<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Linked System of Data Organization and Management</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Serhii Kulibaba</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Liudmyla Zubyk</string-name>
          <email>zubyk.liudmyla@knu.ua</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleg Kurchenko</string-name>
          <email>oleg.kurchenko@knu.ua</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Igor Sinitsyn</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Mazur</string-name>
          <email>n.mazur@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Software Systems of National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>Akademika Glushkova ave. 40, Kyiv, 03187</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>60 Volodymyrska str., Kyiv, 01601</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>117</fpage>
      <lpage>126</lpage>
      <abstract>
        <p>This article presents a new method of cryptographic data encryption. The principle of operation consists of processing input data-changing the structure in a keyless format. There are a sufficient number of similar algorithms, which have the names symmetric and asymmetric. They work with keys for encryption or decryption. The new method will make it possible to process data according to the appropriate algorithm without changing the size of the input data, only by changing the structure, and also without using a key for decryption. For decryption, you need to apply the proposed algorithm in the reverse order. Currently, communication systems are gaining popularity, because society wants to maintain contact with others remotely, as well as with the security of personal data. The data loss of some systems has been noticed repeatedly, so in addition to displaying the new algorithm, the principle of data organization and management, which is called a “Linked System”, will be displayed. A significant number of systems are closed. They use other methods to keep data confidential. In addition to saving data, data may also be transferred. Transmission is carried out through communication channels, namely certain protocols. Some systems use special communication protocols to connect clients to the server. Each protocol can have a different data structure. The principle of application of the algorithm does not depend on the very structure of the system on which the corresponding protocol works. The algorithm is applied to all data that can be transmitted over the network mesh to which the clients are connected. Thanks to the individual approach, it is possible to achieve data reliability, as well as avoid the use of device resources thanks to an optimized algorithm and some software development tools.</p>
      </abstract>
      <kwd-group>
        <kwd>1 System</kwd>
        <kwd>encryption</kwd>
        <kwd>decryption</kwd>
        <kwd>key</kwd>
        <kwd>protection</kwd>
        <kwd>modification</kwd>
        <kwd>speed</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Developers of various systems try to maintain
data privacy and security. At the same time,
decisions are made to use already existing
cryptographic encryption methods from primary
sources [
        <xref ref-type="bibr" rid="ref20">1</xref>
        ].
      </p>
      <p>The state of confidentiality of some
communication and other systems was
investigated, and it was noticed that the necessary
information of users was repeatedly obtained by
attackers. Because the general structure and
encryption algorithms are already known, the
probability of obtaining data is an order of
magnitude higher for criminals.</p>
      <p>
        An individual approach is required to ensure
data reliability. As an example, try to create your
data processing algorithm, electronic digital
signatures, and communication protocols, and
apply them in centralized or other data
organization systems that work on the appropriate
communication to receive or transfer, or store data
[
        <xref ref-type="bibr" rid="ref21">2, 3</xref>
        ].
      </p>
      <p>
        In addition, various services that provide
individual services use different systems of
organization and data management. The choice of
one or another system is individual for everyone.
To find a balance between security and economy,
it was decided to investigate the working
principles of already known data organization
algorithms and develop the newest one [4].
development tools, you can get the decimal value
of a byte right away, where the replacement
process is much more simplified [
        <xref ref-type="bibr" rid="ref27">15</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis of Publications, the Status</title>
      <p>of the Issue, and the Statement of the</p>
    </sec>
    <sec id="sec-3">
      <title>Problem</title>
    </sec>
    <sec id="sec-4">
      <title>2.1. Analysis of Research and</title>
    </sec>
    <sec id="sec-5">
      <title>Publications</title>
      <p>Currently, there are several ways to organize
data for any system. Among them, the following
are known: centralized, decentralized, and
distributed. Centralized can be suitable for use by
any software, because the principles of data
management are simple [5]. Decentralized is
usually used to check data for validity and
reliability [6]. Distributed ones work according to
a similar principle of decentralized methods, but
partially with the duplication of information on
each server device to increase the fault tolerance
of the system [7].</p>
      <p>Data stored internally in operating and other
systems consist of bytes. It can be called a
standardized form of digital information. A byte
is a certain length of a binary code, which is
replaced by a symbol or a special symbol during
encoding [8].</p>
      <p>When creating your cryptographic encryption
algorithm, you should take into account the
properties: confidentiality, immutability, and
source [9]. Confidentiality remains for all users of
systems where an appropriate data protection
method is used. Immutability indicates that the
data sent to the system must not change so that the
system itself has the opportunity to verify the
source. The system user confirms the sent data.</p>
      <p>
        There are enough cryptographic encryptions.
