Software Analytical Method for Protecting Digital Information
Baimuhamedov M.F.1, Zhikeyev A.A.2, Bulaev A.G.3, Tastemirova Zh.A.4, Kurmangalieva A.K.5, Bugubaeva A.U.6
1Baimuhamedov M. F., PhD in technical sciences, Z. Aldamzhar Kostanay Social and Technical University, Kostanay, Kazakhstan.
2Zhikeyev A.A., PhD in technical sciences, PhD in technical sciences, head of the Distant Learning Institute of A.Baitursynov Kostanay State University, Kostanay, Kazakhstan.
3Bulev A.G., PhD in biological sciences, Head of the Laboratory of Chemolithotrophic Microorganisms, Research Centre of Biotechnology RAS, Russian Federation.
4Tastemirova Zh.A., Master of Economic Sciences, Senior Lecturer, Department of Economics and Finance, A.Baitursynov Kostanay State University, Kostanay, Kazakhstan.
5Kurmangalieva A.K., PhD in Economics, Associate Professor, Associate Professor, Department of Economics and Finance, A.Baitursynov Kostanay State University, Kostanay, Kazakhstan.
6Bugubaeva A.U., PhD in Agricultural Sciences, Deputy Head of the Regional “Smart Center” of A.Baitursynov Kostanay State University, Kostanay, Kazakhstan.
Manuscript received on May 16, 2020. | Revised Manuscript received on May 16, 2020. | Manuscript published on June 10, 2020. | PP: 460-463 | Volume-9 Issue-8, June 2020. | Retrieval Number: G5675059720/2020©BEIESP | DOI: 10.35940/ijitee.G5675.069820
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Known to date means of information protection does not have a high degree of noise immunity and reliability. This work is related to the development of a more effective way to protect the source information using a software-analytical method based on the Vigenère cipher. The best known and most widely used methods of symmetric encryption are DES and the Vigenère cipher. The Vigenère cipher is a polyalphabetic encryption method for alphabetic text by using key words. The Vigenère cipher requires a single key asked a set b of letters. These sets are signed with the repetition of the message, and then the generated sequence is added back to the plaintext on modul (the power of the alphabet). To achieve this goal we propose to use multiple iteration in which the corresponding algorithms of encryption and decryption consist of successive cycles of the same type of encryption. The developed mathematical model for block coding, as well as methods and algorithms for their decoding. Presented in a modified Vigenère algorithm with the use of a block cipher based on variation of number of iteration with shift key, allows, in contrast to the known algorithms that more reliably protect the data on the Web server.
Keywords: Information Security, Algorithms, Encryption, Decryption, Block Coding, Vigenère Cipher.
Scope of the Article: Security Service Systems