=Paper=
{{Paper
|id=Vol-3896/paper22
|storemode=property
|title=Advanced data encryption method based on the monochrome pixel alphabet
|pdfUrl=https://ceur-ws.org/Vol-3896/paper22.pdf
|volume=Vol-3896
|authors=Vasyl Trysnyuk,Kyrylo Smetanin,Ihor Humeniuk,Oleksandr Lahodnyi,Volodymyr Okhrimchuk
|dblpUrl=https://dblp.org/rec/conf/ittap/TrysnyukSHLO24
}}
==Advanced data encryption method based on the monochrome pixel alphabet==
Advanced data encryption method based on
the monochrome pixel alphabet
Vasyl Trysnyuk1,†, Kyrylo Smetanin2,∗,†, Ihor Humeniuk2,†, Oleksandr Lahodnyi2,† and
Volodymyr Okhrimchuk2,†
1
Institute of Telecommunications and Global Information Space of the National Academy of Sciences of Ukraine, 13
Chokolivsky Blvd., Kyiv, 02000, Ukraine
2
Korolov Zhytomyr Military Institute, 22 Miru Ave., Zhytomyr, 10004, Ukraine
Abstract
Results of the encryption methods analysis showed, that modern approaches only consider the
cryptographic and steganographic properties of data protection algorithms and do not provide the
proper level of information confidentiality. An advanced data encryption method based on a
monochrome image alphabet, which takes into account cryptographic and steganographic properties
of information security, has been proposed in the article. The method utilizes mathematical
techniques to conceal the content of the original message, specifically by transforming its characters
into an alphabet-like form and applying mathematical operations to convert the result into ciphertext.
In combination with steganographic techniques, a monochrome image serves as the container,
forming the basis for constructing a pixel matrix. It is shown that the cryptographic resilience of the
method and information confidence exhibit functional dependency on the number of blocks into
which the original image is divided, as well as its key system and the dynamic nature of pixel alphabet
formation. The results of the experiment confirm that the method possesses the combination of
cryptographic and steganographic properties exhibits, high efficiency, and provides an adequate and
necessary level of information confidentiality. The conducted experiments have confirmed the
functionality and adequacy of the proposed data encryption method based on a monochrome image
alphabet. This allows us to recommend its practical use for information protection systems in
institutions and organizations.
Keywords
data encryption, monochrome pixel alphabet, steganographic and cryptographic properties,
cryptographic strength.1
1.Introduction and Literature Review
In the current stage of information technology development, the issue of safeguarding the
confidentiality of information resources is becoming increasingly relevant, timely, and
ITTAP’2024: 4th International Workshop on Information Technologies: Theoretical and Applied Problems, October 23-25,
2024, Ternopil, Ukraine, Opole, Poland ∗ Corresponding author.
†
These authors contributed equally. trysnyuk@ukr.net (V. Trysnyuk); kiry221982@gmail.com (K. Smetanin);
ig_gum@ukr.net (I. Humeniuk);
lov.82@ukr.net (O. Lahodnyi); okhrimchuk84@ukr.net (V. Okhrimchuk)
0000-0001-9920-4879 (V. Trysnyuk); 0000-0002-6062-550X (K. Smetanin); 0000-0001-5853-3238
(I. Humeniuk); 0000-0002-0812-939X (O. Lahodnyi); 0000-0001-7518-9993 (V. Okhrimchuk)
© 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
CEUR
ceur-ws.org
Workshop ISSN 1613-0073
Proceedings
important. This is primarily due to the intensive scientific and technical progress in the field of
information security, information, and cybersecurity, and, as a result, the advancement of
hardware and software information technologies. These advancements pose a threat to
important information that is transmitted, processed, and stored by ICS. At the present time,
various cryptographic protection algorithms are employed to ensure an adequate level of
information and cybersecurity (achieving the fundamental properties of information). These
include encryption for confidentiality, hashing for integrity control, and electronic digital
signatures for availability (authentication) [1].
However, statistical data from global government response teams to cyber incidents indicate
an increase in the number of attacks in the global and national cyberspace. This includes
cyberattacks of the access type, whose purpose is to gain unauthorized access to important
confidential and/or personal information of citizens and government officials of Ukraine, among
others. The development of highly effective methods for cryptographic data protection is an
important component in addressing information and cybersecurity concerns. The primary goal
is to ensure a high level of cryptographic security in the developed encryption algorithms.