They can be distinguished by signs—symmetric
and asymmetric. Symmetric methods work only
with a public key, which is called “public” [
        <xref ref-type="bibr" rid="ref12 ref15 ref17 ref23 ref5">10,
11</xref>
        ]. It can be sent with secure data so that the
recipient can decipher the information [
        <xref ref-type="bibr" rid="ref24">12</xref>
        ]. In
asymmetric methods, two keys are used—public
and private [
        <xref ref-type="bibr" rid="ref25">13</xref>
        ]. The principle of operation is
similar to symmetric, but with a modification—
encryption with a public key, and decryption with
a private key, and without announcing it
externally in the system.
      </p>
      <p>
        The change in the internal structure of the data
occurs due to the change in the positions of
symbols and special symbols that directly form
the input data [
        <xref ref-type="bibr" rid="ref26">14</xref>
        ]. When using certain
      </p>
    </sec>
    <sec id="sec-6">
      <title>2.2. Analysis of the State of the Issue in the Applied Field</title>
      <p>For several years, the use of various methods
of data organization has been necessary to use for
the development of any online or offline platform.
The prerequisite for this is the permanent storage
or retrieval of data, where the appropriate
technique helps to most effectively solve several
issues.</p>
      <p>Client-server architectures often use
centralized methods. Services that require data
security and verification, such as services with
cryptographic currencies, use decentralized
solutions. For high security and failure resistance
of server devices, distributed methods of data
organization are used.</p>
      <p>Some popular companies use one of the
existing methods. Centralized solutions were
chosen by the developers of the well-known
Instagram, Facebook, and Telegram tools.
Decentralized was chosen by the developers of
cryptographic currencies Bitcoin, and Etherium.
Distributed methods used by Google in its search
engine.</p>
    </sec>
    <sec id="sec-7">
      <title>2.3. Formulation of the Problem</title>
      <p>Each development company is looking for the
most effective method of data organization, which
will result in less equipment costs, support, and
scaling. At the same time, high-quality customer
service will be obtained.</p>
      <p>After analyzing the existing methods and
systems, no optimal solution was found among
the existing ones, which would give fewer costs
for device maintenance and provide sufficient
computational efficiency, in particular, a
sufficient level of data security.</p>
    </sec>
    <sec id="sec-8">
      <title>3. Ways of Organizing and Managing</title>
    </sec>
    <sec id="sec-9">
      <title>Data</title>
    </sec>
    <sec id="sec-10">
      <title>3.1. Centralized Systems</title>
      <p>A few years ago, centralized systems were
popular in creating a variety of applications.</p>
      <p>
        A centralized system (center) is a way of
organizing data that contains all information and
processes input data with a single device. Fig. 1
shows an example of data organization by
centralizing them [
        <xref ref-type="bibr" rid="ref28">16</xref>
        ].
      </p>
      <p>To create a centralized system, several
software components need:
1. Communication protocol. For users of the
corresponding system to be able to receive
data, a certain protocol is used: TCP, FTP,
UDP, etc.
2. Database. Since the protocols do not
include data storage methods, a database is
used to obtain preliminary information.</p>
      <p>Centralization is used by a sufficient number
of applications, including web applications. This
type of organization is less secure in terms of data
storage, but at the same time, it is more
economical. As an example, it is used by the
famous application Instagram. While researching
the possibility of “breaking” the system internally,
several cases were observed, and the employees
of this company needed to come to certain
locations where the server devices are located and
fix them.</p>
      <p>By this we can say that the destruction of the
entire system can occur by the destruction of one
component of the system—the server device.</p>
    </sec>
    <sec id="sec-11">
      <title>3.2. Decentralized Systems</title>
      <p>After some time, in the 80s and 90s, the
concept of a decentralized system appeared,
followed by the methodology of creating
decentralized systems.</p>
      <p>
        A decentralized system is a set of blocks that
contain certain data and increase their security
level by hashing (each block) and verifying the
validity of this data. Fig. 2 shows the principle of
decentralized data organization [
        <xref ref-type="bibr" rid="ref29">17</xref>
        ].
      </p>
      <p>
        A hash function is a function that transforms
input data of any length into a fixed length [
        <xref ref-type="bibr" rid="ref30">18</xref>
        ].
