CASPIAN JOURNAL

MANAGEMENT AND HIGH TECHNOLOGIES

A VARIANT OF IMPLEMENTATION OF THE SCHEME FOR CONVERSION OF THE INPUT DATA FLOW BY THE ASYMMETRIC METHOD ON THE BASIS OF CELLULAR AUTOMATA

Read Kuleshova Elena A. A VARIANT OF IMPLEMENTATION OF THE SCHEME FOR CONVERSION OF THE INPUT DATA FLOW BY THE ASYMMETRIC METHOD ON THE BASIS OF CELLULAR AUTOMATA // Caspian journal : management and high technologies. — 2021. — №4. — pp. 57-65.

Kuleshova Elena A. - Southwest State University

At present, such applications of the theory of cellular automata as symmetric encryption, data compression, digital image processing, and some others are known. There are also studies suggesting the possibility of building a public key system based on cellular automata, but this problem has not yet been solved. This article proposes a variant of the scheme for transforming the input data stream by an asymmetric method based on cellular automata. The proposed conversion scheme is based on the sequential change of the bits of the source file according to the instructions in the key. The public parameter in this case will be the number of columns of the information matrix, and the private key will consist of the encryption matrix and the rule for traversing the data matrix. In order to increase the stability and maintain a high processing speed of data streams, a mathematical model of data transformation based on cellular automata with the use of an extended key, which determines the individual neighborhood of the processed data bit, taking into account the position of this bit in the initial data matrix, is proposed. To verify the mathematical model, a software module was developed for the analysis of individual chains in data blocks, which makes it possible to compare data blocks in the form of binary matrices. The practical significance of the proposed solution lies in the fact that the results obtained can be used for research purposes and in the possibility of using the obtained solutions for the development of methods for cryptographic data transformation.

Key words: information security, data streaming, cellular automata, asymmetric encryption, confidential information protection systems