Cryptographic security in methods of cryptographic data protection refers to the property of
cryptographic algorithms and cryptographic protocols that characterizes their ability to resist
cryptographic analysis methods [2].
Therefore, despite the existence of a lot of the number of known encryption algorithms,
unauthorized access to information and access-based cyberattacks leading to data leaks and
violations of the fundamental properties of information, which regulated by information
security policies, are still prevalent [3]. Thus, there is a need for the development of a new
cryptographic method that combines the mathematical properties of steganographic and
cryptographic systems to provide robust information protection.
The known methods [4–7] only consider either the cryptographic or steganographic
properties of data protection algorithms and, therefore, are incapable of resisting cryptographic
attacks or attacks on the cipher. Let is analyse these methods. In scientific project [4] authors
have proposed the new technic of steganography, based on the use of LSB method, for raster
images of different colorful models for higher security and reliability level achievement.
The article [5] presents a method of data concealment in Portable Document Format (PDF)
files that utilizes dereferenced objects and secret splitting or combining algorithms. It has been
demonstrated that the hidden pages are not visible during regular use of the software. In [6], the
authors focus on the development of Public-Key Encryption with Keyword Search (PEKS) in
cloud technologies through comprehensive research. They also propose certain potential
applications for this method.
In the scientific project [7], a mechanism for one-to-one information exchange with
individual persons by concealing it from the rest of the group is developed. Given their
availability, digital images are the most suitable components for use as containers compared to
other objects available on the internet. The technique proposed encrypts the message within an
image. In the scientific project [8–12], the authors propose approaches to combining
cryptographic and steganographic properties for information protection. Their solutions are
based on methods such as LSB, DWT, and well-known symmetric and asymmetric
cryptographic data encryption algorithms. Therefore, in the scientific project [8], the authors
propose an advanced steganographic-cryptographic system that combines the features of
cryptography and steganography. In [9], various combinations of cryptographic and
steganographic methods are explored, highlighting that steganography based on DWT with
Advanced Encryption Standard (AES) provides a higher level of security while preserving image
quality. Additionally, a combination of the Data Encryption Standard (DES) cryptographic
algorithm and LSB steganography for ensuring information confidentiality is suggested in [10].
The authors [11] have implemented a combination of the encryption method Cipher Block
Chaining (CBC) and steganography method LSB-Sobel. This combination allows for achieving a
relatively high quality of stego-images by using the Sobel edge detection method. In the
scientific project [12] an increase in the level of information resistance of unauthorized access
(UAA) was implemented using cryptographic and steganographic algorithm of its protection
based on LSB-method, AES-algorithm and exchange opened keys protocol Diffie-Hellman. The
analysis of scientific achievements indicates a large number of possible promising and
implemented combinations of steganographic and cryptographic methods for information
security. However, all of them are based on the use of known and outdated algorithms, the study
of cryptographic stability of which indicates the imperfection of these cryptographic systems.
This is due to the possibility of successful implementation by the violator of the UAA and attacks
on the cipher. And it is carried out in order to violate the integrity and confidentiality of
information that circulates in information systems or systems such as “sender-recipient”.
To achieve goal it’s necessary to: form pixel alphabet 𝐵 = {𝐵1,𝐵2,𝐵3, 𝐵4} for Ukrainian and
English alphabet symbols, numbers and punctuation symbols; synthesize and detail method
stages, which takes into account cryptographic and steganographic algorithm properties of
information security. After that for outgoing message 𝑀𝑒𝑠 = {𝑀1,. . . , 𝑀𝑚} conduct verification of
suggested method; conduct research of studying the impact of the parameters of a graphical
container on the effectiveness of the proposed method.
2.Materials and methods
The proposed data encryption method, which combines the mathematical properties of
steganographic and cryptographic systems and is based on the use of a pixel alphabet of a
monochrome image, consists of five main stages: forming the pixel alphabet, creating the pixel
matrix, key pair generation, encryption (forming ciphertext), and decryption.
A detailed scheme of the functioning of the developed method is presented in Fig. 1.