      </p>
      <p>The requirements for the hash function are as
follows:
1. Resistance of collisions
2. Resistance to finding the prototype
3. Resistance to the search for a second
prototype.</p>
      <p>Collisions. Collision resistance means that
there is no algorithm for finding a collision in a
short period. A collision is a situation where there
is a pair of values that, by applying to the input of
the function, you can get a valid result.</p>
      <p>The first prototype. This is a requirement for a
hash function where updating the initial data in an
adequate amount of time is not possible.</p>
      <p>The second prototype. The party that has the
initial data and the corresponding hash value
cannot create other data that will return the same
result at the input of the hash function.</p>
      <p>Similar systems contain data blocks. All
blocks are interconnected, because each previous
block is processed by a hash function, and data is
transferred to the new block. This method of
organization is called blockchain in decentralized
systems. In this case, it is difficult to replace the
data, because devices or a certain device are used,
which contain all the data for further validation.</p>
      <p>Validation occurs thanks to other devices that
constantly compare their values with the server
values—consensus.</p>
      <p>
        Consensus is the validation of data by using a
variety of methods. There are a sufficient number
of data verification methods [
        <xref ref-type="bibr" rid="ref31">19</xref>
        ]:
1. Proof-of-Stake.
2. Proof-of-Work.
3. Delegated Proof-of-Stake.
      </p>
      <p>All methods are based on proof, but some are
based on work and luck. As an example, the
Delegated Proof-of-Stake principle describes
below:
1. Delegate. The user who controls
governance in the blockchain.
2. Validator. Nodes that verify the correctness
of the consensus.
3. Witnesses Users responsible for blockchain
security and validation.</p>
      <p>Cryptocurrencies usually use for
decentralization.</p>
    </sec>
    <sec id="sec-12">
      <title>3.3. Distributed Systems</title>
      <p>A distributed system is a way of organizing
data that distributes data across multiple server
devices. Fig. 3 shows an example of data
organization by distribution.</p>
      <p>
        This type of organization also includes
consensus. To receive, update, and delete data,
voting takes place between existing server
devices. Among them is the main device—the
controller. When the control server is lost, a vote
is taken to select a new control device [
        <xref ref-type="bibr" rid="ref32">20</xref>
        ].
      </p>
      <p>Because some parts of the data can be stored
not only on one device but also possibly on
several. This causes high failure resistance in the
system. But at the same time, the design and costs
of such a system increase significantly, because
not only data is distributed, but also hardware
resources. As an example, the Google Chrome
application is the largest distributed system in the
world.</p>
    </sec>
    <sec id="sec-13">
      <title>4. Linked System of Data Organization</title>
      <p>and Management</p>
    </sec>
    <sec id="sec-14">
      <title>4.1. Structure and Principles of Work</title>
      <p>A linked system is a way of organizing and
managing data that divides data into N-parts
(blocks) and distributes them across N-devices,
without keeping duplicates. The recommended
number of server devices for applying this data
organization methodology is 3 or more. From a
smaller number of devices, it makes no sense to
build such a system, as well as a distributed or
decentralized one.</p>
      <p>Fig. 4 shows the principle of operation of the
connected system.</p>
      <p>To create and apply this system, it is necessary
to decide on a conditional structure. There are 3
server devices (S1–S3), one “empty” (E) and one
spare (R). A user is connected to S2 and is sending
data. In this case, the program initially encrypts
the data in an E2E (end-to-end) way, divides it
into 3 parts, puts it in a queue, and sends it to all
S. Thanks to the queue, the data transmission is
synchronized, and does not need to use the
computing power of other servers, until which the
data gets, only the network load. All data that has
been received must be sent to R via E at an
appropriate frequency, where E signals R to open
an individual communication channel for data
transmission.</p>
      <p>Assume that S2 has failed. Then the data will
be received from R through E by opening a data
channel. The R device serves to restore data if it
has been lost so far, as well as to partially replace
a non-working server. The system will work as
long as at least 1 server is running. The idea of a
backup server is just to be a container for data, and
should not have a lot of computing power.</p>
      <p>It may be that you need to scale the system.
Then, after installing a new server device, data
is transferred from the backup device to the new
one:
(1)
where N is the total number of servers, M is the
number of new devices.</p>
      <p>When the data wrote, other working servers
continue to work, but only to receive users,
without returning data from their database,
redirecting user requests to new servers. The
database of previous servers is overwritten.
Thanks to such processing, a certain number of
users is not lost, but at the same time, there is a
load on the network of new servers:
where I is the maximum speed of the Internet, P
is the number of connected users (threads).</p>
      <p>After summing up the likely scaling events of
the associated system, it is possible to calculate
the amount of memory that will be freed up when
new devices are added (3).
