<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Modeling of a Cryptographic Protocol for Matching a Shared Secret Key-Permutation of Significant Dimension with its Isomorphic Representations</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Volodymyr Saiko</string-name>
          <email>vgsaiko@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vladimir Krasilenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Svitlana Kiporenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Illia Chikov</string-name>
          <email>ilya95chikov@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Diana</string-name>
          <email>diananikitovych@gmail.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>60 Volodymyrska Street, Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Vinnytsia National Agrarian University</institution>
          ,
          <addr-line>st. Sonyachna, 3, Vinnytsia, 21008 Vinnytsia Oblast</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>196</fpage>
      <lpage>205</lpage>
      <abstract>
        <p>A protocol for agreement by user parties of secret keys-permutations of significant dimension and their new isomorphic matrix representations is proposed. Features and advantages of such representations are considered. The need to create such secret permutation keys to improve the cryptographic stability of matrix affine-permutation ciphers and other cryptosystems of the new matrix type is well-founded. The results of modeling the basic procedures of the proposed key agreement protocol in the form of an isomorphic permutation of a significant dimension, namely the processes of generating permutation matrices and their degrees, are given. Model experiments of the protocol as a whole, including accelerated methods of raising permutations to significant degrees, were performed. Such methods use sets of fixed permutation matrices, which are degrees of the underlying permutation matrix, and all these matrices are given in their isomorphic representations. The values of the fixed exponents correspond to the corresponding weights of the digits of the binary or other code representations of the selected random numbers. The results of simulation modeling demonstrated the adequacy and advantages of isomorphic representations of the processes of functioning of matrix-algebraic models of cryptographic transformations and the proposed secret key-permutation agreement protocol. Matrix-algebraic model, matrix representations, isomorphic permutation key, cryptogram, cryptographic transformations, affine-permutation cipher, protocol, matrix-type cryptosystem.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>EMAIL:</p>
      <p>1);
(A.</p>
      <p>2);</p>
      <p>
        2023 Copyright for this paper by its authors.
CEUR
their modifications were studied and used in the creation of blind and other improved digital signatures
in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. For CT in matrix models of permutations (MM_P), with their basic procedures of matrix
multiplication and some other element-by-element modulo operations on matrices, byte matrices
formed from rows, columns, vectors, which in unitary or other codes display symbols, codes, bytes,
must be multiplied by the permutation matrix (PM). Procedures for rearranging bits, bytes or their
groups are the most common and mandatory for almost all known and newly created algorithms and
ciphers. To increase the entropy of cryptograms images with their CT based on MM_P and change their
histograms, the decomposition of R, G, B components and their bit slices and several matrix keys (MKs)
of the PM type are necessary [
        <xref ref-type="bibr" rid="ref16 ref18 ref21 ref30">16, 18, 21, 30</xref>
        ]. A number of such pseudo-random (current, step-by-step,
frame-by-frame) MKs, which would meet the requirements and be quickly generated, is also needed
for masking, CT of video files or stream of blocks from files, images with their significant sizes.
      </p>
      <p>
        Formulation of the problem. Thus, there is a need for the MAM to form a number of MKs of the
PM-type that would satisfy a number of requirements from the main MK. Since the issue of matching
the main MK (MMK) of a general type, but not the sequence of PMs, was considered in [
        <xref ref-type="bibr" rid="ref30 ref31">30, 31</xref>
        ], and
the methods of generating a stream of MKs-permutations from the main MK were partially considered
in [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ], but only for bit MPs of small sizes (256*256), then the purpose of the work is to propose and
investigate a protocol for the coordination of a secret (main) MK in the form of an PM of significant
dimensions, i.e., an main PM (MPM), to improve and adapt the type and structure of a MPM of such
or even greater dimensions to the images format and to fast hardware solutions, to model this protocol
and the process of formation flow of PMs from such a MPM for MAM CT in MT systems. In addition,
the above review and analysis of publications allows to determine another important task, namely the
need to develop and model such MAM CTs, which would be best suited for implementation based on
vector-matrix multipliers (VMMs), as well as to determine the characteristics and indicators of such
models and implementations.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Presentation of the main material and research results.</title>
      <p>
        An overview of MT ciphers, especially multifunctional parametric block ciphers [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], their analysis
shows that it is advisable to use isomorphism of various representations of permutations (matrices or
vectors) that act as a master key (MK) and block or step-by-step, round MKs to achieve the goal of
PMtype, i.e. sub-keys (SKs), which are matrices of permutations of P (its powers!) or vectors isomorphic
to them. It is known from the works [
        <xref ref-type="bibr" rid="ref15 ref16 ref17 ref18">15, 16, 17, 18</xref>
        ] that with CT based on the basis of matrix
affinepermutation ciphers (MAPCs) and vector affine-permutation ciphers (VAPCs), cryptograms for some
types of text-graphic documents (TGD) and images (I), especially for block-based MAMs, when using
one personal computer (PC) for all blocks are insufficient in terms of stability, however, a number of
PCs created from MPM solve this problem. And that is why the aspect of coordinating the secret MPM
of the PM-type with a significant dimension is important. Let's consider the situation when for M blocks
with a length of 256*256 bytes, presented in the form of a matrix of a black and white image, it is
necessary to rearrange all bytes in accordance with PM. In this case, PM in the generally accepted form
should be square with N*N elements ("0" or "1"), where N=216=65536. The power of the set of possible
such PMs, i.e. their number, is estimated as N!=65536!, which gives colossal values for this N.