Let's describe each of the method's stages in detail. In the first stage, a specific static range of
values [000;255] is assigned to every possible character of the output message that can be used in
the message. This range corresponds to the brightness range of pixels in a digital raster image:
𝐵 = {𝐵1,𝐵2, 𝐵3,𝐵4} ,
where 𝐵1 – for letters in Ukrainian alphabet,
𝐵2 – for letters in English alphabet,
𝐵3 – for numbers,
𝐵4 – for special symbols and punctuation.
Figure 1: Block diagram of the proposed method.
The possible variant of pixel alphabet can be presented as follows: for
letters in Ukrainian alphabet:
𝐵1 = {𝐵"а", 𝐵"б", . . . , 𝐵"я"} , (1)
where 𝐵1 ∈ [000; 095] and for example 𝐵"а" ∈ [000; 003]; for letters
in English alphabet:
𝐵2 = {𝐵"𝑎", 𝐵"𝑏", . . . , 𝐵"𝑧"} , (2)
where 𝐵2 ∈ [096;173] and for example 𝐵"𝑎" ∈ [096; 098]; for
numbers:
𝐵3 = {𝐵"0",𝐵"1", . . . , 𝐵"9"} , (3)
where 𝐵3 ∈ [174; 203] and for example 𝐵"0" ∈ [174;176]; for special
symbols and punctuation:
𝐵4 = {𝐵"?", 𝐵"!", . . . , 𝐵"_"} , (4)
where 𝐵4 ∈ [204; 255] and for example 𝐵"?" ∈ [204; 206].
The example for numbers of synthesized pixel alphabet is presented in Table 1.
Table 1
Pixel alphabet of numbers
Numbers Value of brightness Numbers Value of brightness
0 174–176 5 189–191
1 177–179 6 192–194
2 180–182 7 195–197
3 183–185 8 198–200
4 186–188 9 201–203
It is worth mentioning, that symbols for message, choose out of the static range, that
increases, which, in turn, increases the level of cryptographically resistant of such an algorithm.
The pixel alphabet is synthesized on one side of the information exchange and transmitted to the
other side through secure data transmission channels or is coordinated without any third party.
That is, the pixel alphabet is generated or agreed upon only between the recipient and sender.
Besides this, advisable to change the pixel alphabet periodically.
The next step is the formation of a pixel matrix. At this stage, an image with a consistent color
model (usually monochrome) is arbitrarily selected, and the number of blocks into which it will
be divided and numbered is determined. For each block, the average brightness
values of the pixels are calculated I [ N ], where [𝑁𝑖] – the block numbers, which are then recorded
i
or mapped into the pixel matrix.
Similarly, to the alphabet, it is advisable to periodically change either the image itself or the
number of blocks into which it is divided. It's worth noting that the choice of a raster image and
the number of blocks are coordinated by both sides of the exchange, and for algorithm usage,
only the pixel matrix is retained.
During the generation of a set of encryption keys, the sender arbitrarily selects block
numbers from the pixel matrix and their corresponding average brightness values, which
determine the encryption key.
The main step of the method is the process of encrypting information: each character in the
original message is replaced using the synthesized alphabet with a corresponding value from its
assigned range. Then, a set of sums is calculated between the transformed message into the pixel
alphabet and the corresponding values of the pixel matrix 𝐼𝑐𝑟[𝑖] using the encryption key set:
. (5)
Afterwards, the ciphertext is calculated as:
𝐶𝑜𝑑𝑒(16) = {𝐶𝑟(16) ⊕ 𝑁(16)}. (6)
It's worth mentioning that to obtain the ciphertext, the corresponding values are used in the
hexadecimal system. This rule also applies to transmitting the ciphertext. As a result, the
ciphertext appears as a sequence of pairs of ciphertext values 𝐶𝑜𝑑𝑒(16) and block numbers 𝑁(16)
each character of the message. A notable feature of the method is that multiple characters can be
assigned to the same block, which further enhances the algorithm’s cryptographic resistance.
On the recipient’s side, the reverse process of encryption, decryption, is performed. The
result of this stage is the retrieval of the original message.
3.Experiment, Results and Discussions
In order to confirm the functionality of the proposed enhanced data encryption method based on
the monochrome image alphabet, an experiment was conducted using the verification method
selected in reference [13].
To conduct the experiment in the Python programming language, the method proposed in
the article was implemented. During the experiment, encryption of the open-text message was
performed based on the developed method, followed by the transmission of the ciphertext over a
network, and then the decryption of the received ciphertext on another host. So, for conducting
the experiment, the following original message was chosen: Cybersecurity.
