<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Modeling of a Cryptographic Protocol for Matching a Shared Secret Key-Permutation of Significant Dimension with its Isomorphic Representations</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Volodymyr</forename><surname>Saiko</surname></persName>
							<email>vgsaiko@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60 Volodymyrska Street</addrLine>
									<postCode>01033</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vladimir</forename><surname>Krasilenko</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Vinnytsia National Agrarian University</orgName>
								<address>
									<addrLine>st. Sonyachna, 3</addrLine>
									<postCode>21008</postCode>
									<settlement>Vinnytsia, Vinnytsia Oblast</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Svitlana</forename><surname>Kiporenko</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Vinnytsia National Agrarian University</orgName>
								<address>
									<addrLine>st. Sonyachna, 3</addrLine>
									<postCode>21008</postCode>
									<settlement>Vinnytsia, Vinnytsia Oblast</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Illia</forename><surname>Chikov</surname></persName>
							<email>ilya95chikov@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">Vinnytsia National Agrarian University</orgName>
								<address>
									<addrLine>st. Sonyachna, 3</addrLine>
									<postCode>21008</postCode>
									<settlement>Vinnytsia, Vinnytsia Oblast</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Diana</forename><surname>Nikitovych</surname></persName>
							<email>diananikitovych@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">Vinnytsia National Agrarian University</orgName>
								<address>
									<addrLine>st. Sonyachna, 3</addrLine>
									<postCode>21008</postCode>
									<settlement>Vinnytsia, Vinnytsia Oblast</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">Information Technology and Implementation (IT&amp;I-2023)</orgName>
								<address>
									<addrLine>November 20-21</addrLine>
									<postCode>2023</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Modeling of a Cryptographic Protocol for Matching a Shared Secret Key-Permutation of Significant Dimension with its Isomorphic Representations</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">CC7FBF9FA6570D2ACB036AD53944F95D</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T20:01+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Matrix-algebraic model</term>
					<term>matrix representations</term>
					<term>isomorphic permutation key</term>
					<term>cryptogram</term>
					<term>cryptographic transformations</term>
					<term>affine-permutation cipher</term>
					<term>protocol</term>
					<term>matrix-type cryptosystem</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>A protocol for agreement by user parties of secret keys-permutations of significant dimension and their new isomorphic matrix representations is proposed. Features and advantages of such representations are considered. The need to create such secret permutation keys to improve the cryptographic stability of matrix affine-permutation ciphers and other cryptosystems of the new matrix type is well-founded. The results of modeling the basic procedures of the proposed key agreement protocol in the form of an isomorphic permutation of a significant dimension, namely the processes of generating permutation matrices and their degrees, are given. Model experiments of the protocol as a whole, including accelerated methods of raising permutations to significant degrees, were performed. Such methods use sets of fixed permutation matrices, which are degrees of the underlying permutation matrix, and all these matrices are given in their isomorphic representations. The values of the fixed exponents correspond to the corresponding weights of the digits of the binary or other code representations of the selected random numbers. The results of simulation modeling demonstrated the adequacy and advantages of isomorphic representations of the processes of functioning of matrix-algebraic models of cryptographic transformations and the proposed secret key-permutation agreement protocol.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Introduction. Generalization of known cryptosystems <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref> with scalar-type data formats to the cases of matrix-tensor formats, emergence and research of a new class of matrix-type cryptosystems (MTC) <ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref> based on their matrix-algebraic models (MAM) of cryptographic transformations (CT) 2D (3D) -arrays, images (Is), which have a number of significant advantages, contributed to the intensification of MTC, MAM research and the demonstration of a number of new improvements and applications <ref type="bibr">[11-14, 16, 18, 19-21]</ref>. MAMs in their hardware implementations are more easily displayed on matrix processors, have extended functionality, improved crypto-resistance, allow checking the integrity of cryptograms of black and white, color images <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref><ref type="bibr" target="#b19">[20]</ref>, and the presence of distortions in them <ref type="bibr" target="#b15">[16]</ref>, create block ones <ref type="bibr" target="#b16">[17]</ref>, parametric <ref type="bibr" target="#b17">[18]</ref>, multi-page <ref type="bibr" target="#b17">[18]</ref> models with their significant stability <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b17">18]</ref>. Secret key generation protocols for known non-matrix type ciphers were considered in <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b11">12,</ref><ref type="bibr" target="#b21">[22]</ref><ref type="bibr" target="#b22">[23]</ref><ref type="bibr" target="#b23">[24]</ref><ref type="bibr" target="#b24">[25]</ref><ref type="bibr" target="#b25">[26]</ref><ref type="bibr" target="#b26">[27]</ref><ref type="bibr" target="#b27">[28]</ref><ref