{"id":7255,"date":"2021-04-19T10:07:30","date_gmt":"2021-04-19T07:07:30","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=7255"},"modified":"2021-09-29T11:12:52","modified_gmt":"2021-09-29T08:12:52","slug":"funkczionalna-realizacziya-generatora","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=7255","title":{"rendered":"\u0424\u0443\u043d\u043a\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0430 \u0440\u0435\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u044f \u0433\u0435\u043d\u0435\u0440\u0430\u0442\u043e\u0440\u0430 \u043a\u0440\u0438\u043f\u0442\u043e\u043a\u043b\u044e\u0447\u0456\u0432 \u0437 \u0434\u0436\u0435\u0440\u0435\u043b\u0430\u043c\u0438 \u0435\u043d\u0442\u0440\u043e\u043f\u0456\u0457 \u0434\u043b\u044f \u043c\u043e\u0431\u0456\u043b\u044c\u043d\u043e\u0433\u043e \u0431\u0430\u043d\u043a\u0456\u043d\u0433\u0443"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u0424\u0423\u041d\u041a\u0426\u0406\u041e\u041d\u0410\u041b\u042c\u041d\u0410 \u0420\u0415\u0410\u041b\u0406\u0417\u0410\u0426\u0406\u042f \u0413\u0415\u041d\u0415\u0420\u0410\u0422\u041e\u0420\u0410 \u041a\u0420\u0418\u041f\u0422\u041e\u041a\u041b\u042e\u0427\u0406\u0412 \u0417 \u0414\u0416\u0415\u0420\u0415\u041b\u0410\u041c\u0418 \u0415\u041d\u0422\u0420\u041e\u041f\u0406\u0407 \u0414\u041b\u042f \u041c\u041e\u0411\u0406\u041b\u042c\u041d\u041e\u0413\u041e \u0411\u0410\u041d\u041a\u0406\u041d\u0413\u0423<\/p>\n<p style=\"text-align: center;\">FUNCTIONAL REALIZATION OF CRYPTOGRAPHIC KEYS GENERATOR WITH ENTROPY SOURCES FOR MOBILE BANKING<\/p>\n<p><strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 7-11. \u041d\u043e\u043c\u0435\u0440: \u21161, 2021 (293)<\/strong> <a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/09\/7-11.pdf\"> <img loading=\"lazy\" class=\"size-full wp-image-69 alignnone\" src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" alt=\"\" width=\"76\" height=\"32\" \/><\/a><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u041e.\u0421. \u0410\u041d\u0414\u0420\u041e\u0429\u0423\u041a, \u042e.\u041f. \u041a\u041b\u042c\u041e\u0426, \u0412.\u0421. \u041e\u0420\u041b\u0415\u041d\u041a\u041e, \u0412.\u041c. \u0427\u0415\u0428\u0423\u041d<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\n\u0422.\u041c. \u041a\u041e\u0420\u041e\u0422\u0423\u041d<br \/>\n\u0417\u0430\u043a\u043b\u0430\u0434 \u0432\u0438\u0449\u043e\u0457 \u043e\u0441\u0432\u0456\u0442\u0438 &#8220;\u041c\u0456\u0436\u043d\u0430\u0440\u043e\u0434\u043d\u0438\u0439 \u043d\u0430\u0443\u043a\u043e\u0432\u043e-\u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 \u0456\u043c\u0435\u043d\u0456 \u0430\u043a\u0430\u0434\u0435\u043c\u0456\u043a\u0430 \u042e\u0440\u0456\u044f \u0411\u0443\u0433\u0430\u044f&#8221;<\/p>\n<p>O.S. ANDROSHCHUK, Y.P. KLOTS, V.S. ORLENKO, V.M. CHESHUN<br \/>\nKhmelnytskyi National University<br \/>\nT.M. KOROTUN<br \/>\nAcademician Yuriy Bugay International Scientific and Technical University<\/p>\n<p><strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2021-293-1-7-11\">https:\/\/www.doi.org\/10.31891\/2307-5732-2021-293-1-7-11<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 07.01.2021 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 