(2)
(3)
where Vi is the amount of physical memory of the
current device,
N is the number of devices,
M is the number of new devices.</p>
    </sec>
    <sec id="sec-15">
      <title>4.2. Communication</title>
    </sec>
    <sec id="sec-16">
      <title>Between Devices</title>
    </sec>
    <sec id="sec-17">
      <title>Methods</title>
      <p>
        There are a sufficient number of methods for
organizing communication between devices.
Among them, TCP/IP, UDP, FTP, HTTP, and
others are used [
        <xref ref-type="bibr" rid="ref33">21</xref>
        ].
      </p>
      <p>The corresponding protocol is used for the
corresponding tasks. The TCP/IP protocol is in
high demand in the design of client-server
architectures. In addition, developing software
using this protocol requires a minimum of system
costs, so it was decided to choose this option.</p>
      <p>
        TCP/IP (Transmission Control Protocol,
Internet Protocol) is a network model of data
transmission, which is presented in digital form.
This model includes 4 stack levels [
        <xref ref-type="bibr" rid="ref34">22</xref>
        ]:
1. Application level. At this level, rules are
defined, thanks to which data exchange
will be carried out. For example, thanks to
HTTP and FTP protocols.
2. Transport level. The transport layer helps
to correctly organize the data for the
recipient while maintaining sequences.
3. Network layer. The level that is intended
for the transmission of data packets to the
recipient, by calculating the network
address based on the network mask.
4. Channel level. Describes how data is
encoded for the transmission of data
packets at the physical layer.
      </p>
      <p>The interaction of devices in a connected
system takes place at the network level because it
is necessary to transfer relevant information to
several devices while maintaining data security.</p>
      <p>
        Data security can be maintained at the network
level, because this level contains: identifier, flag,
source address, destination address, parameters,
data, etc. The way the data is addressed is defined,
so only the data itself that needs to be transferred
is processed. Data processing can be done in
different ways, including the use of cryptographic
encryption methods [
        <xref ref-type="bibr" rid="ref35">23</xref>
        ].
      </p>
    </sec>
    <sec id="sec-18">
      <title>1.3. Comparative Analysis</title>
      <p>To determine the quality of the proposed
system, it was decided to compare it with all
existing data management and organization
systems.</p>
      <p>Failure resistance:
a) Centralized—low
b) Decentralized—medium
c) Distributed—high
d) Linked—high.</p>
      <p>Service:
a) Centralized—low
b) Decentralized—medium
c) Distributed—high
d) Linked—high
Scalability:
a) Centralized—low
b) Decentralized—medium
c) Distributed—high
d) Linked—high.</p>
      <p>Development:
a) Centralized—high
b) Decentralized and Distributed—medium
c) Linked—medium.</p>
      <p>Evolution:
a) Centralized—low
b) Decentralized—medium
c) Distributed—high
d) Linked—high.</p>
      <p>You can compare and find the differences
between distributed and connected systems:
1. Safety. Compared to a linked system,
complete data is not stored on multiple servers.
While the data of the linked system is stored
on all available devices in blocks.
2. Data storage. Distributed systems
duplicate data, as a result of which there is a
high failure resistance to the loss of one or
more servers. In a connected system, data is
divided into blocks and distributed on servers,
where if one is lost, the backup can be
replaced, but without using its computing
power to receive users, only for data
transmission.
3. Costs and design. A distributed system is
difficult to design and particularly expensive.
The related system will be less expensive due
to the efficient use of memory when scaling
(3), and at the same time, it is not difficult to
design.
4. The speed of receiving/returning data. In
a distributed system, the data has a complete
form. Due to this, the speed will be lower
compared to the related one, which has a block
system of data storage.</p>
    </sec>
    <sec id="sec-19">
      <title>5. Cryptographic Encryption Method</title>
    </sec>
    <sec id="sec-20">
      <title>Transposition Data Method</title>
    </sec>
    <sec id="sec-21">
      <title>5.1. Signs of Cryptographic</title>
    </sec>
    <sec id="sec-22">
      <title>Encryptions</title>
      <p>A symmetric cryptosystem is a way to increase
the level of software protection by changing the
data structure with a special unique key.</p>
      <p>The key is a set of secret information, thanks
to which the digital signature of the document and
other data is verified.</p>
      <p>The key is required to process the data
structure for both encryption and decryption. The
same key is required to process the same
information. If the key is lost, it will not be
possible to get complete information.</p>
      <p>Asymmetric cryptosystems are a way of
increasing the protection of software using an
external and an internal key.</p>
      <p>The foreign key is used in symmetric
encryption methods. Internal—in asymmetrical
ones. The difference between these types of
encryption is the formation of two keys for
encryption and decryption of data in asymmetric
encryption.</p>
      <p>
        The external key is available to all recipients
of data, and the internal key is unique and is
available to each recipient of information. These
two keys help to decrypt fully protected
information. The only drawback of the
asymmetric type of encryption is the speed of
processing [
        <xref ref-type="bibr" rid="ref36">24</xref>
        ].