type="bibr" target="#b28">[29]</ref>, and for matrix type ciphers were partially considered in our previous works, including in works <ref type="bibr" target="#b29">[30,</ref><ref type="bibr" target="#b30">31]</ref>, where some improved matrix modifications of known key matching protocols were proposed. Generalized MAM, matrix affine and affine-permutation ciphers (MAPCs), their modifications were studied and used in the creation of blind and other improved digital signatures in <ref type="bibr" target="#b17">[18]</ref>. For CT in matrix models of permutations (MM_P), with their basic procedures of matrix multiplication and some other element-by-element modulo operations on matrices, byte matrices formed from rows, columns, vectors, which in unitary or other codes display symbols, codes, bytes, must be multiplied by the permutation matrix (PM). Procedures for rearranging bits, bytes or their groups are the most common and mandatory for almost all known and newly created algorithms and ciphers. To increase the entropy of cryptograms images with their CT based on MM_P and change their histograms, the decomposition of R, G, B components and their bit slices and several matrix keys (MKs) of the PM type are necessary <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b17">18,</ref><ref type="bibr" target="#b20">21,</ref><ref type="bibr" target="#b29">30]</ref>. A number of such pseudo-random (current, step-by-step, frame-by-frame) MKs, which would meet the requirements and be quickly generated, is also needed for masking, CT of video files or stream of blocks from files, images with their significant sizes.</p><p>Formulation of the problem. Thus, there is a need for the MAM to form a number of MKs of the PM-type that would satisfy a number of requirements from the main MK. Since the issue of matching the main MK (MMK) of a general type, but not the sequence of PMs, was considered in <ref type="bibr" target="#b29">[30,</ref><ref type="bibr" target="#b30">31]</ref>, and the methods of generating a stream of MKs-permutations from the main MK were partially considered in <ref type="bibr" target="#b30">[31]</ref>, but only for bit MPs of small sizes (256*256), then the purpose of the work is to propose and investigate a protocol for the coordination of a secret (main) MK in the form of an PM of significant dimensions, i.e., an main PM (MPM), to improve and adapt the type and structure of a MPM of such or even greater dimensions to the images format and to fast hardware solutions, to model this protocol and the process of formation flow of PMs from such a MPM for MAM CT in MT systems. In addition, the above review and analysis of publications allows to determine another important task, namely the need to develop and model such MAM CTs, which would be best suited for implementation based on vector-matrix multipliers (VMMs), as well as to determine the characteristics and indicators of such models and implementations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Presentation of the main material and research results.</head><p>An overview of MT ciphers, especially multifunctional parametric block ciphers <ref type="bibr" target="#b16">[17]</ref>, their analysis shows that it is advisable to use isomorphism of various representations of permutations (matrices or vectors) that act as a master key (MK) and block or step-by-step, round MKs to achieve the goal of PMtype, i.e. sub-keys (SKs), which are matrices of permutations of P (its powers!) or vectors isomorphic to them. It is known from the works <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b15">16,</ref><ref type="bibr" target="#b16">17,</ref><ref type="bibr" target="#b17">18]</ref> that with CT based on the basis of matrix affinepermutation ciphers (MAPCs) and vector affine-permutation ciphers (VAPCs), cryptograms for some types of text-graphic documents (TGD) and images (I), especially for block-based MAMs, when using one personal computer (PC) for all blocks are insufficient in terms of stability, however, a number of PCs created from MPM solve this problem. And that is why the aspect of coordinating the secret MPM of the PM-type with a significant dimension is important. Let's consider the situation when for M blocks with a length of 256*256 bytes, presented in the form of a matrix of a black and white image, it is necessary to rearrange all bytes in accordance with PM. In this case, PM in the generally accepted form should be square with N*N elements ("0" or "1"), where N=2 16 =65536. The power of the set of possible such PMs, i.e. their number, is estimated as N!=65536!, which gives colossal values for this N.</p><p>But each byte address of the block can be represented by two bytes indicating two coordinates (row and column) of the block. This gives us the opportunity to represent any permutation with two blocks (256*256 elements) of bytes, setting in each identical address of these blocks the corresponding senior byte (in the first block) and junior byte (in the second block) coordinates of the new address of the byte selected for permutation. The view of the software module in Mathcad for generating the basic (main) MK (PM) and the view of its components KeyA and KeyB in the format of two black and white images is shown in Fig. <ref type="figure" target="#fig_0">1</ref>. Therefore, any PM can be uniquely represented by two matrices of size 256*256, the elements of which take values from the range 0-255, with the peculiarity that each of their 256 gradations of intensity in each of these two matrices (images) is repeated exactly 256 times. The histograms of KeyA and KeyB PM components are shown in Fig. <ref type="figure" target="#fig_1">2</ref> and have the form of horizontal lines, as expected. We note that such an isomorphic representation of the PM in the form of two images gives us the opportunity to use these components KeyA and KeyB as two secret MCs of a general type, for example, as additive and multiplicative keys in the MAPCs or other MAMs. This is evidenced by the results of the simulation of the CT image (Im) of the MAPC using the proposed PM and its components, as keys, shown in Fig. <ref type="figure" target="#fig_2">3</ref> with the matrices of explicit image (Im), intermediates, its cryptograms (Cmap) and verifiable images <ref type="bibr" target="#b30">[31]</ref>. And the histograms of explicit image, its cryptograms after each CT with affine components of this PM are shown in Fig. <ref type="figure" target="#fig_1">2</ref>.     