10.03.2021 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412 \u0440\u043e\u0431\u043e\u0442\u0456 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043e \u043e\u043f\u0438\u0441 \u0431\u0430\u0437\u043e\u0432\u0438\u0445 \u043f\u0440\u0438\u043d\u0446\u0438\u043f\u0456\u0432 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f \u0434\u0430\u0442\u0447\u0438\u043a\u0456\u0432 \u043f\u0440\u0438\u0441\u0442\u0440\u043e\u0457\u0432 \u043c\u043e\u0431\u0456\u043b\u044c\u043d\u043e\u0433\u043e \u0437\u0432\u2019\u044f\u0437\u043a\u0443 \u0432 \u044f\u043a\u043e\u0441\u0442\u0456 \u0434\u0436\u0435\u0440\u0435\u043b \u043f\u0435\u0440\u0432\u0438\u043d\u043d\u043e\u0457 \u0435\u043d\u0442\u0440\u043e\u043f\u0456\u0457 \u0433\u0435\u043d\u0435\u0440\u0430\u0442\u043e\u0440\u0456\u0432 \u043a\u0440\u0438\u043f\u0442\u043e\u043a\u043b\u044e\u0447\u0456\u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u043a\u043b\u0456\u0454\u043d\u0442-\u0431\u0430\u043d\u043a \u043f\u0440\u0438 \u043d\u0430\u0434\u0430\u043d\u043d\u0456 \u043f\u043e\u0441\u043b\u0443\u0433 \u043c\u043e\u0431\u0456\u043b\u044c\u043d\u043e\u0433\u043e \u0431\u0430\u043d\u043a\u0456\u043d\u0433\u0443, \u0432\u0438\u0437\u043d\u0430\u0447\u0435\u043d\u043e \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440\u0443 \u043d\u0430\u043a\u043e\u043f\u0438\u0447\u0435\u043d\u043d\u044f \u0456 \u043e\u0431\u0440\u043e\u0431\u043a\u0438 \u043f\u0443\u043b\u0443 \u0435\u043d\u0442\u0440\u043e\u043f\u0456\u0457, \u0443\u0442\u043e\u0447\u043d\u0435\u043d\u043e \u043e\u0441\u043d\u043e\u0432\u043d\u0456 \u0444\u0443\u043d\u043a\u0446\u0456\u0457 \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440\u0438 \u0442\u0430 \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u043d\u043e \u0434\u0435\u0442\u0430\u043b\u0456\u0437\u043e\u0432\u0430\u043d\u0443 \u0444\u0443\u043d\u043a\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0443 \u043c\u043e\u0434\u0435\u043b\u044c \u043f\u0440\u043e\u0446\u0435\u0441\u0443 \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0456\u0457 \u043a\u0440\u0438\u043f\u0442\u043e\u043a\u043b\u044e\u0447\u0456\u0432. \u041e\u0442\u0440\u0438\u043c\u0430\u043d\u0456 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0438 \u0434\u0430\u044e\u0442\u044c \u043c\u043e\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u0432\u0438\u043a\u043e\u043d\u0430\u0442\u0438 \u0434\u0435\u0442\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u044e \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0443 \u0440\u043e\u0431\u043e\u0442\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u043a\u043b\u0456\u0454\u043d\u0442-\u0431\u0430\u043d\u043a \u0456\u0437 \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f\u043c \u0433\u0435\u043d\u0435\u0440\u0430\u0442\u043e\u0440\u0456\u0432 \u043a\u0440\u0438\u043f\u0442\u043e\u043a\u043b\u044e\u0447\u0456\u0432 \u043f\u0456\u0434\u0432\u0438\u0449\u0435\u043d\u043e\u0457 \u0435\u043d\u0442\u0440\u043e\u043f\u0456\u0457 \u0432 \u043c\u043e\u0431\u0456\u043b\u044c\u043d\u043e\u043c\u0443 \u0431\u0430\u043d\u043a\u0456\u043d\u0433\u0443 \u0442\u0430 \u0456\u043d\u0448\u0438\u0445 \u0441\u0435\u0440\u0432\u0456\u0441\u0430\u0445.