of
cryptographic
      </p>
      <p>Cryptographic encryption is the replacement
of the data structure with symbols and the creation
of a certain key to replace the symbols with the
original structure. Encryption is used for three
purposes:
1. Privacy. Thanks to cryptographic
protection methods, information can be
made inaccessible to persons trying to steal
this information.
2. Immutability. Encrypted information
cannot be tampered with during
transmission or storage.
3. Confirm the source. Encrypted information
has information about the sender.</p>
      <p>Data exchange between users occurs as
follows:
1. The original text, image, and video are
transformed into an encrypted form with the
help of an algorithm, and the recipient will
have a special key to decrypt this data.
2. The encrypted message is sent to the
recipient.</p>
      <p>The receiver decrypts the message using a
special key.</p>
    </sec>
    <sec id="sec-23">
      <title>5.3. Properties of Data Recording in</title>
    </sec>
    <sec id="sec-24">
      <title>Operating Systems</title>
      <p>The initial data can be different—bytes or text
information. When receiving text information, it
is necessary to convert it into bytes. A byte is a
unit of storage and processing of digital
information, which can have values from 0 to 256
for one character.</p>
      <p>
        Some development tools can immediately
convert symbols into bytes, while the processing
process becomes automated, in particular, faster
[
        <xref ref-type="bibr" rid="ref37">25</xref>
        ]. Because the data must be processed with bytes,
the binary code or symbol must be converted to
bytes for the systems to work properly (Table 1). If
necessary, the data can be returned to the usual
form—text—apply to decode (1).
(4)
      </p>
    </sec>
    <sec id="sec-25">
      <title>5.4. Algorithm of Transposition Data</title>
    </sec>
    <sec id="sec-26">
      <title>Method</title>
      <p>The TDM data processing algorithm is as
follows:
1. Receiving input data and, if necessary,
converting it to bytes.
2. Distribution of data into 6 parts with their
processing with step 12:
a) Parts 1 and 2 with the initial processing
position 0 carry out the replacement of the
values N and N+1.
b) Parts 3 and 4 with processing start
position 2 perform value substitution from N
to N+2 and from N+2 to N+4.
c) Parts 5 and 6 with the initial processing
position 6 carry out the substitution of values
from N to N+3 and from N+3 to N+6.
3. Replacement of the first half of the
original values with another.
4. Saving the result.</p>
      <p>For decryption, it should be taken into account
that the value of the length of the input encrypted
data may not be even, therefore, at the beginning
of the decryption, it is necessary to determine the
percentage by dividing the length by 2 for further
correctness of the result—permutation of halves.
Then the decoding is in reverse order.</p>
      <p>
        When using this approach, difficulties may
arise with the processing of large data. As an
example, 1GB can take a relatively long time to
process. In this case, the input data should be
divided into blocks that will process parts
according to the same algorithm [
        <xref ref-type="bibr" rid="ref38">26</xref>
        ]. To obtain
greater uniqueness of the placed data, at the end
of processing, it is necessary to rearrange several
parts, at most three, for large volumes.
and
      </p>
    </sec>
    <sec id="sec-27">
      <title>Areas of</title>
      <p>At the moment, communication systems are
rapidly gaining popularity. In most of them, data
security is determined by the use of cryptographic
encryption methods. The processing of the data
itself takes place thanks to certain algorithms on
the input data of users. The data structure is a
message. To use the proposed algorithm, you
should convert text information into bytes, then
apply the proposed or algorithm. Any data
consists of bytes regardless of the system, so the
flexibility of use lies in this, in particular the speed
of processing.</p>
      <p>Other closed systems process and transmit data
via communication channels. Such systems use
specific communication protocols to connect
clients to the server. Each protocol may have a
different data structure and operating principles.
Regardless of the principle of operation and data
structure, information processing can be carried
out.</p>
    </sec>
    <sec id="sec-28">
      <title>5.6. Comparison with Analogues</title>
      <p>
        Currently, there are a sufficient number of
algorithms for increasing the level of data
protection: AES, DES, 3DES, and others. These
methods are symmetrical [
        <xref ref-type="bibr" rid="ref39">27</xref>
        ]. The principle of
their operation consists of encryption and
decryption of data with a public key. There are
also asymmetric methods. They work similarly to
symmetric methods but have a private key, which
is used for decryption and is not announced
outside the system.