      </p>
      <p>
        But each byte address of the block can be represented by two bytes indicating two coordinates (row
and column) of the block. This gives us the opportunity to represent any permutation with two blocks
(256*256 elements) of bytes, setting in each identical address of these blocks the corresponding senior
byte (in the first block) and junior byte (in the second block) coordinates of the new address of the byte
selected for permutation. The view of the software module in Mathcad for generating the basic (main)
MK (PM) and the view of its components KeyA and KeyB in the format of two black and white images
is shown in Fig. 1. Therefore, any PM can be uniquely represented by two matrices of size 256*256,
the elements of which take values from the range 0-255, with the peculiarity that each of their 256
gradations of intensity in each of these two matrices (images) is repeated exactly 256 times. The
histograms of KeyA and KeyB PM components are shown in Fig. 2 and have the form of horizontal
lines, as expected. We note that such an isomorphic representation of the PM in the form of two images
gives us the opportunity to use these components KeyA and KeyB as two secret MCs of a general type,
for example, as additive and multiplicative keys in the MAPCs or other MAMs. This is evidenced by
the results of the simulation of the CT image (Im) of the MAPC using the proposed PM and its
components, as keys, shown in Fig. 3 with the matrices of explicit image (Im), intermediates, its
cryptograms (Cmap) and verifiable images [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]. And the histograms of explicit image, its cryptograms
after each CT with affine components of this PM are shown in Fig. 2.
      </p>
      <p>These model experiments confirmed that the CT MAPC with the existing 2 components of the PM
give high-quality cryptograms CD_ImAa and CD_ImAm, whose histograms H_CDa and H_CDm are
so close to the uniform distribution law that even for image (Im) with an entropy of 0.738, the entropy
of cryptograms differs from the theoretical maximum (8 bits) by just a fraction of a percent, going all
the way up to 7.99. The results of the simulation of the MAPC and multi-step MAPC for different cases,
when the components of affine transformations are first performed in a different sequence and with
different or one MK from the PM, and then permutation using the PM, or vice versa, also proved similar
qualitative CTs, when applying the proposed representations of the PM. But for all modifications of the
MAM with such PMs, the power of the set of which is estimated by a significant value N! = (256*256)!,
the issue of agreeing the session secret MPM is paramount.</p>
      <p>Here is an analogy with the Diffie-Hellman protocol. In Fig. 5-8 show the results of modeling these
two steps of the protocol for the agreement of the secret MC in Mathcad, and Fig. 9-10 shows the
obtained intermediate and resulting secret MPM in the isomorphic representation of images. The parties
do not know the degrees of the other party, but the MPs obtained by them are identical, which can be
seen from Fig. 10. In this way, raising MPMs (N*N binaries, where N=216 !) to a power is equivalently
replaced by fast permutations, which, moreover, can be even more accelerated for significant powers
due to the use of some basic set of fixed (fixed powers of MPM) and their specific sequence, which
provides significant advantages due to the acceleration of the calculation of degrees of MPM, the
simplicity of possible implementations and the reduction of costs.</p>
      <p>In accordance with the MP protocol, values of significant dimensions must be multiplied many
times, that is, raised to a power. And the degrees to which the parties raise these isomorphically
presented MPs must be significant enough to ensure the necessary crypto-resistance against random
attacks. Therefore, taking into account the necessity and expediency of using the above-mentioned
accelerated methods of raising matrices to a power, we show an adequate isomorphic transformation of
this procedure into some sequence of fixed permutations.</p>
      <p>Depending on the code in which the value of the degree is given, appropriate permutations are
selected from the formed set of fixed MPs, the degrees of which correspond to the corresponding
weights of the digits of the binary or other code representations of the selected random numbers: xc
(Alisa) and yс (Bob). The results of these simulations, the corresponding formulas, procedures, key
fragments are shown in Fig. 11-12. A comparison of matrix elements in Fig. 12 highlights their equality.</p>
      <p>Using the developed functional parametric models of the CT with the help of a secret MK (PM),
agreed with the proposed protocol, shown above, a check of the correctness of their synthesis and
adequacy of the models was performed by means of direct and reverse CT image, which was shown in
Fig. 1-3. The results obtained by modeling in Mathcad confirm the correctness of the protocol, and the
stability analysis, which will be presented in more detail in the report, shows the impossibility of attacks
due to the huge number of possible PMs.</p>
      <p>Although the initial MPM is known to both parties, the protocol allows without knowledge of the