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c, \u043c\u043e\u0431\u0456\u043b\u044c\u043d\u0438\u0439 \u0431\u0430\u043d\u043a\u0456\u043d\u0433, \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0456\u0447\u043d\u0438\u0439 \u043a\u043b\u044e\u0447, \u0433\u0435\u043d\u0435\u0440\u0430\u0442\u043e\u0440 \u043f\u0441\u0435\u0432\u0434\u043e\u0432\u0438\u043f\u0430\u0434\u043a\u043e\u0432\u0438\u0445 \u0447\u0438\u0441\u0435\u043b, \u0435\u043d\u0442\u0440\u043e\u043f\u0456\u044f.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>One of the important components of the security of the client-bank system is the protection mechanisms based on the use of cryptographic keys. The stability of cryptographic keys is a guarantee of system reliability and, in turn, is based on the mechanisms of generating pseudo-random numbers using primary entropy sources, for the effective use of which it is necessary to define and describethe functions of the algorithm for data processing.<br \/>\nThe paper describes the basic principles of using sensors of mobile devices as primary entropy sources for cryptographic keys generators of the client-bank system in the provision of mobile banking services, defines the procedure for accumulation and processing of entropy pool from sensors, described the main functions of the procedure and detailed functional model the process of generating cryptographic keys. The obtained results make it possible to perform a detailed algorithm of the client-bank system with the use of high-entropy cryptographic keys generators in mobile banking and other services.<br \/>\nThe obtained results are focused on the implementation of algorithms and means of generating pseudo-random numbers of high entropy and can be used to reduce the risks of unauthorized access to customer information in the client-bank system through the disclosure of cryptokeys in mobile banking services. Mobile phone sensors or other devices and phenomena that are characterized by the ability to form a pool of values \u200b\u200bwith a high level of entropy can be used as sources of entropy.<br \/>\n<strong>Keywords:<\/strong> algorithm, mobile banking, cryptographic key, pseudo-random number generator, entropy.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Bezpeka Internet\u2013bankinghu v Ukrajini: praktychni aspekty [Elektronnyj resurs]. \u2013 URL: https:\/\/bankchart.com.ua\/e_banking\/statti\/bezpeka_internet_bankingu_v_ukrayini_praktichni_aspekti.<\/li>\n<li>Gheseleva N.V. Informacijna systema pidtrymky elektronnykh platezhiv cherez Internet \/ N.V. Gheseleva, Gh.V. Pronjuk, V.V. Dobrovoljsjkyj\/\/ Ekonomika i suspiljstvo, 2018. \u2013 Vypusk #14. \u2013 S. 1005\u20131010.<\/li>\n<li>Umovy nadannja bankivsjkykh poslugh z vykorystannjam system dystancijnogho obslughovuvannja [Elektronnyj resurs]. \u2013 URL: https:\/\/www.bisbank.com.ua\/wp-content\/uploads\/2020\/08\/dodatok-7-umovy_system_dist_obslugov_z\u201311.05.2019-do-05.07.2019.pdf<\/li>\n<li>Systema \u00abiBank 2\u00bb dlja korporatyvnykh klijentiv. [Elektronnyj resurs]. \u2013 URL: https:\/\/ibank.otpbank.ru\/Corporate_Internet\u2013Banking_Guide.pdf.