      </p>
      <p>
        Both symmetric and asymmetric algorithms
have drawbacks. Symmetric encryption methods
use a single key to encrypt and decrypt data. This
contributes to a greater probability of receiving
valid data from the attacker. Asymmetric
algorithms solve the problem using a single key.
But in this case, more computing power is needed
to process the data before obtaining their proper
appearance [
        <xref ref-type="bibr" rid="ref40 ref41">28, 29</xref>
        ].
      </p>
      <p>During the study of the performance of the
TDM method, it was observed that unique values
were obtained from the input. At the same time, it
can be assumed that data security is at a high level.
It can be assumed that a set of bytes of data can be
defined by a single character of length
Ncharacters of the same type. In this case, the
attacker can more likely choose an algorithm to
decrypt the message. This assumption applies to
known symmetric and asymmetric algorithms.
Next, you can define the level of data security for
all types of encryption:
1. No key method. The security level is
sufficient.
2. Symmetric method. The security level is
medium.
3. Asymmetric method. The security level is
high.</p>
      <p>This level of security is due to the openness of
the digital sequence of values, namely keys, as
well as the time spent to obtain valid data illegally.</p>
    </sec>
    <sec id="sec-29">
      <title>6. Conclusion</title>
      <p>This paper considered well-known methods of
data organization and management, which are in
demand among companies that develop or design
a service delivery system.</p>
      <p>During the analysis of all methods, it was
decided to develop a new method of data
organization and compare it with the existing
ones. As it was shown, a system with its potential
was obtained, with its evaluation according to the
relevant criteria.</p>
      <p>In addition, the principle of operation of the
TDM method was displayed. Thanks to the
individual approach to increasing the level of data
protection, software developers have the
opportunity to create an individual method of data
encryption.</p>
      <p>No device resource usage was observed during
the TDM method development study. This makes
it possible to apply the algorithm on most devices
that need to save computing power for computing
other data.</p>
      <p>Currently, communication systems are gaining
popularity in society. Therefore, a decision was
made to create our communication system and use
a data processing algorithm. The algorithm made
it possible to increase the level of data protection
on the users’ devices themselves without using the
resources of the server and their own devices.
Thanks to this, conditional attackers will have a
lower probability of obtaining valid data due to an
individual approach to increasing the reliability of
personal information.</p>
    </sec>
    <sec id="sec-30">
      <title>7. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>Intelligent Systems and Computing</source>
          , vol.
          <volume>1126</volume>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          (
          <year>2020</year>
          )
          <fpage>93</fpage>
          -
          <lpage>104</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -39162-
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>Infrastructure</given-names>
            <surname>Audit</surname>
          </string-name>
          , in: IEEE 8th International
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Science</surname>
          </string-name>
          and
          <string-name>
            <surname>Technology</surname>
          </string-name>
          (
          <year>2021</year>
          ). doi:
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          10.1109/picst54195.
          <year>2021</year>
          .9772181
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>in: Workshop of the 8th International Conference</source>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>Technologies and Data Science</source>
          , vol.
          <volume>2386</volume>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>Control</given-names>
            <surname>System</surname>
          </string-name>
          . 2019 IEEE International
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1109/picst47496.
          <year>2019</year>
          .9061376
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <given-names>Control</given-names>
            <surname>System for Transport Robots</surname>
          </string-name>
          ,
          <year>2019</year>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>Engineering (EIConRus)</surname>
          </string-name>
          ,
          <year>2019</year>
          ,
          <fpage>1880</fpage>
          -
          <lpage>188</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>doi: 10</source>
          .1109/EIConRus.
          <year>2019</year>
          .8656853
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Approach</surname>
          </string-name>
          ,
          <year>2017</year>
          52nd International
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>Conference (UPEC)</source>
          ,
          <year>2017</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          10.1109/UPEC.
          <year>2017</year>
          .8232017
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <volume>32</volume>
          (
          <issue>5</issue>
          ) (
          <year>2021</year>
          )
          <fpage>1031</fpage>
          -
          <lpage>1040</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          10.23919/JSEE.
          <year>2021</year>
          .000088
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Technique</surname>
          </string-name>
          ,
          <year>2018</year>
          3rd International Conference
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          Innovations in Engineering (ICRAIE),
          <year>2018</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          1-
          <fpage>6</fpage>
          . doi:
          <volume>10</volume>
          .1109/ICRAIE.