secret degrees being chosen sides, form a secret key, PM in a similar isomorphic form in a time
proportional to the number fixed permutations. In addition, stability analysis taking into account the
power of the set formed by this the protocol of the relevant PM of significant dimensions showed the
impossibility of carrying out attacks as a result of a huge set of possible MPs, which is estimated by the
value (216)!</p>
    </sec>
    <sec id="sec-3">
      <title>3. Conclusions</title>
      <p>The relevance and necessity of creating secret permutation keys to increase the cryptographic
stability of matrix affine permutation ciphers and other cryptosystems of the new matrix type are
substantiated. A protocol for agreeing a secret key in the form of isomorphic representations of
permutation matrixs of significant dimensions was proposed, model experiments were performed that
confirmed the adequacy of the functioning of the models and the proposed protocol and methods of
permutation matrixs generation, their advantages. The models are simple, convenient, adaptable for
various format and color images, implemented by matrix processors, have high efficiency, stability, and
speed.</p>
    </sec>
    <sec id="sec-4">
      <title>4. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>B.</given-names>
            <surname>Schneier</surname>
          </string-name>
          , Applied cryptography. Protocols, algorithms, source texts in C language, Triumph,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Wenbo</surname>
          </string-name>
          ,
          <article-title>Modern cryptography</article-title>
          .
          <source>Theory and practice</source>
          ,
          <source>Williams House</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>N.</given-names>
            <surname>Fergusson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Schneier</surname>
          </string-name>
          , Practical cryptograph,
          <source>Williams House</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.J.</given-names>
            <surname>Menezes</surname>
          </string-name>
          , P.C. van
          <string-name>
            <surname>Oorschot</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          <string-name>
            <surname>Vanstone</surname>
          </string-name>
          , “Handbook of Applied Cryptography.” CRC Press,
          <year>1997</year>
          ,
          <volume>794</volume>
          р.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D.</given-names>
            <surname>Bernstein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Buchmann</surname>
          </string-name>
          , and E. Dahmen, “
          <string-name>
            <surname>Post-Quantum Cryptography</surname>
          </string-name>
          .” Springer-Verlag, Berlin-Heidelberg,
          <year>2009</year>
          ,
          <year>245p</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6] NIST. “
          <article-title>Advanced Encryption Standard (AES)</article-title>
          .
          <source>” National Institute of Standards and Technology</source>
          ,
          <year>2001</year>
          . [Online]. Available: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>N. A.</given-names>
            <surname>Gunathilake</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. J.</given-names>
            <surname>Buchanan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Asif</surname>
          </string-name>
          , “
          <article-title>Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges</article-title>
          and Applications,
          <source>” IEEE 5th World Forum on Internet of Things (WF-IoT)</source>
          ,
          <year>2019</year>
          , doi: 10.1109/WF-IoT.
          <year>2019</year>
          .8767250. IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Zeadallya</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. K. Das</surname>
            , and
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Sklavos</surname>
          </string-name>
          ,
          <article-title>"Cryptographic technologies and protocol standards for Internet of Things,"</article-title>
          <source>Internet of Things</source>
          ,
          <year>2019</year>
          , doi: 10.1016/j.iot.
          <year>2019</year>
          .
          <volume>100075</volume>
          . Elsevier.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>B. S.</given-names>
            <surname>Sumit Singh</surname>
          </string-name>
          <string-name>
            <surname>Dhanda</surname>
          </string-name>
          , Poonam Jindal, “Lightweight Cryptography: A Solution to Secure IoT,” Wireless Personal Communications,
          <year>2020</year>
          , doi: 10.1007/s11277-020
          <source>-07134-3</source>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Hameed</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Alomary</surname>
          </string-name>
          , “Security Issues in IoT: A Survey,”
          <source>in Proceedings of 2019 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)</source>
          ,
          <year>2019</year>
          , DOI: 10.1109/3ICT.
