{"id":4718,"date":"2021-03-12T14:24:31","date_gmt":"2021-03-12T12:24:31","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=4718"},"modified":"2021-03-16T12:34:48","modified_gmt":"2021-03-16T10:34:48","slug":"%d1%80%d0%be%d0%b7%d1%80%d0%be%d0%b1%d0%ba%d0%b0-%d0%bf%d1%80%d0%be%d0%b3%d1%80%d0%b0%d0%bc%d0%bd%d0%be%d0%b3%d0%be-%d0%b7%d0%b0%d0%b1%d0%b5%d0%b7%d0%bf%d0%b5%d1%87%d0%b5%d0%bd%d0%bd%d1%8f-%d1%80","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=4718","title":{"rendered":"\u0420\u043e\u0437\u0440\u043e\u0431\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0440\u0435\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u0457 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0443 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0456\u0447\u043d\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u044f \u0432 \u043f\u0440\u043e\u0446\u0435\u0441\u043e\u0440\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0434\u043b\u044f \u0441\u0438\u0441\u0442\u0435\u043c \u0456\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0443 \u0440\u0435\u0447\u0435\u0439"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u0420\u041e\u0417\u0420\u041e\u0411\u041a\u0410 \u041f\u0420\u041e\u0413\u0420\u0410\u041c\u041d\u041e\u0413\u041e \u0417\u0410\u0411\u0415\u0417\u041f\u0415\u0427\u0415\u041d\u041d\u042f \u0420\u0415\u0410\u041b\u0406\u0417\u0410\u0426\u0406\u0407 \u0410\u041b\u0413\u041e\u0420\u0418\u0422\u041c\u0423 \u041a\u0420\u0418\u041f\u0422\u041e\u0413\u0420\u0410\u0424\u0406\u0427\u041d\u041e\u0413\u041e \u041f\u0415\u0420\u0415\u0422\u0412\u041e\u0420\u0415\u041d\u041d\u042f \u0412 \u041f\u0420\u041e\u0426\u0415\u0421\u041e\u0420\u041d\u0418\u0425 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425 \u0414\u041b\u042f \u0421\u0418\u0421\u0422\u0415\u041c \u0406\u041d\u0422\u0415\u0420\u041d\u0415\u0422\u0423 \u0420\u0415\u0427\u0415\u0419<\/p>\n<p style=\"text-align: center;\">IMPLEMENTATION OF CRYPTOGRAPHIC TRANSFORMATION ALGORITHM IN PROCESSOR SYSTEMS FOR THE INTERNET OF THINGS<\/p>\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/03\/19-2.pdf\"> <img loading=\"lazy\" class=\"size-full wp-image-69 alignnone\" src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" alt=\"\" width=\"76\" height=\"32\" \/><\/a> <strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 115-119. \u041d\u043e\u043c\u0435\u0440: \u21165, 2020 (289)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u041d.\u0406. \u041f\u0420\u0410\u0412\u041e\u0420\u0421\u042c\u041a\u0410, \u041a.\u041b. \u0413\u041e\u0420\u042f\u0429\u0415\u041d\u041a\u041e, \u0421.\u041a. \u041f\u0406\u0414\u0427\u0415\u041d\u041a\u041e<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nN. PRAVORSKA, K. HORIASHCHENKO, S. PIDCHENKO<br \/>\nKhmelnytskyi National University, Ukraine<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2020-289-5-115-119\">https:\/\/www.doi.org\/10.31891\/2307-5732-2020-289-5-115-119<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 21.10.2020 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 27.11.2020 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u041f\u0440\u0438\u0441\u0442\u0440\u043e\u0457 \u0406\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0443 \u0440\u0435\u0447\u0435\u0439 \u043f\u043e\u0441\u0442\u0443\u043f\u043e\u0432\u043e \u0440\u043e\u0437\u0448\u0438\u0440\u044e\u044e\u0442\u044c \u0437\u043e\u043d\u0443 \u0441\u0432\u043e\u0433\u043e \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f. \u041f\u0440\u0438\u0441\u0442\u0440\u043e\u0457 \u0432\u0438\u043a\u043e\u043d\u0443\u044e\u0442\u044c \u0437\u0430\u0434\u0430\u0447\u0443 \u0437\u0431\u043e\u0440\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457, \u043d\u0430\u043a\u043e\u043f\u0438\u0447\u0435\u043d\u043d\u044f \u0442\u0430 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0443 \u0434\u043e \u0456\u043d\u0448\u0438\u0445 \u043f\u0440\u0438\u0441\u0442\u0440\u043e\u0457\u0432 \u0456\u0437 \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f\u043c \u0434\u0440\u043e\u0442\u043e\u0432\u0438\u0445 \u0442\u0430 \u0431\u0435\u0437\u0434\u0440\u043e\u0442\u043e\u0432\u0438\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439. \u041f\u043e\u043a\u0430\u0437\u0430\u043d\u043e, \u0449\u043e \u0434\u043b\u044f \u043f\u0440\u0438\u0441\u0442\u0440\u043e\u0457\u0432 IoT \u0442\u0430\u043a\u043e\u0436 \u043c\u043e\u0436\u0443\u0442\u044c \u0432\u0438\u0441\u0442\u0430\u0432\u043b\u044f\u0442\u0438\u0441\u044c \u0432\u0438\u043c\u043e\u0433\u0438 \u0449\u043e\u0434\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u043d\u0430\u0434\u0456\u0439\u043d\u043e\u0441\u0442\u0456 \u0442\u0430 \u043a\u0440\u0438\u043f\u0442\u043e\u0441\u0442\u0456\u0439\u043a\u043e\u0441\u0442\u0456 \u0434\u0430\u043d\u0438\u0445. \u0414\u043b\u044f \u0440\u0435\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u0457 \u0437\u0430\u0434\u0430\u0447\u0456 \u0448\u0438\u0444\u0440\u0443\u0432\u0430\u043d\u043d\u044f \u043c\u043e\u0436\u0443\u0442\u044c \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0432\u0430\u0442\u0438\u0441\u044c \u044f\u043a \u0441\u0438\u043c\u0435\u0442\u0440\u0438\u0447\u043d\u0456, \u0442\u0430\u043a \u0456 \u0430\u0441\u0438\u043c\u0435\u0442\u0440\u0438\u0447\u043d\u0456 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0438. \u0417\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u043e \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0432\u0430\u0442\u0438 \u0430\u0441\u0438\u043c\u0435\u0442\u0440\u0438\u0447\u043d\u0438\u0439 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b \u043d\u0430 \u0431\u0430\u0437\u0456 \u0435\u043b\u0456\u043f\u0442\u0438\u0447\u043d\u0438\u0445 \u043a\u0440\u0438\u0432\u0438\u0445. \u0412 \u0440\u043e\u0431\u043e\u0442\u0456 \u0432\u0438\u043a\u043e\u043d\u0430\u043d\u0430 \u043e\u0446\u0456\u043d\u043a\u0430 \u0430\u043f\u0430\u0440\u0430\u0442\u043d\u0438\u0445 \u0437\u0430\u0442\u0440\u0430\u0442 \u0434\u043b\u044f \u0440\u0435\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u0457 \u0431\u043b\u043e\u043a\u0443 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0456\u0447\u043d\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u044f \u0456\u0437 \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f\u043c 8- \u0442\u0430 32-\u0431\u0456\u0442\u043d\u0438\u0445 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0435\u0440\u0456\u0432 \u0434\u043b\u044f \u043a\u043b\u044e\u0447\u0456\u0432 \u0434\u043e\u0432\u0436\u0438\u043d\u043e\u044e 32 \u0442\u0430 64 \u0431\u0456\u0442\u0438 \u0442\u0430 \u0440\u0456\u0437\u043d\u0438\u0445 \u0431\u043b\u043e\u043a\u0456\u0432 \u0434\u0430\u043d\u0438\u0445. \u041f\u043e\u043a\u0430\u0437\u0430\u043d\u043e \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u043d\u0443 \u043c\u043e\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u0432\u0438\u043a\u043e\u043d\u0430\u043d\u043d\u044f \u0442\u0430\u043a\u043e\u0457 \u0440\u043e\u0431\u043e\u0442\u0438.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u043a\u0440\u0438\u043f\u0442\u043e\u0441\u0442\u0456\u0439\u043a\u0456\u0441\u0442\u044c, \u0430\u0441\u0438\u043c\u0435\u0442\u0440\u0438\u0447\u043d\u0435 \u0448\u0438\u0444\u0440\u0443\u0432\u0430\u043d\u043d\u044f.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>Devices for Internet of Things are gradually expanding their scope. Those devices perform the task of collecting information, accumulating and transmitting to other devices with use of wired and wireless technologies. It has been shown that IoT devices can also be required to ensure the reliability and cryptographic stability of data. Both symmetric and asymmetric protocols can be used to implement the encryption task. Block encryption is a substitution based on the block alphabet, which can be mono- or polyalphabetic. Block symmetric encryption is most widely used in the transmission of information over the network, including for packet exchange systems.