          <year>2018</year>
          .8710434
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          Technol.
          <volume>3</volume>
          (
          <issue>15</issue>
          ) (
          <year>2022</year>
          )
          <fpage>216</fpage>
          -
          <lpage>223</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <given-names>for Cryptographic</given-names>
            <surname>Protocols</surname>
          </string-name>
          . Application to Key Cycles,
          <year>2010</year>
          .
          <fpage>1</fpage>
          -
          <lpage>42</lpage>
          . doi:
          <volume>10</volume>
          .1145/1656242.1656244
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gitanjali</surname>
          </string-name>
          , et al.,
          <source>ASCIi Based Cryptography Using Unique Id, Matrix Multiplication and Palindrome Number</source>
          ,
          <source>The 2014 International Symposium on Networks, Computers and Communications</source>
          ,
          <year>2014</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          . doi:
          <volume>10</volume>
          .1109/SNCC.
          <year>2014</year>
          .6866509
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>T.</given-names>
            <surname>Zaw</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Thant</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bezzateev</surname>
          </string-name>
          ,
          <article-title>Database Security with AES Encryption, Elliptic Curve Encryption</article-title>
          and Signature,
          <source>2019 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF)</source>
          ,
          <year>2019</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/WECONF.
          <year>2019</year>
          .8840125
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>L.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <source>The Application of Hybrid Encryption Algorithm in Software Security</source>
          ,
          <source>2012 Fourth International Conference on Computational Intelligence and Communication Networks</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>762</fpage>
          -
          <lpage>765</lpage>
          . doi:
          <volume>10</volume>
          .1109/CICN.
          <year>2012</year>
          .195
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>N. B.</given-names>
            <surname>Rad</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Shah-Hosseini</surname>
          </string-name>
          ,
          <source>GBHE: Grid-Based Cryptography with AES Algorithm</source>
          , 2008 International Conference on Computer and Electrical Engineering,
          <year>2008</year>
          ,
          <fpage>185</fpage>
          -
          <lpage>189</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICCEE.
          <year>2008</year>
          .36
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>K.</given-names>
            <surname>Rajeshwaran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Anil Kumar</surname>
          </string-name>
          ,
          <source>Cellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function</source>
          , 2019 IEEE International Conference on Electrical,
          <source>Computer and Communication Technologies (ICECCT)</source>
          ,
          <year>2019</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICECCT.
          <year>2019</year>
          .8869146
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [16] Working Group on
          <article-title>Centralized Substation Protection and Control, IEEE Power System Relaying Committee, Advancements in Centralized Protection and Control Within a Substation</article-title>
          ,
          <source>IEEE Transactions on Power Delivery</source>
          ,
          <volume>31</volume>
          (
          <issue>4</issue>
          ) (
          <year>2016</year>
          )
          <fpage>1945</fpage>
          -
          <lpage>1952</lpage>
          . doi:
          <volume>10</volume>
          .1109/TPWRD.
          <year>2016</year>
          .2528958
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>R. Ben</given-names>
            <surname>Amor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Elloumi</surname>
          </string-name>
          ,
          <source>Decentralized Model Reference Adaptive Control for Interconnected Robotic Systems, 2017 18th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA)</source>
          ,
          <year>2017</year>
          ,
          <fpage>235</fpage>
          -
          <lpage>240</lpage>
          . doi:
          <volume>10</volume>
          .1109/STA.
          <year>2017</year>
          .8314907
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>K.</given-names>
            <surname>Rajeshwaran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Anil Kumar</surname>
          </string-name>
          ,
          <source>Cellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function</source>
          , 2019 IEEE International Conference on Electrical,
          <source>Computer and Communication Technologies (ICECCT)</source>
          ,
          <year>2019</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICECCT.
          <year>2019</year>
          .8869146
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>J.</given-names>
            <surname>Jayabalan</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. N</surname>
          </string-name>
          ,
          <article-title>A Study on Distributed Consensus Protocols and Algorithms: The Backbone of Blockchain Networks</article-title>
          ,
          <source>2021 International Conference on Computer Communication and Informatics (ICCCI)</source>
          ,
          <year>2021</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICCCI50826.
          <year>2021</year>
          .9402318
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>T.</given-names>
            <surname>Castiglia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Goldberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Patterson</surname>
          </string-name>
          ,
          <article-title>A Hierarchical Model for Fast Distributed Consensus in Dynamic Networks</article-title>
          ,
          <source>2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)</source>
          ,
          <year>2020</year>
          ,
          <fpage>1189</fpage>
          -
          <lpage>1190</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICDCS47774.