          <year>2019</year>
          .
          <volume>8910320</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Mcginthy</surname>
            ,
            <given-names>J. M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Michaels</surname>
            ,
            <given-names>A. J.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>“Further Analysis of PRNG-Based Key Derivation Functions</article-title>
          .” IEEE Access,
          <volume>7</volume>
          ,
          <fpage>95978</fpage>
          -
          <lpage>95986</lpage>
          . DOI:
          <volume>10</volume>
          .1109/access.
          <year>2019</year>
          .
          <volume>2928768</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12] ISO/IEC 18033-4:
          <year>2011</year>
          . “
          <article-title>Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers</article-title>
          .” [Online]. Available: http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=
          <fpage>54532</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mahbub</surname>
          </string-name>
          , “
          <article-title>Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities</article-title>
          , and preemptive architectonics,
          <source>” Journal of Network and Computer Applications</source>
          , vol.
          <volume>168</volume>
          ,
          <year>2020</year>
          , doi: 10.1016/j.jnca.
          <year>2020</year>
          .
          <volume>102761</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Sfar</surname>
          </string-name>
          , E. Natalizio,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Challal</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Chtourou</surname>
          </string-name>
          , “
          <article-title>A roadmap for security challenges in the Internet of Things,” Digital Communications and Networks</article-title>
          , vol.
          <volume>4</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>118</fpage>
          -
          <lpage>137</lpage>
          ,
          <year>2018</year>
          , doi: 10.1016/j.dcan.
          <year>2017</year>
          .
          <volume>04</volume>
          .003.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>V.G.</given-names>
            <surname>Krasilenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.K.</given-names>
            <surname>Grabovlyak</surname>
          </string-name>
          , “
          <article-title>Matrix affine and permutation ciphers for encryption and decryption of images,”</article-title>
          <source>Systems of Information Processing</source>
          , vol.
          <volume>3</volume>
          (
          <issue>101</issue>
          ), pp.
          <fpage>53</fpage>
          -
          <lpage>62</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>V.G.</given-names>
            <surname>Krasilenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.V.</given-names>
            <surname>Nikitovich</surname>
          </string-name>
          , “
          <article-title>Modeling and research of cryptographic transformations of images based on their matrix-bit-map decomposition and matrix models of permutations with verification of integrity,” Electronics and Information Technologies</article-title>
          , vol.
          <volume>6</volume>
          , pp.
          <fpage>111</fpage>
          -
          <lpage>127</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>V.G.</given-names>
            <surname>Krasilenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Lazarev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.V.</given-names>
            <surname>Nikitovich</surname>
          </string-name>
          , “
          <article-title>The Block Parametric Matrix AffinePermutation Ciphers (BP_MAPCs) with Isomorphic Representations and their Research,” Actual problems of information systems</article-title>
          and technologies, pp.
          <fpage>270</fpage>
          -
          <lpage>282</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V.G.</given-names>
            <surname>Krasilenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.A</given-names>
            <surname>Lazarev</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          <article-title>V Nikitovich, “Matrix Models of Cryptographic Transformations of Video Images Transmitted from Aerial-Mobile Robotic Systems</article-title>
          .
          <source>In Control and Signal Processing Applications for Mobile and Aerial Robotic Systems,” Hershey, PA: IGI Global</source>
          , pp.
          <fpage>170</fpage>
          -
          <lpage>214</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Xiaoshuai</surname>
            <given-names>Wu</given-names>
          </string-name>
          , Tong Qiao, Ming Xu, Ning Zheng, “
          <article-title>Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling, Signal Process</article-title>
          .,” vol.
          <volume>188</volume>
          ,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .1016/j.sigpro.
          <year>2021</year>
          .
          <volume>108200</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>P.</given-names>
            <surname>Puteaux</surname>
          </string-name>
          , W. Puech, “
          <article-title>A recursive reversible data hiding in encrypted images method with a very high payload</article-title>
          ,
          <source>” IEEE Transactions on Multimedia</source>
          , vol.
          <volume>23</volume>
          , pp.
          <fpage>636</fpage>
          -
          <lpage>650</lpage>
          ,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .1109/TMM.
          <year>2020</year>
          .
          <volume>2985537</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>B.</given-names>
            <surname>Girod</surname>
          </string-name>
          “
          <article-title>The information theoretical significance of spatial and temporal masking in video signals</article-title>
          ,
          <source>” Proc. of the SPIE Symposium on Electronic Imaging</source>
          , vol.