These model experiments confirmed that the CT MAPC with the existing 2 components of the PM give high-quality cryptograms CD_ImAa and CD_ImAm, whose histograms H_CDa and H_CDm are so close to the uniform distribution law that even for image (Im) with an entropy of 0.738, the entropy of cryptograms differs from the theoretical maximum (8 bits) by just a fraction of a percent, going all the way up to 7.99. The results of the simulation of the MAPC and multi-step MAPC for different cases, when the components of affine transformations are first performed in a different sequence and with different or one MK from the PM, and then permutation using the PM, or vice versa, also proved similar qualitative CTs, when applying the proposed representations of the PM. But for all modifications of the MAM with such PMs, the power of the set of which is estimated by a significant value N! = (256*256)!, the issue of agreeing the session secret MPM is paramount.</p><p>Here is an analogy with the Diffie-Hellman protocol. In Fig. <ref type="figure" target="#fig_7">5-8</ref> show the results of modeling these two steps of the protocol for the agreement of the secret MC in Mathcad, and Fig. <ref type="figure" target="#fig_8">9</ref>-10 shows the obtained intermediate and resulting secret MPM in the isomorphic representation of images. The parties do not know the degrees of the other party, but the MPs obtained by them are identical, which can be seen from Fig. <ref type="figure" target="#fig_9">10</ref>. In this way, raising MPMs (N*N binaries, where N=2 16 !) to a power is equivalently replaced by fast permutations, which, moreover, can be even more accelerated for significant powers due to the use of some basic set of fixed (fixed powers of MPM) and their specific sequence, which provides significant advantages due to the acceleration of the calculation of degrees of MPM, the simplicity of possible implementations and the reduction of costs. In accordance with the MP protocol, values of significant dimensions must be multiplied many times, that is, raised to a power. And the degrees to which the parties raise these isomorphically presented MPs must be significant enough to ensure the necessary crypto-resistance against random attacks. Therefore, taking into account the necessity and expediency of using the above-mentioned accelerated methods of raising matrices to a power, we show an adequate isomorphic transformation of this procedure into some sequence of fixed permutations.</p><p>Depending on the code in which the value of the degree is given, appropriate permutations are selected from the formed set of fixed MPs, the degrees of which correspond to the corresponding weights of the digits of the binary or other code representations of the selected random numbers: xc (Alisa) and yс (Bob). The results of these simulations, the corresponding formulas, procedures, key fragments are shown in Fig. <ref type="figure" target="#fig_11">11-12</ref>. A comparison of matrix elements in Fig. <ref type="figure" target="#fig_11">12</ref> highlights their equality.</p><p>Using the developed functional parametric models of the CT with the help of a secret MK (PM), agreed with the proposed protocol, shown above, a check of the correctness of their synthesis and adequacy of the models was performed by means of direct and reverse CT image, which was shown in Fig. <ref type="figure" target="#fig_2">1-3</ref>. The results obtained by modeling in Mathcad confirm the correctness of the protocol, and the stability analysis, which will be presented in more detail in the report, shows the impossibility of attacks due to the huge number of possible PMs.    Although the initial MPM is known to both parties, the protocol allows without knowledge of the secret degrees being chosen sides, form a secret key, PM in a similar isomorphic form in a time proportional to the number fixed permutations. In addition, stability analysis taking into account the power of the set formed by this the protocol of the relevant PM of significant dimensions showed the impossibility of carrying out attacks as a result of a huge set of possible MPs, which is estimated by the value (2 16 )!  </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Software module for generating the basic (main) MK (PM) and the view of KeyA and KeyB components in the format of two black and white images (Mathcad window).</figDesc><graphic coords="3,122.00,115.95,350.91,146.45" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Histograms H_KeyA and H_KeyB, respectively, of the components KeyA and KeyB of PM, the histogram H_CD of explicit image, the corresponding histograms H_CDa and H_CDm of the cryptogram of the image after additive and multiplicative affine transformations of this image using the same KeyA and KeyB (Mathcad window).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: The results of the simulation of MAPC based on PM and its components, as additive and multiplicative MKs. Top row, from left to right: explicit image, after transformations, cryptogram of image after MAPC; bottom row: reconstructed, intermediate and difference (right) images of TGD.</figDesc><graphic coords="3,129.30,538.14,330.15,186.74" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: View (2D) of known generated PMs: top (forward), bottom (reverse) permutations.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Program modules (copies from Mathcad) displaying the procedure of iterative permutations of the initial permutation matrix PM, isomorphic to the elevation of the permutation matrix PM to the required power (11 !) by side x (Alisa).