{"id":9897,"date":"2021-12-14T19:49:06","date_gmt":"2021-12-14T17:49:06","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=9897"},"modified":"2022-03-15T10:39:50","modified_gmt":"2022-03-15T08:39:50","slug":"vyznachennya-entropijnoyi-skladovoyi-pokaznykiv-datchykiv-dlya-generacziyi-kryptoklyuchiv-mobilnogo-dodatku-systemy-kliyent-bank","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=9897","title":{"rendered":"\u0412\u0438\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044f \u0435\u043d\u0442\u0440\u043e\u043f\u0456\u0439\u043d\u043e\u0457 \u0441\u043a\u043b\u0430\u0434\u043e\u0432\u043e\u0457 \u043f\u043e\u043a\u0430\u0437\u043d\u0438\u043a\u0456\u0432 \u0434\u0430\u0442\u0447\u0438\u043a\u0456\u0432 \u0434\u043b\u044f \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0456\u0457 \u043a\u0440\u0438\u043f\u0442\u043e\u043a\u043b\u044e\u0447\u0456\u0432 \u043c\u043e\u0431\u0456\u043b\u044c\u043d\u043e\u0433\u043e \u0434\u043e\u0434\u0430\u0442\u043a\u0443 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u043a\u043b\u0456\u0454\u043d\u0442-\u0431\u0430\u043d\u043a"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u0412\u0418\u0417\u041d\u0410\u0427\u0415\u041d\u041d\u042f \u0415\u041d\u0422\u0420\u041e\u041f\u0406\u0419\u041d\u041e\u0407 \u0421\u041a\u041b\u0410\u0414\u041e\u0412\u041e\u0407 \u041f\u041e\u041a\u0410\u0417\u041d\u0418\u041a\u0406\u0412 \u0414\u0410\u0422\u0427\u0418\u041a\u0406\u0412 \u0414\u041b\u042f \u0413\u0415\u041d\u0415\u0420\u0410\u0426\u0406\u0407 \u041a\u0420\u0418\u041f\u0422\u041e\u041a\u041b\u042e\u0427\u0406\u0412 \u041c\u041e\u0411\u0406\u041b\u042c\u041d\u041e\u0413\u041e \u0414\u041e\u0414\u0410\u0422\u041a\u0423 \u0421\u0418\u0421\u0422\u0415\u041c\u0418 \u041a\u041b\u0406\u0404\u041d\u0422-\u0411\u0410\u041d\u041a<\/p>\n<p style=\"text-align: center;\">DETERMINATION OF ENTROPY COMPONENT IN SENSOR INDICATORS FOR GENERATION OF CRYPTOGRAPHIC KEYS OF THE MOBILE APPLICATION OF THE CLIENT-BANK SYSTEM<\/p>\n<p><strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: <\/strong><strong>18-21<\/strong><strong>. \u041d\u043e\u043c\u0435\u0440: \u21165, 2021 (301)<\/strong> <a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/12\/301-text_2021_5_t-18-21.pdf\"> <img loading=\"lazy\" class=\"size-full wp-image-69 alignnone\" src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" alt=\"\" width=\"76\" height=\"32\" \/><\/a><br \/>\n<strong>\u00a0<\/strong><strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0413\u0423\u0420\u041c\u0410\u041d \u0406. \u0412.<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID ID: 0000-0002-2282-3484<br \/>\ne-mail: <a href=\"mailto:devastator192@gmail.com\">devastator192@gmail.com<\/a><br \/>\n\u041f\u0415\u0422\u041b\u042f\u041a \u041d. \u0421.<br \/>\n\u0423\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u043a\u0438 \u0456 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u043d\u0438\u0446\u0442\u0432\u0430, \u043c.\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439<br \/>\nORCID ID: 0000-0001-5971-4428<br \/>\ne-mail: <a href=\"mailto:npetlyak@khmnu.edu.ua\">npetlyak@khmnu.edu.ua<\/a><br \/>\n\u0427\u0415\u0428\u0423\u041d \u0412. \u041c.<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID ID: 0000-0002-3935-2068<br \/>\ne-mail: cheshunvn@khmnu.edu.ua<br \/>\n\u0414\u0416\u0423\u041b\u0406\u0419 \u0410. \u0412.