards Publication 197 November 26, 2001 Specifica- tion for the ADVANCED ENCRYPTION STANDARD (AES). 2. GOST 28147-89. Sistemy` obrabotki informaczii. Zashhita kriptograficheskaya. Algoritm kriptograficheskogo preobrazovaniya. – Vved. 01.01.90. 3. Lebedev, A.N.: Kriptografiya s «otkry`ty`m klyuchom» i vozmozhnosti ee prakticheskogo primeneniya. Zashhita informaczii, vol. 2 (1992). 4. Rivest, R., Shamir, A., Adleman, I.: A method for obtaining digital signatures and public- key cryptosystems. Communications of the ACM, vol. 21(2), pp. 120-126. (1978). doi:10.1145/359340.359342. 5. Gorbenko, I.D., Gorbenko, Yu.I.: Prykladna kryptologiya. Pidruchnyk. KhNURE, Fort, 878 p. Kharkiv (2012). 6. Hankerson, D.R., Vanstone, S.A., Menezes, A.J.: Guide to elliptic curve cryptography. XX, 311p. Springer, New York (2003). 7. Ladd, T. D., Jelezko, F., Laflamme, R., Nakamura, Y., Monroe, C., O’Brien, J. L.: Quan- tum Computing, Nature, vol. 464, pp. 45-53 (2010). 8. Klyucharev, P.G.: Kvantovy`j komp`yuter i kriptograficheskaya stojkost` sovremenny`kh sistem shifrovaniya. Vestnik MGEN im. N.E`.Baumana, ser. «Estestvenny`e nauki», vol. 2 (2007). 9. Grover, I.K.: Quantum Mechanics Help in Searching for a Needle in a Haystack. Phys. Rev. Lett., vol. 78(2), pp. 326-328 (1997). 10. Shor, P.: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. Prceedings of the 35th Annual Sympotion of Foundations of Computer Science (1994). 11. Proos, J.A.: Shor’s discrete logarithm quantum algorithm for elliptic curves. p. 35. Water- loo. Ont: Faculty of Mathematics University of Waterloo (2003). 12. Kolmogorov, A.N., Fomin, S.V.: E`lementy` teorii funkczij i funkczional`nogo analiza. Nauka, Moscow (1972). 13. Avramenko, V.V., Zabolotny, M.I.: A Way of Data Coding. Patent UA H041. 9/00 №42957, Ukraine (2009). 14. Avramenko, V.V.: Characteristic properties of disproportionality functions and their appli- cation to solving diagnoses problems. Transactions of Sumy State University (SumDU), vol. 16, pp. 24-28, Ukraine (2000). 15. Kalashnikov, V.V., Avramenko, V.V., Kalashnykova, N.I.: Derivative disproportion func- tions for pattern recognition. In: Watada, J., Tan, S.C., Vasant, P., Padmanabhan, E., Jain, L.C. (eds.) Unconventional Modelling, Simulation, and Optimization of Geoscience and Petroleum Engineering, pp. 95–104. Springer, Heidelberg (2018). Chapter 7. 16. Kalashnikov, V.V., Avramenko, V.V., Slipushko, N.Yu., Kalashnykova, N.I., Konoply- anchenko, A.E.: Identification of quasi-stationary dynamic objects with the use of deriva- tive disproportion functions. 108(C): 2100–2109. Procedia Comput. Sci. (2017). 17. Kalashnikov, V.V., Avramenko, V.V., Kalashnikova, N.I., Kalashnikov-Jr., V.V.: A cryp- tosystem based on sums of key functions. International Journal of Combinatiorial Optimi- zation Problems and Informatics, vol. 8, No.1, pp. 31-38 (2017). 18. Kalashnikova, N.I., Avramenko, V.V., Kalashnikov, V.V.: Sums of Key Functions Gener- ating Cryptosystems. In: J. M. F. Rodrigues et al. (Eds.): Computational Science – ICCS 2019. ICCS 2019, Chapter 23, Lecture Notes in Computer Science, vol. 11540, pp. 293- 302. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-22750-0_23 .ISBN 978-3- 030-22749-4; Online ISBN 978-3-030-22750-0 19. Karpenko, A.P.: Integral'nye harakteristiki neproporcional'nosti chislovyh funkcij i ih pri- menenie v diagnostike. Vestnik SumDU, vol. 16, pp. 20-25, Ukraine (2000). 20. Avramenko, V., Moskalenko, A.: Operative Recognition of Standard Signals in the Pres- ence of Interference with Unknown Characteristics, Proceedings of the Second Interna- tional Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), Za- porizhzhia, Ukraine, April 15-19 (2019). 21. Rao, S. B.: Numerical Methods: With Program in Basic, Fortran, Pascal & C++. Hydera- bad, Universities Press, (2004).