</figDesc><graphic coords="4,155.75,360.93,283.30,257.82" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Program modules (copies from Mathcad) displaying the procedure of iterative permutations of the initial permutation matrix PM, isomorphic to the elevation of the permutation matrix PM to the required power (17 !) by side y (Bob).</figDesc><graphic coords="5,134.55,231.29,318.84,293.85" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 7 :</head><label>7</label><figDesc>Figure 7: Program modules (copies from Mathcad) reflecting the procedure of iterative permutations in the new PM obtained from y, isomorphic to the elevation to the required power (11 !) by side x (Alisa).</figDesc><graphic coords="6,133.25,104.79,329.10,279.55" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 8 :</head><label>8</label><figDesc>Figure 8: Program modules (copies from Mathcad) reflecting the procedure of iterative permutations in the new PM obtained from x, isomorphic to the elevation to the required power (17 !) by side y (Bob).</figDesc><graphic coords="6,128.47,435.07,337.47,288.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 9 :</head><label>9</label><figDesc>Figure 9: New PMs received by the parties (each in the form of their two components) after the first step of the protocol, those that are forwarded to the other party.</figDesc><graphic coords="7,85.73,73.50,423.40,135.74" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Figure 10 :</head><label>10</label><figDesc>Figure 10: The participants of the session received identical new PMs (each in the form of their two components) after the second step of the protocol, i.e. essentially one secret PM.</figDesc><graphic coords="7,156.97,443.52,280.25,190.47" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_10"><head>Figure 11 :</head><label>11</label><figDesc>Figure 11: Formulas and procedures (copies from Mathcad windows) used for modeling isomorphic formation accelerated processes of degrees of matrix permutations by sides.</figDesc><graphic coords="8,82.25,73.50,430.95,270.72" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_11"><head>Figure 12 :</head><label>12</label><figDesc>Figure 12: Fragments of the keys formed after the second step, which testify to the adequacy of the accelerated algorithms of the isomorphic formation of degrees of matrix permutations by sides.</figDesc><graphic coords="8,73.25,383.85,448.25,323.99" type="bitmap" /></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Conclusions</head><p>The relevance and necessity of creating secret permutation keys to increase the cryptographic stability of matrix affine permutation ciphers and other cryptosystems of the new matrix type are substantiated. A protocol for agreeing a secret key in the form of isomorphic representations of permutation matrixs of significant dimensions was proposed, model experiments were performed that confirmed the adequacy of the functioning of the models and the proposed protocol and methods of permutation matrixs generation, their advantages. The models are simple, convenient, adaptable for various format and color images, implemented by matrix processors, have high efficiency, stability, and speed.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><surname>Schneier</surname></persName>
		</author>
		<title level="m">Applied cryptography. Protocols, algorithms, source texts in C language</title>
				<meeting><address><addrLine>Triumph</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Wenbo</surname></persName>
		</author>
		<title level="m">Modern cryptography. Theory and practice</title>
				<imprint>
			<publisher>Williams House</publisher>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Practical cryptograph</title>
		<author>
			<persName><forename type="first">N</forename><surname>Fergusson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Schneier</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>Williams House</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Handbook of Applied Cryptography</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>Menezes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">C</forename><surname>Van Oorschot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Vanstone</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1997">1997</date>
			<publisher>CRC Press</publisher>
			<biblScope unit="page">794</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Post-Quantum Cryptography</title>
		<author>
			<persName><forename type="first">D</forename><surname>Bernstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Buchmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Dahmen</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Springer-Verlag</publisher>
			<biblScope unit="page">245</biblScope>
			<pubPlace>Berlin-Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Advanced Encryption Standard (AES)</title>
		<ptr target="http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf" />
		<imprint>
			<date type="published" when="2001">2001</date>
		</imprint>
		<respStmt>
			<orgName>NIST ; National Institute of Standards and Technology</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A</forename><surname>Gunathilake</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">J</forename><surname>Buchanan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Asif</surname></persName>
		</author>
		<idno type="DOI">10.1109/WF-IoT.2019.8767250</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 5th World Forum on Internet of Things (WF-IoT)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Cryptographic technologies and protocol standards for Internet of Things</title>
		<author>
			<persName><forename type="first">S</forename><surname>Zeadallya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Das</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Sklavos</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.iot.2019.100075</idno>
	</analytic>
	<monogr>
		<title level="j">Internet of Things</title>
		<imprint>
