System of Cryptographic Protection of Information Based On Deterministic Chaos
Baimuhamedov M. F.1, Atanov S.K.2, Zhunusov K. M., Zhikeyev A.A.3, Bugubaeva A.U.4, Bulaev A.G5

1Baimuhamedov M. F.*, PhD in technical sciences, Z. Aldamzhar Kostanay Social and Technical University, Kostanay, Kazakhstan.
2Atanov S.K., PhD in Technical Sciences, Professor, L. Gumilev ENU, Astana, Kazakhstan.
3Zhunusov K.M., PhD in Technical Sciences, Associate Professor, Head of the Department of Information Technology and Automation M. Dulatov KEEU, Kostanay, Kazakhstan.
4Zhikeyev A.A., PhD in Technical Sciences, Dean of the Faculty of Information Technology A.Baitursynov Kostanay State University, Kostanay, Kazakhstan.
5Bugubaeva A.U., PhD in Agricultural Sciences, Deputy Head of the Regional “Smart Center” of A.Baitursynov Kostanay State University, Kostanay, Kazakhstan. 

Manuscript received on September 17, 2019. | Revised Manuscript received on 24 September, 2019. | Manuscript published on October 10, 2019. | PP: 4495-4498 | Volume-8 Issue-12, October 2019. | Retrieval Number: L35271081219/2019©BEIESP | DOI: 10.35940/ijitee.L3527.1081219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this paper we present a software system for cryptographic information protection based on deterministic chaos. The program system functionality includes encryption and decryption of text and graphic information on the basis of a random number generator, which is played by the Lorentz attractor. The use of an attractor in this program system guarantees randomness and absolute randomness when issuing numbers, limited only by the initial parameters. It is also necessary to transfer encryption parameters, excluding the possibility of its interception, because Encryption parameters are used in the program as decryption keys. After the process of text encryption, the program performs a frequency analysis of the input and output files. Accordingly, the frequency of a certain group of letters, which is vulnerable to frequency analysis, must be clearly expressed in the input file. In the output file, the frequency should be stable and uniform, thereby proving the effectiveness of encryption.
Keywords:  Cryptographic Protection, Data Encryption, Deterministic Chaos, Information, Lorentz Attractor, Program System.
Scope of the Article: Cryptography and Applied Mathematics