According to the first stage of the method, all characters of the input message were
transformed based on the proposed technique outlined in [14] Alphabet encryption of letters of
the English alphabet.
Table 2
Message transformation to pixel alphabet
Outgoing message symbol The transformation result
C 102
Y 169
B 100
E 108
R 147
S 150
E 109
C 104
U 156
R 147
I 120
T 153
Y 168
In this way, the input message takes the following form:
𝐼𝑐𝑟 = {102; 169; 100;108; 147; 150;109; 104; 156; 147;120; 153; 168}. (7)
In the next stage, a test image with dimensions of 264x192 pixels was selected and divided
into 25 blocks (5 by 5). Using the Python Imaging Library (PIL) library, the average brightness
values of the pixels in each block were calculated, and a pixel matrix was generated as follows in
Table 3.
Table 3
Formation of pixel matrix
Columns of matrix Rows of matrix
- 1 2 3 4 5
1 219 216 203 188 225
2 213 210 234 232 223
3 210 193 96 198 170
4 198 204 212 226 224
5 198 204 215 185 209
After the formation of the pixel matrix, the encryption process of the message takes place. To
encrypt the characters of the message, a set of keys was generated by randomly selecting block
numbers from the pixel matrix and their corresponding average brightness values using the
“random” module. The number of keys corresponds to the number of characters in the message
being encrypted. Therefore, during the experiment, a set of block numbers from the image was
formed (Table 4).
Table 4
The set of encryption keys
Block numbers Hexadecimal representation
12 0C
54 36
33 21
22 16
12 0C
25 19
12 0C
51 33
31 1F
51 33
52 34
35 23
53 35
Mathematically, the set of keys has the following form:
𝑁 = {12;54; 33; 22; 12; 25; 12; 51; 31; 51; 52; 35; 53}. (8)
In the next stage, the sum is calculated according to expression (5), transformed into the pixel
alphabet message (7), and the corresponding values of the pixel matrix (Table 3) are used with
the encryption key set (8). As a result, the following values are obtained:
𝐶𝑟 = {318; 354; 196;318; 363; 373; 325;302; 366; 345;324; 323; 383}. (9)
In the final stage, before sending the message to the recipient, it is transformed into
ciphertext according to expression (6). As a result of this transformation, obtained message has
the following form:
𝐶𝑜𝑑𝑒(16) = {132;154; 𝐸5; 128; 167; 16𝐶; 149; 11𝐷; 171; 16𝐴; 170;160; 14𝐴}. (10)
Therefore, by using the proposed method, the encrypted message (Table 5) is presented in the
hexadecimal numbering system.
Table 5
Components of ciphertext
Key Ciphertext
0C 132
36 154
21 0E5
16 128
0C 167
19 16C
0C 149
33 11D
1F 171
33 16A
34 170
23 160
35 14A
The recipient receives tuples of pairs consisting of ciphertext values (10) and block numbers
(8) for each character of the message:
{(132,0𝐶); (154,36); . . . ; (160,23);(14𝐴, 35)}. (11)
After receiving the encrypted message, the recipient performs decryption (the reverse
execution of the steps).
When analysing the effectiveness of the proposed method, we used incoming messages with
different numbers of characters are provided in Table 6.
Applying the mathematical apparatus proposed in this paper, we obtained results, the
analysis of which confirms the adequacy of the method of data encryption and decryption.
In addition to testing the functionality of the proposed data encryption method based on the
monochrome image alphabet, the experiment also investigated the influence of factors such as
image size, the number of blocks into which the image is divided, and/or the number of
characters in the encrypted message on the data encryption speed. As a result of the study, the
time indicators depending on the selected parameters (Table 6).
Table 6
Experimental results of research
Size of the Number Number of Time of
image in pixels of blocks symbols in the message encrypting, sec
13 0:00:00.025991
264x191
331 13 0:00:00.030206
5x5
331 0:00:00.384151
1200х675
0:00:00.389754
13 0:00:00.026113
264х191
331 13 0:00:00.030313
10x10
331 0:00:00.384858
1200х675
0:00:00.391086
As a result of the conducted experiment to assess the functionality and adequacy of the
proposed method, the following conclusions were made:
1. The method possesses cryptographic properties, utilizing mathematical techniques to
conceal the content of the original message (transforming its characters into an alphabetlike
format and performing a mathematical operation to convert the result into ciphertext). It also
combines steganographic properties, using a monochrome image as a container, which forms
the basis for constructing the pixel matrix.