<br \/>\n\u0423\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u043a\u0438 \u0456 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u043d\u0438\u0446\u0442\u0432\u0430, \u043c.\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439<br \/>\nORCID ID: 0000-0001-5011-3052<br \/>\ne-mail: <a href=\"mailto:kksmkhnu@gmail.com\">kksmkhnu@gmail.com<\/a><br \/>\n\u0427\u041e\u0420\u041d\u0415\u041d\u042c\u041a\u0418\u0419 \u0412. \u0406.<br \/>\n\u0423\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u043a\u0438 \u0456 \u043f\u0456\u0434\u043f\u0440\u0438\u0454\u043c\u043d\u0438\u0446\u0442\u0432\u0430, \u043c.\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439<br \/>\nORCID ID: 0000-0002-0576-7097<br \/>\ne-mail: vitnel@ukr.net<br \/>\nGURMAN Ivan V., CHESHUN Viktor.M. PETLIAK Nataliia S.<br \/>\nKhmelnytskyi National University, Khmelnytsky, Ukraine<br \/>\nDZHULIY Andrii.V., CHORNENKYI Vitalii I.<br \/>\nUniversity of Economics and Entrepreneurship, Khmelnytsky, Ukraine<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2021-301-5-18-21\">https:\/\/www.doi.org\/10.31891\/2307-5732-2021-301-5-18-21<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review <\/strong>: 07.09.2021\u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 10.10.2021 \u0440.<br \/>\n<strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><br \/>\n\u0412 \u0440\u043e\u0431\u043e\u0442\u0456 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043e \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0438 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0434\u0430\u0442\u0447\u0438\u043a\u0456\u0432 \u043f\u0440\u0438\u0441\u0442\u0440\u043e\u0457\u0432 \u043c\u043e\u0431\u0456\u043b\u044c\u043d\u043e\u0433\u043e \u0437\u0432\u2019\u044f\u0437\u043a\u0443 \u044f\u043a \u0434\u0436\u0435\u0440\u0435\u043b\u0430 \u0435\u043d\u0442\u0440\u043e\u043f\u0456\u0457 \u0434\u043b\u044f \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0456\u0457 \u043a\u0440\u0438\u043f\u0442\u043e\u043a\u043b\u044e\u0447\u0456\u0432 \u043c\u043e\u0431\u0456\u043b\u044c\u043d\u043e\u0433\u043e \u0434\u043e\u0434\u0430\u0442\u043a\u0443 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u043a\u043b\u0456\u0454\u043d\u0442-\u0431\u0430\u043d\u043a. \u0420\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0438 \u043f\u0456\u0434\u0442\u0432\u0435\u0440\u0434\u0436\u0443\u044e\u0442\u044c \u043d\u0430\u044f\u0432\u043d\u0456\u0441\u0442\u044c \u0432 \u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044f\u0445 \u043f\u043e\u043a\u0430\u0437\u043d\u0438\u043a\u0456\u0432 \u0434\u0430\u0442\u0447\u0438\u043a\u0456\u0432 \u0441\u043a\u043b\u0430\u0434\u043e\u0432\u043e\u0457, \u043f\u0440\u0438\u0434\u0430\u0442\u043d\u043e\u0457 \u0434\u043b\u044f \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f \u0432 \u044f\u043a\u043e\u0441\u0442\u0456 \u0434\u0436\u0435\u0440\u0435\u043b\u0430 \u043f\u0435\u0440\u0432\u0438\u043d\u043d\u043e\u0457 \u0435\u043d\u0442\u0440\u043e\u043f\u0456\u0457 \u0434\u043b\u044f \u0433\u0435\u043d\u0435\u0440\u0430\u0442\u043e\u0440\u0456\u0432 \u043f\u0441\u0435\u0432\u0434\u043e\u0432\u0438\u043f\u0430\u0434\u043a\u043e\u0432\u0438\u0445 \u0447\u0438\u0441\u0435\u043b \u0437\u0430 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0456\u0447\u043d\u0438\u043c\u0438 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0430\u043c\u0438 \u0437 \u043f\u043e\u0434\u0430\u043b\u044c\u0448\u0438\u043c \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f\u043c \u0432 \u0440\u043e\u0431\u043e\u0442\u0456 \u0433\u0435\u043d\u0435\u0440\u0430\u0442\u043e\u0440\u0456\u0432 \u043a\u0440\u0438\u043f\u0442\u043e\u043a\u043b\u044e\u0447\u0456\u0432 \u0432 \u0441\u0435\u0440\u0432\u0456\u0441\u0430\u0445 \u043c\u043e\u0431\u0456\u043b\u044c\u043d\u043e\u0433\u043e \u0431\u0430\u043d\u043a\u0456\u043d\u0433\u0443 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u043a\u043b\u0456\u0454\u043d\u0442-\u0431\u0430\u043d\u043a.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0434\u0430\u0442\u0447\u0438\u043a, \u0435\u043d\u0442\u0440\u043e\u043f\u0456\u044f, \u0433\u0435\u043d\u0435\u0440\u0430\u0442\u043e\u0440 \u043f\u0441\u0435\u0432\u0434\u043e\u0432\u0438\u043f\u0430\u0434\u043a\u043e\u0432\u0438\u0445 \u0447\u0438\u0441\u0435\u043b, \u043c\u043e\u0431\u0456\u043b\u044c\u043d\u0438\u0439 \u0431\u0430\u043d\u043a\u0456\u043d\u0433.<\/p>\n<p style=\"text-align: center;\"><strong>\u00a0<\/strong><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The rapid penetration of the banking market of mobile banking creates not only new opportunities and conveniences, but also new risks and threats, which leads to increased requirements for information security of mobile services. One of the important components of the security of the mobile banking service of the client-bank system is the protection mechanisms based on the use of cryptographic keys. The stability of cryptographic keys is a guarantee of system reliability and, in turn, is based on the mechanisms of generating pseudo-random numbers using primary sources of entropy, for the effective use of which it is necessary to determine the type and capabilities of the source.<br \/>\nThe paper presents the results of the study of sensors of mobile communication devices as a source of entropy for generating cryptokeys of a mobile application of the client-bank system. An accelerometer, a temperature sensor, a gyroscope, a light brightness sensor, a magnetic field sensor, an atmospheric pressure sensor, a distance sensor, and a humidity sensor are considered as a source of entropy. The results of the research confirm the presence in the values of the sensors of mobile communication devices of a component suitable for use as a source of primary entropy for generators of pseudo-random numbers by cryptographic algorithms. In turn, pseudo-random number generators built with the use of mobile device sensors can be the basis of high-entropy cryptographic key generators in the client-bank system mobile banking services.<br \/>\nThe obtained results are focused on the implementation of algorithms and means of generating high-entropy pseudo-random numbers and can be used to reduce the risks of unauthorized access to customer information in the client-bank system by disclosing cryptokeys in mobile banking services.<br \/>\n<strong>Keywords:<\/strong> sensor, entropy, pseudo-random number generator, mobile banking.