scholarly journals Development of a hash algorithm based on cellular automata and chaos theory

2021 ◽  
Vol 5 (9 (113)) ◽  
pp. 48-55
Author(s):  
Yuriy Dobrovolsky ◽  
Georgy Prokhorov ◽  
Mariia Hanzhelo ◽  
Dmytro Hanzhelo ◽  
Denis Trembach

Information security, reliability of data transfer are today an important component of the globalization of information technology. Therefore, the proposed work is devoted to highlighting the results of the design and development of a hacking-resistant algorithm to ensure the integrity of information transfer via digital technology and computer engineering. To solve such problems, cryptographic hashing functions are used. In particular, elements of deterministic Chaos were introduced into the developed cyclic hashing algorithm. The investigation analyzes in detail the strengths and weaknesses of known hashing algorithms. They are shown to have disadvantages. The main ones are a large number of matches (Hamming (x, y) and the presence of a weak avalanche effect, which lead to a significant decrease in the reliability of the algorithm for hacking. The designed hashing algorithm uses an iterative Merkley-Damgard structure, augmented by the input message to a length multiple of 512 bits. Processing in blocks of 128-bit uses cellular automata with mixed rules of 30, 105 and 90, 150 and takes into account the dependence of the generation of the initial vector on the incoming message. This allows half of the 10,000 pairs of arbitrary messages to have an inverse Hamming distance of 0 to 2. The proposed algorithm is four times slower than the well-known family of "secure hash algorithms." However, computation speed is not a critical requirement for a hash function. Decreasing the sensitivity to the avalanche effect allows the generation time to be approximately halved. Optimization of the algorithm, as well as its testing was carried out using new technologies of the Java programming language (version 15). Suggestions and recommendations for improving this approach to data hashing are given also

2020 ◽  
Vol 8 (6) ◽  
pp. 5741-5748

This paper proposes a hybrid programmable two-dimensional Cellular Automata (CA) based pseudo-random number generator which includes a newly designed rule set. The properties and evolution of one and two dimensional CA are revisited. The various metrics for evaluating CA as a Pseudo-Random Number Generator (PRNG) are discussed. It is proved that the randomness is high irrespective of the initial seed by applying this newly designed rule set. The PRNG is tested against a popular statistical test called Diehard test suite and the results show that the PRNG is highly random. The chaotic measures like entropy, hamming distance and cycle length have been measured


2021 ◽  
Vol 1 (132) ◽  
pp. 136-144
Author(s):  
Volodymyr Khandetskyi ◽  
Dmutro Sivtsov ◽  
Kostjantun Panin

Analysis of new technologies IEEE 802.11ac/ax of wireless networks showed that increasing their noise immunity is an actual task. The article studies the efficiency of fragmented data frames transmission. Comparison of the efficiencies in the case of retransmission of the corrupted original frame and in the case of its fragmentation in a wide range of the physical data transfer rates is carried out.


2017 ◽  
Vol 10 (13) ◽  
pp. 247
Author(s):  
Ankush Rai ◽  
Jagadeesh Kannan R

For successful transmission of massively sequenced images during 4K surveillance operations large amount of data transfer cost high bandwidth, latency and delay of information transfer. Thus, there lies a need for real-time compression of this image sequences. In this study we present a region specific approach for wavelet based image compression to enable management of huge chunks of information flow by transforming Harr wavelets in hierarchical order.   


Author(s):  
Joel Suss ◽  
Alexis Raushel ◽  
Adam Armijo ◽  
Brian White

More and more police departments are equipping their officers with body-worn cameras. To maximize the utility of body cams, designers have considered issues such as camera-mounting position, camera-mount stability, methods of activation, and data transfer methods. The human factors/ergonomics community can make important contributions to the design of body-worn cameras and identify and address issues that could arise from the introduction of new technologies (e.g., biometric identification and automatic detection of concealed weapons). Engaging with this ever-expanding technology will benefit law enforcement agencies and the communities they serve and protect.


Author(s):  
Cecy Balogun ◽  

The role of new technologies in driving agricultural sustainability is crucial for the socio-economic survival of rural households in Nigeria. The COVID-19 pandemic impacted the livelihood of farm families as they had difficulties accessing inputs, supplies and farm labour needed for maximum productivity of their farming enterprises, and in selling farm produce due to the lockdown restrictions policies imposed by the government.Additionally, the income of farm families was affected as a result of spoilage of perishable produce. This review highlighted the impact of COVID-19 on agricultural activities of rural families, constraints to accessing agricultural information, responses of the government in providing information to farmers and the innovative information sources for improved livelihood outcome. This review concluded that innovative information dissemination methods can enhance the livelihood of farm families in the face of crisis like the covid-19 outbreak.