The computational complexity of the mathematical apparatus in the proposed method is
relatively low, yet it demonstrates high efficiency and is capable of resisting cryptographic
analysis methods.
2. As a container for constructing the pixel matrix, it is indeed possible to use
monochromatic raster images with varying resolutions and different geometric dimensions.
This flexibility in choosing the container makes the method adaptable to various scenarios and
use cases.
If a color raster image is chosen as the container, the pixel alphabet range increases threefold
due to the use of all three color channels. (R, G and B). As a result, the number of possible
variations in synthesizing the alphabet increases. For example, values for English language
characters can be chosen from the [0; 255] range in the R channel, punctuation marks and special
characters from the G channel, and digits from the B channel, and so on. This expanded range of
possibilities in a color image allows for more diverse and robust encryption. The size of the
image has the most significant impact on the speed of the data encryption procedure,
particularly increasing the size of the image results in an increase in the duration of the
encryption process. However, the encryption time of the message is almost independent of the
number of blocks into which the image is divided and the number of characters in the message
itself. This suggests that the primary factor affecting encryption speed is the image size.
3. The number of blocks into which the original image (container) is divided and its color
system indeed have a direct impact on the set of possible variations in forming the ciphertext.
This, in turn, increases the level of cryptographic resistance of the method.
4. The set of variations in the pixel alphabet depends directly on the characters in the
original message (including the alphabet used, punctuation marks, digits, etc.) and the color
system of the raster image. The degree of periodicity in changing the pixel alphabet is directly
proportional to the level of confidentiality of the information that needs to be encrypted. In
essence, greater diversity and complexity in the formation of the pixel alphabet contribute to
higher information security.
The analysis of the results in Table 5 indicates that all encryption stages have been completed
for the initial values of the original message (Table 2), resulting in the corresponding ciphertext
(11). It is important to note that this is one of the possible variants of the encrypted message,
based on the specific choices of pixel alphabet range values for each individual character of the
original message. Furthermore, the set of possible ciphertexts also depends on the formation of
the pixel matrix, including the number of blocks into which the raster image is divided. This is
because the same block or different blocks can be used to select the encryption key for the
characters of the original message. Taking into account the image size and the number of blocks
(Table 6) into which it is divided allows for an evaluation of the set of possible ciphertexts as well
as the time required for the encryption procedure.
The data encryption method based on a monochrome image alphabet is suitable for secure
transmission of confidential or important information in conditions where there may be threats
like cyberattacks, UAA, or other fraudulent actions, , even when the data network is secured
using a cluster approach [15]. Consideration of encryption parameters (such as the periodicity of
pixel alphabet changes, increasing the number of blocks in the pixel matrix, and so on)
significantly enhances the cryptographic resilience of the proposed method. It also enhances the
level of information confidentiality protection and resistance against UAA.
4.Conclusions
The scientific novelty of obtained results involves improving the data encryption method based
on a pixel alphabet by changing the order and mathematical apparatus. The proposed method,
unlike known and existing ones, does not utilize the functionality of cryptographic and
steganographic encryption systems but rather their structural properties. It provides an
adequate level of information confidentiality and possesses a sufficient and necessary level of
cryptographic resilience. The mathematical apparatus of the data encryption method
implements the concealment of the message content, while the pixel matrix and its usage
represent the very existence of such a message. By using the blocks into which it is divided as
mathematical components of encryption, namely their average pixel brightness values obtained
at the stage of pixel matrix formation.
The practical orientation of the study lies in the ability to apply the proposed data encryption
method to ensure secure and confidential exchange of important information between
organizations and institutions.
Prospects for further research include improving the mathematical apparatus of the
encryption method, considering pseudorandomness and the dynamic formation of the pixel
alphabet, and utilizing various color systems for raster images.
References
[1] Analysis of the Cryptographic Algorithms in IoT Communications / [Catarina Silva, Vitor
A. Cunha, João P. Barraca, Rui L. Aguiar] // Information Systems Frontiers. – 2023. –P. 18.
DOI: doi.org/10.1007/s10796-023-10383-9.