          <volume>1077</volume>
          . Pp.
          <volume>178</volume>
          -
          <fpage>187</fpage>
          ,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>W.</given-names>
            <surname>Diffie</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M. E.</given-names>
            <surname>Hellman</surname>
          </string-name>
          , “New Directions in Cryptography”,
          <source>IEEE Transactions on Information Theory</source>
          , Vol.
          <volume>IT22</volume>
          ,
          <source>No. 6</source>
          , Vol.
          <volume>22</volume>
          , No.
          <issue>6</issue>
          , pp.
          <fpage>644</fpage>
          -
          <lpage>654</lpage>
          ,
          <year>1976</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>A.Y.</given-names>
            <surname>Beletskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Beletskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.A.</given-names>
            <surname>Stetsenko</surname>
          </string-name>
          , “
          <article-title>Modified matrix asymmetric cryptographic algorithm of Diffie-Hellman</article-title>
          , Artificial Intelligence,” no.
          <issue>3</issue>
          , pp.
          <fpage>697</fpage>
          -
          <lpage>705</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Preetika</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Manju</surname>
            <given-names>V.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Pushpendra R</surname>
          </string-name>
          . V., “
          <article-title>Secure Authentication Approach Using DiffieHellman Key Exchange”</article-title>
          , International Conference on Control,
          <article-title>Instrumentation, Communication and Computational Technologies (ICCICCT)</article-title>
          , IEEE publisher,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kannan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mahalakshmi</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Deepshika</surname>
          </string-name>
          , “
          <article-title>Cryptographic Algorithm involving the Matrix Qp</article-title>
          , Korean J. Math.,”
          <volume>30</volume>
          (
          <issue>3</issue>
          )(
          <year>2022</year>
          ),
          <fpage>533</fpage>
          -
          <lpage>538</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>A.</given-names>
            <surname>Deepshika</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kannan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mahalakshmi</surname>
          </string-name>
          , K. Kaleeswari, “
          <source>Cryptographic Algorithm Based on Permutation Ciphers,” Int. J. Math. And Appl.</source>
          ,
          <volume>11</volume>
          (
          <issue>4</issue>
          )(
          <year>2023</year>
          ),
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Saima</surname>
            <given-names>I.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Ram L</surname>
          </string-name>
          . Y.,
          <article-title>“A Secure File Transfer Using the Concept of Dynamic Random Key, Transaction Id and Validation ey with Symmetric ey Encryption Algorithm”</article-title>
          ,
          <source>in Proceedings of First International Conference on Smart System, Innovations and Computing, Smart Innovation, Systems and Technologies</source>
          . Springer Nature Singapore, Pte Ltd., pp.
          <fpage>271</fpage>
          -
          <lpage>278</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Alvarez</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Caballero-Gil</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santonja</surname>
            <given-names>J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Zamora</surname>
            <given-names>A.</given-names>
          </string-name>
          , “
          <article-title>Algorithms for Lightweight key Exchange”</article-title>
          ,
          <source>In Proceedings of the 10th International Conference on Ubiquitous Computing and Ambient Intelligence</source>
          , UCAmI, Springer International Publishing, pp.
          <fpage>536</fpage>
          -
          <lpage>543</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Sagar</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumar</surname>
            <given-names>K.</given-names>
          </string-name>
          , “
          <article-title>Symmetric Key Cryptographic Algorithm Using Counter Propagation Network (CPN),”</article-title>
          <source>in Proceedings of the 2014 ACM International Conference on Information and Communication Technology for Competitive Strategies</source>
          ,
          <year>2014</year>
          , p.
          <fpage>51</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>V.G.</given-names>
            <surname>Krasilenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.V.</given-names>
            <surname>Nikitovich</surname>
          </string-name>
          , “
          <article-title>Modeling protocols for secret matrix key agreement for cryptographic transformations and matrix-type systems</article-title>
          ,
          <source>” Information Processing Systems</source>
          , vol.
          <volume>3</volume>
          (
          <issue>149</issue>
          ), pp.
          <fpage>151</fpage>
          -
          <lpage>157</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>V.G.</given-names>
            <surname>Krasilenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.V.</given-names>
            <surname>Nikitovich</surname>
          </string-name>
          , “
          <article-title>Modeling multistep and multilevel protocols for secret matrix key agreement,” Computer-Integrated Technologies: Education, Science</article-title>
          , Production: Scientific Journal, Lutsk: Lutsk National Technical University, vol.
          <volume>26</volume>
          , pp.
          <fpage>111</fpage>
          -
          <lpage>120</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>