Page 106 - Cyber Defense eMagazine January 2023
P. 106

In addition, plant is part of control system which receives command signal, copes with some disturbance
            which can be mitigated or compensated and as outcome it gives output signal which can be measured
            using sensing network that returns such data via feedback branch at input of overall control system. Goal
            of this contribution is to collaterally make parallel between digital technologies being applied in high-tech
            security, as well as control theory as binary algebra is under strong focus of research communities. To
            recent experience, there are yet characteristics of binary systems which need deep approach to their
            exploration as they can offer results going beyond known frontiers.



            Related work

            Ongoing research has started in 2013 with a definition of the ESIS encryption rule [15] which is brand-
            new and multi-level cryptographic law being applied in crypto-systems that do not need any kind of key
            management  techniques.  Maybe  in  the  past  that  would  be  assumed  as  a  perfect  secrecy  many
            cryptographers looked for, but at this modern time it’s just a strong encryption algorithm that opened a
            completely  novel  approach  to  binary  systems  as  it  has  become  clear  binary  algebra  is  a  branch  of
            mathematics  offering  nearly  limitless  opportunities  even  nowadays.  In  other  words,  scientists,
            researchers and engineers need to dig deep in order to understand all characteristics of binary systems
            and consequently fully apply them. Further, such an investigation has introduced a plenty of new cutting-
            edge projects such as static neutralizer [17] which is strongly correlated with endpoint and data protection,
            as well as deep insight into singularity of that mathematical theory. Main contribution of this effort is an
            explanation of link cryptographic system design from both – theoretical and practical point of view. As
            link encryption is a challenge to a wide spectrum of defense industries across the globe the idea is to
            encourage army researchers and developers to tackle such an engineering problem being from national
            significance to every armed forces. Also, there is proposed how to make an innovative cryptographic
            channel taking advantage over static absorber mathematical model in creating a neutralizing shield to
            core  signal  either  being  plaintext  or  ciphertext  depending  if  it  is  dealt  with  pure  link  or  combined
            encryption, respectively. From a developer’s perspective, it’s needed to know that link cryptography uses
            a  diagonal  square  matrix  which  external  elements  are  protection  shield  to  any  cryptanalysis  attack
            sending a step function in order to obtain some step response, while central element is only a signal
            carrier that can be open or encrypted depending on a sort of that cryptosystem, so far.

            Cryptanalysis is an important practice in cryptology which in modern times serves to do some readings
            of certain communication channel in order to figure out which content is delivered via such an information
            exchange  platform.  On  the  other  hand,  application  of  3x3  diagonal  square  matrix  in  developing
            communication track can provide many options in playing with cryptographic algorithms, but in this case
            it is suggested to cope with dot static absorber’s rule that in sense of programming can be defined through
            some  coding  functions  which  role  is  to  give  adequate  response  to  any  external  high-tech  attack.
            Apparently, if a set of 1s is sent to some communication in order to get some streaming from such a data
            transfer system it’s obvious that excitation will vanish in such a singular point not sending back any
            feedback information to attacker. Indeed, it’s truly like a black hole which can trap anything even a light
            itself into such a horizon leaving only darkness behind itself as its gravitational field is too strong to let
            anything escape from so. Current technologies such as artificial intelligence (AI) and machine learning
            (ML) could in such a fashion serve for a plenty of usages of those techniques in designing next generation





            Cyber Defense eMagazine – January 2023 Edition                                                                                                                                                                                                       106
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   101   102   103   104   105   106   107   108   109   110   111