2016 ◽  
Vol 11 (1) ◽  
pp. 60-71 ◽  
Author(s):  
Leslie Jamie Cobar ◽  
◽  
Djoko Legono ◽  
Kuniaki Miyamoto ◽  

Indonesia’s Mount Merapi is one of the world’s most active, dangerous volcanoes. Its 2010 eruption – the largest following the 20th century – and succeeding 2011 lahar events killed 389 persons and injured and displaced many more. One way to mitigate a disaster’s impact is the provision of reliable information to the public through a well-established early warning system (EWS). A well-managed information flow network is the key to delivering early warning information, however, there is a lack of understanding on the information transfer down to the citizens. In addition, implementing the 2007 disaster management law may have affected Merapi’s EWS. This study reinvestigates Merapi’s EWS information flow through the construction of an information flow network. A single information flow network was difficult to construct due to the inconsistency of structures per district. Different networks had to be constructed for volcanic eruptions and lahars in each district. Inconsistencies were also found in the roles of the agencies that determine when evacuation orders would be issued. The system also had data transfer gaps and vulnerabilities such as redundancies, mistransfers and bottlenecks. Its use of forecasting information as a basis for decision-making must be reviewed for lahar information flow networks. Improving Merapi’s EWS must involve handling these issues.


Author(s):  
G. Anitha ◽  
V. Vijayakumari ◽  
S. Thangavelu

<p>The main interesting aspect of the digital era is the widely spread ease of communication from one end of the world to the other end of the world. There is a revolution in communication, digitalization, globalization, video calling, wireless data transfer and this is possible due to networking. Initially computer networks is the data sharing where data such as documents, file, reports, presentation files, videos, images etc can be shared within a local network or remotely connected networks. Traditional data networking is to empower end-to-end information transfer. The data in such networks are carried across point-to-point links and the intermediate nodes just forward the packets, where the payload of the packets is not modified. Traditional LANs need wires, which may be difficult to set up in some situations.</p><p>It is very much understandable and clearly visible that wired communication is being completely overtaken by wireless technologies in the recent past. Wireless LANs, by its very nature, empowers with increased mobility and flexibility. Wi-Fi devices get connected to the internet through WLAN and access points. 2.4 GHz and 5 GHz ISM bands are used by Wi-Fi. Also, it is to be understood that, a wireless adhoc network is distributed in its nature. It is also to be noted that, the adhoc nature makes these network to rely on any of the pre-existing infrastructure. The data forwarding shall happen from the nodes very much dynamically based on the connectivity and the routing algorithm used.  </p>


2020 ◽  
Vol 49 (5) ◽  
pp. 58-63
Author(s):  
A. D. Sukharev ◽  
D. B. Piskunov

In the course of research activities in the field of new technologies of information interaction of on-board equipment of objects of rocket-space and aviation equipment, as well as study of protection of information against leakage through technical channels, there was a hypothesis, about stealth of radio channel formed by means of new and promising developing technologies. The article discusses the use of radio wave interference control technologies (on adaptive formation of the sum of the signal phases) for beam formation. The features of the MU-MIMO and OFDMA technologies, which allows several simultaneous outgoing streams (downlink, uplink), providing simultaneous servicing of several devices at once, which increases the performance of the network as a whole, are considered. The implementation of the secrecy of the operation of the radio channel based on the considered technology for potential unauthorized detection of the operation of the radio channel and access to the transmitted information outside the beam pointing points is considered. Based on the description of the technology and on-site experiments, conclusions are drawn and recommendations are formulated on the methodology for detecting unauthorized data transfer implemented on the basis of the technology considered.


2021 ◽  
Vol 297 (3) ◽  
pp. 46-50
Author(s):  
Volodymyr STATSENKO ◽  
◽  
Oleksandr BURMISTENKOV ◽  
Tetiana BILA ◽  
Dmytro STATSENKO ◽  
...  

The article presents the architecture and operation principles of the system for collecting and analyzing information from strain gauges. These systems are used to determine the equipment performance for transporting a variety of materials. In particular, they are used to control the movement of bulk materials mixtures components. For such technological processes, it is fundamentally important to ensure constant flows intensity. The paper identifies three variants of sensor connection schemes, analyzes their advantages and disadvantages. It is established that the structure “one ADC – several sensors” allows to reduce equipment costs and at the same time to provide the minimum parameters influence of a transmission line on a useful sensor signal. The “one-to-one” scheme provides the connection of each sensor to its own ADC. “Circuit with multiplexer” allows to increase the number of sensors connected to one ADC. It is established that the best option in terms of reducing the interference effects on the analog signal and the cost of creating a system is the scheme “one ADC – several sensors”. The algorithm of information transfer from ADC to microcontroller (MC) is analysed. It is calculated that HX711 ADC chips provide the maximum data rate of 18.5 values/s. It is proposed to transfer data between the MC and the server using the TCP protocol because it avoids data loss and provides the necessary data transfer speed. The structure and formats of data that are transmitted from the mass sensor to the ADC, microcontroller, web server and database are proposed. The main speed, design parameters, advantages and disadvantages of wired and wireless data network between MK and the server are determined. Recommendations for the design of such a network depending on the characteristics of the premises in which the data collection system will be used have been developed.


Sign in / Sign up

Export Citation Format

Share Document