          <year>2020</year>
          .00137
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [21]
          <string-name>
            <surname>J. A. R. P. de Carvalho</surname>
          </string-name>
          , et al.,
          <source>A Contribution to Performance Measurements of IEEE 802</source>
          .11
          <string-name>
            <surname>A</surname>
          </string-name>
          , B,
          <string-name>
            <given-names>G Laboratory</given-names>
            <surname>WEP Point-To-Point Links Using</surname>
          </string-name>
          <string-name>
            <surname>TCP</surname>
          </string-name>
          , UDP and FTP, 2010 International Conference on Applied Electronics,
          <year>2010</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ruiz</surname>
          </string-name>
          , et al.,
          <source>Limago: An FPGA-Based Open-Source 100 GbE TCP/IP Stack, 2019 29th International Conference on Field Programmable Logic and Applications (FPL)</source>
          ,
          <year>2019</year>
          ,
          <fpage>286</fpage>
          -
          <lpage>292</lpage>
          . doi:
          <volume>10</volume>
          .1109/FPL.
          <year>2019</year>
          .00053
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>A.</given-names>
            <surname>Djama</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Djamaa</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Senouci, TCP/IP and ICN Networking Technologies for the Internet of Things: A Comparative Study</article-title>
          ,
          <source>2019 International Conference on Networking and Advanced Systems (ICNAS)</source>
          ,
          <year>2019</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICNAS.
          <year>2019</year>
          .8807890
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>T.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <source>Research on Single Signon Technology for Educational Administration Information Service Platform</source>
          ,
          <source>2021 3rd International Conference on Computer Communication and the Internet (ICCCI)</source>
          ,
          <year>2021</year>
          ,
          <fpage>69</fpage>
          -
          <lpage>72</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICCCI51764.
          <year>2021</year>
          .9486813
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>C.</given-names>
            <surname>Lin</surname>
          </string-name>
          , et al.,
          <source>Research on Key-bytes Encryption Technology of SDH Channel</source>
          ,
          <source>2020 International Conference on Robots &amp; Intelligent System (ICRIS)</source>
          ,
          <year>2020</year>
          ,
          <fpage>207</fpage>
          -
          <lpage>209</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICRIS52159.
          <year>2020</year>
          .00059
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>M.</given-names>
            <surname>Alam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Badawy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Jullien</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Novel</given-names>
            <surname>Pipelined</surname>
          </string-name>
          <article-title>Threads Architecture for AES Encryption Algorithm</article-title>
          , IEEE International Conference on
          <string-name>
            <surname>Application-Specific</surname>
            <given-names>Systems</given-names>
          </string-name>
          , Architectures, and
          <string-name>
            <surname>Processors</surname>
          </string-name>
          ,
          <year>2002</year>
          ,
          <fpage>296</fpage>
          -
          <lpage>302</lpage>
          . doi:
          <volume>10</volume>
          .1109/ASAP.
          <year>2002</year>
          .1030728
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>R.</given-names>
            <surname>Teodorescu</surname>
          </string-name>
          , et al.,
          <source>Virtual Instrumentation Application for Symmetrical and Asymmetrical Text Encryption/Decryption Studying</source>
          ,
          <year>2015</year>
          7th International Conference on Electronics,
          <source>Computers and Artificial Intelligence (ECAI)</source>
          ,
          <year>2015</year>
          ,
          <fpage>23</fpage>
          -
          <lpage>26</lpage>
          . doi:
          <volume>10</volume>
          .1109/ECAI.
          <year>2015</year>
          .7301245
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [28]
          <string-name>
            <surname>C.-F. Wu</surname>
          </string-name>
          , et al.,
          <source>Benchmarking Dynamic Searchable Symmetric Encryption with Search Pattern Hiding</source>
          ,
          <source>2019 International Conference on Intelligent Computing and its Emerging Applications (ICEA)</source>
          ,
          <year>2019</year>
          ,
          <fpage>65</fpage>
          -
          <lpage>69</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICEA.
          <year>2019</year>
          .8858302
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bonde</surname>
          </string-name>
          , U. Bhadade,
          <article-title>Analysis of Encryption Algorithms (RSA, SRNN and 2 Key Pair) for Information Security</article-title>
          ,
          <source>2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA)</source>
          ,
          <year>2017</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICCUBEA.
          <year>2017</year>
          .8463720
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>