Control Systems and Computers, N1, 2020, Article 3

Control Systems and Computers, 2020, Issue 1 (285), pp. 35-46.

UDK 003.26:004.056.55

R.S. Odarchenko, Doctor of Technical Sci., Senior Research Associate, International Research and Training Center for Information Technologies and Systems of the NAS of Ukraine and MES of Ukraine, Glushkov ave., 40, Kyiv, 03187, Ukraine, о

E.O. Samoilik, Applicant, Faculty of Aeronavigation, Electronics and Telecommunications, National Aviation University, Lubomyr Husar ave., 1, Kyiv, 03058, Ukraine,

V.M. Simakhin, Postgraduate, Junior research associate, International Research and Training Centre of Information Technologies and Systems of the NAS and MES of Ukraine, Glushkov ave., 40, Kyiv, 03680, Ukraine,

V.O. Borovik, Postgraduate, Junior research associate, International Research and Training Centre of Information Technologies and Systems of the NAS and MES of Ukraine, Glushkov ave., 40, Kyiv, 03680, Ukraine,

R.M. Tymchyshyn, Postgraduate, Junior research associate, International Research and Training Centre of Information Technologies and Systems of the NAS and MES of Ukraine, Glushkov ave., 40, Kyiv, 03680, Ukraine,


Introduction. Information security is one of the most important areas of computer science. Often it is necessary to transmit messages containing sensitive or secret information that a third party must not intercept and recognize. A crucial task is to create the methods for constructing cryptographically strong cryptosystem.

Purpose. A method of constructing cryptographically strong cryptosystem, which provides a formal opportunity to encrypt unlimited volumes of text messages.

Methods. Lexicographic methods of information security.

Results. Usage of the lexicographic mechanism for enlarging the alphabet of the textual information’s language allows increasing the unicity distance, which is the main threshold indicator for the cryptosystem to belong to the class of cryptographically strong security systems with theoretically proven ideal information-theoretic stability. Images’ space of a given subject area of an information system application is mapped onto the space of semantic images of this system, taking into account the semantic relationships between them, which are determined by a given restrictive conditions. This is the basis of the thesaurus structure, which allows during encryption to replace the message to be encrypted with other plausible messages that reflect the true meaning of outgoing messages.

Conclusion. For the first time at a formal level, a synthesis of the method of constructing a lexicographic cryptosystem with theoretical absolute stability has been carried out. A security system has been built, which consists of two parts: a semantic thesaurus developed for a specific application area, and software and hardware tools for implementing encryption/decryption operators using the created thesaurus.

 Download full text! (On Ukrainian)

Keywords: technical information protection, perfectly persistent symmetric cryptosystems, lexicographic systems, unicity distance, semantic thesaurus.

  1. Shannon, C.E., 1949. “Communication Theory of Secrecy Systems”. Bell System Technical Journal, 28(4), pp. 656-715.
  2. Darwish, A., El-Gendy, M.M., Hassanien, A.E., 2016. “A New Hybrid Cryptosystem for Internet of Things Applications: Multimedia Forensics and Security”. Intelligent Systems Reference Library, 115, pp. 365-380.
  3. Hu, D., Su, B., Zheng, Sh., 2015. “Security and privacy protocols for perceptual imagehashing”. Int. J. Sensor Networks, 17(3), pp. 146-162.
  4. Oppliger, R., 2011. Contemporary Cryptography, Second Edition: Artech House. 571 p.
  5. Wei, J., Zheng, X., Yu, J. et al., 2012. “Application of unicity distance in a cryptosystem based on chaos”. 7th International Conference on Computer Science & Education (ICCSE),
  6. Yaremchuk, Yu., 2014. Alhebrayichni modeli asymetrychnykh kryptohrafichnykh system: Zakhyst informatsiyi, 16(1), pp. 68– (In Ukrainian).
  7. Ponomarenko, V.S., 2013. Suchasni metody ta modeli obrobky danykh v informatsiynykh systemakh Monohrafiya Kharkiv. Vyd. KHNEU im. Semena Kuznetsya, 540 p. (In Ukrainian).
  8. Odarchenko, R.S., Samoylyk, Ye.O., Abakumova, A.O., 2018. “Metod pobudovy semantychnoho slovnyka u skladi doskonalo stiykoyi kryptosystemy zakhystu tekstovoyi informatsiyi”. Naukoyemni tekhnolohiyi, 3(39), pp. 355-361. (In Ukrainian).
  9. Lokhande, U., Gulve, A.K., 2014. “Steganography using Cryptography and Pseudo Random Numbers”. International Journal of Computer Applications, 96(19), pp. 40-45.
  10. Mao, Y., Wu, M., 2007. “Unicity Distance of Robust Image Hashing”. IEEE Transactions on Information Forensics and Security, 2(3), pp. 462-467.
  11. Klimchuk, V., Samoylik, E., Gnatyuk, V. et al., 2018. “Synthesis of Quite Proof Cryptosystem with Increased Unicity Distance for Cloud Computing”. ICTERI Workshops.
  12. Goyal, R., Khurana, M., 2017. “Cryptographic Security using Various Encryption and Decryption Method”. International Journal of Mathematical Sciences and Computing, 3(3), pp. 1-11.
  13. Aparna, R., Chithra, Dr.PL., 2016. “A Review on Cryptographic Algorithms for Speech Signal Security”. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 5(5). pp. 84-88.
  14. Shyrokov, V.A., 2004. Fenomenolohiya leksykohrafichnykh system: Monohrafiya. Kyiv: Naukova dumka. 326 p. (In Ukrainian).
  15. Shyrokov, V.A., Buhakov, O.V., Hryaznukhina, T.O. et al., 2005. Korpusna linhvistyka: Monohrafiya. Kyiv: Dovira. 471 p. (In Ukrainian).
  16. Belyavskaya, Ye.G., 1992. Semanticheskaya struktura slova v nominativnom i kommunikativnom aspektakh (kognitivnyye osnovaniya formirovaniya i funktsionirovaniya semanticheskoy struktury slova). Monografíya. (In Russian).
  17. Nechiporuk, O.P., Odarchenko, R.S., Potapov, V.G. et al., 2011. Speech transfer in digital communication systems. Electronics and Control Systems, 4 (30).
  18. XML [online] Available at: [Accessed 31 Okt. 2019].

 Received  31.10.2019