<br \/>\nIt is proposed to use an asymmetric protocol based on elliptic curves. To assess the potential performance of data processing algorithms by the encryption algorithm, you need to determine the actions that use the most CPU time. Such actions include operations of bringing in a degree. To sum up, algorithms are used, the purpose of which is to perform actions on short numbers, the bit size of which is proportional to the bit size of the processor system. Processing time of alphabet values for 8-bit controllers defined. The paper estimates the hardware costs for the implementation of the cryptographic conversion unit using 8-bit and 32-bit controllers for 32 and 64 bits length keys and for different data sizes blocks. ZigBee modules often work in the mode of interval data transmission, such as transmission in the interval of minutes or even hours, in which case, it is established that the 8-bit controller will provide work on encryption and its transmission to the main module. The practical possibility of performing such work is shown. It is seen that the use of 32-bit architecture allows us to archive more than 70 times speed advantage.<br \/>\n<strong>Keywords:<\/strong> cryptosecurity, asymmetric encryption.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Strelnickij A.A. Volnovye kanaly arhitekturnyh sooruzhenij. Usovershenstvovannaya model i novyj eksperiment \/ A.A. Strelnickij, A.E. Strelnickij, A.I. Copa, V.M. Shokalo \/\/ Radiotehnika. Vseukrainskij mezhvedomstvennyj nauchno-tehnicheskij sbornik. \u2013 2007. \u2013 Vypusk 151. \u2013 S. 158\u2013163.<\/li>\n<li>Hoffman L.Dzh. Sovremennye metody zashity informacii \/ L.Dzh. Hoffman. \u2013 M. : Sovetskoe radio, 1980. \u2013 164 s.<\/li>\n<li>Panasenko S.P. Zashita informacii v kompyuternyh setyah \/ S. P. Panasenko \/\/ Mir PK. \u2013 2002 \u2013 \u2116 2.<\/li>\n<li>Hoffman L.Dzh. Sovremennye metody zashity informacii \/ L. D. Hoffman. \u2013 M. : Sovetskoe radio, 1980. \u2013 C. 87. \u2013 164 s.<\/li>\n<li>Rostovcev A.G. Algebraicheskie osnovy kriptografii \/ A. G. Rostovcev. \u2013 SPb.: Mir i semya, Interlajn, 2000. \u2013 S. 112-220.<\/li>\n<li>Shnejer B. Prikladnaya kriptografiya. Protokoly, algoritmy, ishodnye teksty na yazyke C \/ B. Shnejer \u2013 M.: Triumf, 2002. \u2013 S. 12. \u2013 216 s.<\/li>\n<li>Chmora A. L. Sovremennaya prikladnaya kriptografiya. \u2013 M.: \u201cGelios ARV\u201d, 2001. \u2013 256 s.<\/li>\n<li>Solovev Yu.P. Ellipticheskie krivye i sovremennye algoritmy teorii chisel \/ Yu. P. Solovev, V. A. Sadovnichij, E.T. Shavgulidze. \u2013 M. : Izhevsk, 2003. \u2013 C. 60\u201392.<\/li>\n<li>Lopez J. Fast multiplication on elliptic curves over GF(2n) without precomputation \/ J. Lopez, R. Dahab. \u2013 Lecture Notes in Computer Science. \u2013 2000. \u2013 \u2116 1965. \u2013 P. 317\u2013327.<\/li>\n<li>Vasilenko O.N. Teoretiko-chislovye algoritmy v kriptografii \/ Vasilenko O.N. \u2013 M. : MCNMO, 2003. \u2013 325 s.<\/li>\n<li>Horiashchenko K.L. Vprovadzhennia tekhnolohii PLC \/ K.L. Horiashchenko, O.P. Voitiuk, S.L. Kushniruk, O.V. Shevchuk \/\/ Herald of Khmelnytskyi National University. \u2013 2017. \u2013 \u2116 2. \u2013 S. 250\u2013253.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[38],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/4718"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4718"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/4718\/revisions"}],"predecessor-version":[{"id":4903,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/4718\/revisions\/4903"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}