			<date type="published" when="2019">2019</date>
			<publisher>Elsevier</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Lightweight Cryptography: A Solution to Secure IoT</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">S</forename><surname>Sumit Singh Dhanda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Poonam</forename><surname>Jindal</surname></persName>
		</author>
		<idno type="DOI">10.1007/s11277-020-07134-3</idno>
	</analytic>
	<monogr>
		<title level="j">Wireless Personal Communications</title>
		<imprint>
			<date type="published" when="2020">2020</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Security Issues in IoT: A Survey</title>
		<author>
			<persName><forename type="first">A</forename><surname>Hameed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Alomary</surname></persName>
		</author>
		<idno type="DOI">10.1109/3ICT.2019.8910320</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 2019 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies</title>
				<meeting>2019 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies</meeting>
		<imprint>
			<date type="published" when="2019">3ICT. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Further Analysis of PRNG-Based Key Derivation Functions</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Mcginthy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>Michaels</surname></persName>
		</author>
		<idno type="DOI">10.1109/access.2019.2928768</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="95978" to="95986" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<idno>ISO/IEC 18033-4:2011</idno>
		<ptr target="http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54532" />
		<title level="m">Information technology -Security techniques -Encryption algorithms -Part 4: Stream ciphers</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics</title>
		<author>
			<persName><forename type="first">M</forename><surname>Mahbub</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jnca.2020.102761</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Network and Computer Applications</title>
		<imprint>
			<biblScope unit="volume">168</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">A roadmap for security challenges in the Internet of Things</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">R</forename><surname>Sfar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Natalizio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Challal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Chtourou</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.dcan.2017.04.003</idno>
	</analytic>
	<monogr>
		<title level="j">Digital Communications and Networks</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="118" to="137" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Matrix affine and permutation ciphers for encryption and decryption of images</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">G</forename><surname>Krasilenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Grabovlyak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Systems of Information Processing</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">101</biblScope>
			<biblScope unit="page" from="53" to="62" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Modeling and research of cryptographic transformations of images based on their matrix-bit-map decomposition and matrix models of permutations with verification of integrity</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">G</forename><surname>Krasilenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">V</forename><surname>Nikitovich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electronics and Information Technologies</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="111" to="127" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">The Block Parametric Matrix Affine-Permutation Ciphers (BP_MAPCs) with Isomorphic Representations and their Research</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">G</forename><surname>Krasilenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Lazarev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">V</forename><surname>Nikitovich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Actual problems of information systems and technologies</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="270" to="282" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Matrix Models of Cryptographic Transformations of Video Images Transmitted from Aerial-Mobile Robotic Systems</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">G</forename><surname>Krasilenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Lazarev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Nikitovich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Control and Signal Processing Applications for Mobile and Aerial Robotic Systems</title>
				<meeting><address><addrLine>Hershey, PA</addrLine></address></meeting>
		<imprint>
			<publisher>IGI Global</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="170" to="214" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling</title>
		<author>
			<persName><forename type="first">Xiaoshuai</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tong</forename><surname>Qiao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ming</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ning</forename><surname>Zheng</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.sigpro.2021.108200</idno>
	</analytic>
	<monogr>
		<title level="j">Signal Process</title>
		<imprint>
			<biblScope unit="volume">188</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">A recursive reversible data hiding in encrypted images method with a very high payload</title>
		<author>
			<persName><forename type="first">P</forename><surname>Puteaux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Puech</surname></persName>
		</author>