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Gheseleva N.V. Informacijna systema pidtrymky elektronnykh platezhiv cherez Internet \/ N.V. Gheseleva, Gh.V. Pronjuk, V.V. Dobrovoljsjkyj\/\/ Ekonomika i suspiljstvo, 2018. \u2013 Vypusk #14. \u2013 S. 1005\u20131010.<\/li>\n<li>Systema \u00abiBank 2\u00bb dlja korporatyvnykh klijentiv. [Elektronnyj resurs]. \u2013 URL: https:\/\/ibank.otpbank.ru\/Corporate_Internet\u2013Banking_Guide.pdf.<\/li>\n<li>Bezpeka Internet\u2013bankinghu v Ukrajini: praktychni aspekty [Elektronnyj resurs]. \u2013 URL: https:\/\/bankchart.com.ua\/e_banking\/statti\/bezpeka_internet_bankingu_v_ukrayini_praktichni_aspekti.<\/li>\n<li>Ghorycjkyj V.M. Gheneracija vypadkovykh poslidovnostej dlja system upravlinnja kljuchamy \/ V.M. Ghorycjkyj, O.V. Snjezhok, M.S. Vysochinenko \/\/ Suchasnyj zakhyst informaciji, 2012. \u2013 #4. \u2013 S. 88\u201395.<\/li>\n<li>Ghrinenko T. O. Kvantovi gheneratory vypadkovykh chysel v kryptoghrafiji \/ T. O. Ghrinenko, O. P. Narjezhnij \/\/ Systemy obrobky informaciji. \u2013 2015. \u00ac\u2013 Vyp. 10. \u2013 S. 86\u201389.<\/li>\n<li>Heat transfer and entropy generation in a microchannel with longitudinal vortex generators using nanofluids \/ Amin Ebrahimia, Farhad Rikhtegarb, Amin Sabaghana, Ehsan Roohia Energy \/\/ Energy. \u2013 Volume 101, 15 April 2016. \u2013 P. 190\u2013201.<\/li>\n<li>Faure E. V. Syntez i analiz psevdovypadkovykh poslidovnostej na osnovi operacij kryptoghrafichnogho peretvorennja \/ E. V. Faure, S. V. Sysojenko, T. V. Myronjuk \/\/ Systemy upravlinnja, navighaciji ta zv&#8217;jazku. \u2013 2015. \u2013 Vyp. 4. \u2013 S. 85\u201387.<\/li>\n<li>Florin R\u0103stoceanu,R\u0103zvan Rughinis, Stefan-Dan Cioc\u00eerlan, Mihai Enache. Sensor-Based Entropy Source Analysis and Validation for Use in IoT Environments. Electronics, 10, 1173. \u2013 2021 \u2013 28 \u0440.<\/li>\n<li>Christine Hennebert, Hicham Hossayni, C\u00e9dric Lauradoux. Entropy harvesting from physical sensors. Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, 2013. P. 149\u2013154.<\/li>\n<li>Na Lv, Tianyu Chen, Yuan Ma. Analysis on Entropy Sources based on Smartphone Sensors. ICCNS 2020: The 10th International Conference on Communication and Network Security, November 2020. P. 21\u201331.<\/li>\n<li>Modelj gheneratora kryptokljuchiv z dzherelamy entropiji dlja systemy klijent-bank \/ V. S. Orlenko, V. M. Cheshun, O. S. Androshhuk, A. I. Katajeva \/\/ Mizhnarodnyj naukovo-tekhnichnyj zhurnal \u00abVymirjuvaljna ta obchysljuvaljna tekhnika v tekhnologhichnykh procesakh\u00bb \u2013 2020. \u2013 # 2. \u2013 S. 103\u2013112.<\/li>\n<li>Funktsionalna realizatsiia heneratora kryptokliuchiv z dzherelamy entropii dlia mobilnoho bankinhu \/ O. S. Androshchuk, Yu. P. Klots, V.S. Orlenko, V. M. Cheshun \/\/ Herald of Khmelnytskyi National University. Technical sciences. \u2013 2021. \u2013 \u2116 1. \u2013 S. 7\u201311.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[58],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/9897"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9897"}],"version-history":[{"count":10,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/9897\/revisions"}],"predecessor-version":[{"id":11083,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/9897\/revisions\/11083"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}