<\/li>\n<li>Khatri P. The importance of cyber security in banking [Elektronnyj resurs]. \/ Prem Khatri: Vice President of Operations, Chetu, Inc. \u2013 The Global Treasurer, Categories: Banking Cyber Security &amp; Fraud Technology. \u2013 September 25, 2019. \u2013 URL: https:\/\/www.theglobaltreasurer.com\/2019\/09\/25\/the-importance-of-cyber-security-in-banking\/.<\/li>\n<li>Ghorycjkyj V.M. Gheneracija vypadkovykh poslidovnostej dlja system upravlinnja kljuchamy \/ V.M. Ghorycjkyj, O.V. Snjezhok, M.S. Vysochinenko \/\/ Suchasnyj zakhyst informaciji, 2012. \u2013 #4. \u2013 S. 88\u201395.<\/li>\n<li>Ghrinenko T. O. Kvantovi gheneratory vypadkovykh chysel v kryptoghrafiji \/ T. O. Ghrinenko, O. P. Narjezhnij \/\/ Systemy obrobky informaciji. \u2013 2015. \u00ac\u2013 Vyp. 10. \u2013 S. 86\u201389.<\/li>\n<li>Heat transfer and entropy generation in a microchannel with longitudinal vortex generators using nanofluids \/ Amin Ebrahimia, Farhad Rikhtegarb, Amin Sabaghana, Ehsan Roohia Energy \/\/ Energy. \u2013 Volume 101, 15 April 2016. \u2013 P. 190\u2013201.<\/li>\n<li>Faure E. V. Syntez i analiz psevdovypadkovykh poslidovnostej na osnovi operacij kryptoghrafichnogho peretvorennja \/ E. V. Faure, S. V. Sysojenko, T. V. Myronjuk \/\/ Systemy upravlinnja, navighaciji ta zv&#8217;jazku. \u2013 2015. \u2013 Vyp. 4. \u2013 S. 85\u201387.<\/li>\n<li>Toward sensorbased random number generation for mobile and IoT devices \/ K. Wallace, K. Moran, E. Novak, G. Zhou, K. Sun \/\/IEEE Internet Things J. \u2013 Dec. 2016. \u2013 Vol. 3, # 6. \u2013 P. 1189\u20131201.<\/li>\n<li>Demskyi O.O. Metod realizatsii heneratora vypadkovykh chysel \/ O.O. Demskyi, V.O. Boichuk \/\/ \u00abIntelektualnyi potentsial \u2013 2018\u00bb &#8211; zbirnyk naukovykh prats molodykh naukovtsiv i studentiv z nahody 30-richchia pidhotovky IT- fakhivtsiv v KhNU. \u2013 Khmelnytskyi: PVNZ UEP, 2018. \u2013 Ch.3: Kiberbezpeka ta aktualni problemy kompiuternykh system i merezh. \u2013 S. 40\u201344 .<\/li>\n<li>Modelj gheneratora kryptokljuchiv z dzherelamy entropiji dlja systemy klijent-bank \/ V. S. Orlenko, V. M. Cheshun, O. S. Androshhuk, A. I. Katajeva \/\/ Mizhnarodnyj naukovo-tekhnichnyj zhurnal \u00abVymirjuvaljna ta obchysljuvaljna tekhnika v tekhnologhichnykh procesakh\u00bb \u2013 2020. \u2013 # 2. \u2013 S. 103\u2013112.<\/li>\n<li>Cheshun V. M. Ocinka efektyvnosti roboty gheneratora kryptokljuchiv pidvyshhenoji entropiji dlja systemy klijent\u2013bank \/ V. M. Cheshun, V. I. Chornenjkyj, V. V. Jackiv \/\/ Zbirnyk naukovykh pracj molodykh naukovciv i studentiv \u00abIntelektualjnyj potencial \u2013 2020\u00bb. \u2013 Khmeljnycjkyj: PVNZ UEP, 2020. \u2013 Chastyna \u2013 S. 84\u201393.<\/li>\n<li>Lane Wagner, How SHA-2 Works Step-By-Step (SHA-256) \/ Published July 8, 2020. [Elektronnyj resurs]. \u2013 URL: https:\/\/qvault.io\/2020\/07\/08\/how-sha-2-works-step-by-step-sha-256.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/7255"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7255"}],"version-history":[{"count":8,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/7255\/revisions"}],"predecessor-version":[{"id":8263,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/7255\/revisions\/8263"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}