		<idno type="DOI">10.1109/TMM.2020.2985537</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Multimedia</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="636" to="650" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">The information theoretical significance of spatial and temporal masking in video signals</title>
		<author>
			<persName><forename type="first">B</forename><surname>Girod</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the SPIE Symposium on Electronic Imaging</title>
				<meeting>of the SPIE Symposium on Electronic Imaging</meeting>
		<imprint>
			<date type="published" when="1989">1989</date>
			<biblScope unit="volume">1077</biblScope>
			<biblScope unit="page" from="178" to="187" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">New Directions in Cryptography</title>
		<author>
			<persName><forename type="first">W</forename><surname>Diffie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">E</forename><surname>Hellman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Information Theory</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="644" to="654" />
			<date type="published" when="1976">1976</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Modified matrix asymmetric cryptographic algorithm of Diffie-Hellman</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">Y</forename><surname>Beletskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Beletskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Stetsenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="697" to="705" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Secure Authentication Approach Using Diffie-Hellman Key Exchange</title>
		<author>
			<persName><forename type="first">J</forename><surname>Preetika</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Manju</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">V</forename><surname>Pushpendra</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)</title>
				<imprint>
			<publisher>IEEE publisher</publisher>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Cryptographic Algorithm involving the Matrix Qp</title>
		<author>
			<persName><forename type="first">J</forename><surname>Kannan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mahalakshmi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Deepshika</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Korean J. Math</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="533" to="538" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Cryptographic Algorithm Based on Permutation Ciphers</title>
		<author>
			<persName><forename type="first">A</forename><surname>Deepshika</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kannan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mahalakshmi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kaleeswari</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Math. And Appl</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="1" to="7" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">A Secure File Transfer Using the Concept of Dynamic Random Key, Transaction Id and Validation ey with Symmetric ey Encryption Algorithm</title>
		<author>
			<persName><forename type="first">I</forename><surname>Saima</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">Y</forename><surname>Ram</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of First International Conference on Smart System, Innovations and Computing, Smart Innovation, Systems and Technologies</title>
				<meeting>First International Conference on Smart System, Innovations and Computing, Smart Innovation, Systems and Technologies</meeting>
		<imprint>
			<publisher>Springer Nature Singapore, Pte Ltd</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="271" to="278" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Algorithms for Lightweight key Exchange</title>
		<author>
			<persName><forename type="first">R</forename><surname>Alvarez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Caballero-Gil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Santonja</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zamora</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 10th International Conference on Ubiquitous Computing and Ambient Intelligence</title>
				<meeting>the 10th International Conference on Ubiquitous Computing and Ambient Intelligence</meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="536" to="543" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Symmetric Key Cryptographic Algorithm Using Counter Propagation Network (CPN)</title>
		<author>
			<persName><forename type="first">V</forename><surname>Sagar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2014 ACM International Conference on Information and Communication Technology for Competitive Strategies</title>
				<meeting>the 2014 ACM International Conference on Information and Communication Technology for Competitive Strategies</meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page">51</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Modeling protocols for secret matrix key agreement for cryptographic transformations and matrix-type systems</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">G</forename><surname>Krasilenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">V</forename><surname>Nikitovich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Processing Systems</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">149</biblScope>
			<biblScope unit="page" from="151" to="157" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Modeling multistep and multilevel protocols for secret matrix key agreement</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">G</forename><surname>Krasilenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">V</forename><surname>Nikitovich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer-Integrated Technologies: Education, Science, Production: Scientific Journal</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="page" from="111" to="120" />
			<date type="published" when="2017">2017</date>
			<publisher>Lutsk National Technical University</publisher>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