[2] Cryptographic Strength Evaluation of Key Schedule Algorithms / [S. Afzal, M. Yousaf, H.
Afzal, N. Alharbe, M. Rafiq Mufti] // Security and Communication Networks. – Volume
2020. – P. 1–9. URL: https://doi.org/10.1155/2020/3189601
[3] Development of a modified UMAC algorithm based on crypto-code constructions / [A.
Gavrilova, I. Volkov, Y. Kozhedub, R. Korolyov, O. Lezik, V. Medvediev, O. Milov, B.
Tomashevsky, A. Trystan, O. Chekunova] // Eastern-European Journal of Enterprise
Technologies. – 2020. – Vol. 4/9. – Issue 106. P. 45–63. URL:
https://journals.uran.ua/eejet/article/view/210683.
[4] A Novel Steganography Technique for Digital Images Using the Least Significant Bit
Substitution Method [S. Rahman, J. Uddin, H. Ullah Khan, H. Hussain, A. Ali Khan, M.
Zakarya] // IEEE Access. – 2022. – Vol. 10. P. 124053–124075. URL:
http://dx.doi.org/10.1109/ACCESS.2022.3224745.
[5] Koptyra K., Ogiela M. R. Distributed Steganography in PDF Files–Secrets Hidden in
Modified Pages / [K.Koptyra, M. R. Ogiela] // Entropy (Basel). – 2020. – Volume 22 (6). –
Issue 600. P. 12. URL: https://doi.org/10.3390/e22060600.
[6] Public Key Encryption with Keyword Search in Cloud: A Survey / [Y. Zhou, N. Li, Y. Tian,
D. An, L. Wang] // Entropy. – 2020. – Volume 22. Issue 421. P. 24. URL:
https://www.mdpi.com/1099-4300/22/4/421.
[7] An efficient and secure technique for image steganography using a hash function / [Z.
Nezami, Ali H., M. Asif, H. Aljuaid, I. Hamid, Z. Ali] // PeerJ Comput Sci. – 2022. Volume 8.
– Issue 1157. P. 18. DOI: 10.7717/peerj-cs.1157.
[8] Cryptographic steganography / V. Yadav, V. Ingale, A. Sapkal, G. Patil // Sundarapandian et
al. (Eds) : CCSEIT, DMDB, ICBB, MoWiN, AIAP – 2014. P. 17–23. DOI:
10.5121/csit.2014.4803.
[9] A study on combined cryptography and steganography / V. S. Babu, K. J. Helen //
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE).
– 2015. – Volume 2. Issue 5. ISSN 2349-4840. P. 45–49.
[10] Image security using steganography and cryptographic techniques / R. Nivedhitha, T.
Meyyappan // International Journal of Engineering Trends and Technology. – 2012.
Volume 3. Issue 3. ISSN: 2231-5381. P. 366–371.
[11] Kombinasi Least Significant Bit (LSB-1) Dan Rivest Shamir Adleman (RSA) Dalam
Kriptografi Citra Warna / C. A. Sari, W. S. Sari // Jurnal masyarakat informatika. – 2022. –
Volume 13. Issue 1. ISSN: 2086-4930. P. 45–58. URL:
https://doi.org/10.14710/jmasif.13.1.43314.
[12] Crypto-steganographic LSB-based system for AES-encrypted data / M. Abu-Alhaija //
(IJACSA) International Journal of Advanced Computer Science and Applications. – 2019. –
Volume 10. Issue 10. P. 55–60.
[13] Hryshchuk R. V., Hryshchuk О. М., Okhrimchuk V. V. Verification of a generalized
differential game model of a potentially dangerous cyber attack template.
Telecommunications and information technology. 2020, № 1 (66). С.53 - 67.
[14] Information Encryption Method based on a Combination of Steganographic and
Cryptographic Algorithm’s Features / [V. Trysnyuk, K. Smetanin, I. Humeniuk, O.
Samchyshyn, T. Trysnyuk] // Cybersecurity Providing in Information and
Telecommunication Systems II, Kyiv, Ukraine, October 26, 2021. – P. 150–159.
[15] Smetanin K. Сluster approach of building networks as a way of ensuring the appropriate
level of cyber security of the information and telecommunication system // Vol. 29 No. 1
(2023): Ukrainian Scientific Journal of Information Security. URL:
https://doi.org/10.18372/2225-5036.29.17547.