Treffer: SIMULATION-DRIVEN ASSESSMENT OF CRYPTOGRAPHIC ALGORITHMS FOR RESOURCE-CONSTRAINED INFOCOMMUNICATION NETWORKS.
Weitere Informationen
Purpose. To conduct a multi-criteria evaluation and analysis of the performance of encryption algorithms that may be potentially resistant to contemporary cyberattacks, including quantum attacks. The evaluation takes into account the ability of the algorithms to be deployed on devices with limited computational resources within the infocommunication networks during the transmission of information messages. Methodology. Software implementation, testing and validation of selected cryptographic algorithms based on Python, considering the impact of limited resources and destabilising factors, such as signal noise components, based on computer experiments were applied. The performance of the studied cryptographic algorithms was analysed using statistical data processing methods and a multi-criteria evaluation approach. Findings. The symmetric algorithms AES-256-GCM and ChaCha20-Poly1305 demonstrated the highest accuracy in signal recovery following encryption and decryption (MSE ranges from 1.95 · 10-6 to 5.12 · 10-5 ). The time taken to encrypt and decrypt I/Q signals using symmetric algorithms was found to be around 2.5 times faster than that required by the Kyber family. Computer experiments confirmed the existence of a trade-off between processing speed and security level. Symmetric algorithms are optimal for scenarios with critical processing speed requirements. However, Kyber provides greater protection reliability, albeit at the cost of additional resources. The correctness of the proposed computer model, which enables the computational and information-functional characteristics of cryptographic algorithms to be evaluated, has been proven. Originality. Patterns of the destabilising influence of signal-to-noise ratio indicators and signal length on the accuracy of digital signal recovery after encryption have been established for different cryptographic algorithms (AES, ChaCha20 and the Kyber) in the context of their use in resource-constrained infocommunication systems. Practical value. Implementing the computer model proved its suitability for studying cryptographic algorithms in resource-constrained environments, as well as its potential for improving information security protocols and selecting optimal algorithms based on processing speed requirements and desired security levels. [ABSTRACT FROM AUTHOR]
Copyright of Scientific Bulletin of National Mining University is the property of National Mining University, State Higher Educational Institution and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)