Page 106 - Cyber Defense eMagazine January 2023
P. 106
In addition, plant is part of control system which receives command signal, copes with some disturbance
which can be mitigated or compensated and as outcome it gives output signal which can be measured
using sensing network that returns such data via feedback branch at input of overall control system. Goal
of this contribution is to collaterally make parallel between digital technologies being applied in high-tech
security, as well as control theory as binary algebra is under strong focus of research communities. To
recent experience, there are yet characteristics of binary systems which need deep approach to their
exploration as they can offer results going beyond known frontiers.
Related work
Ongoing research has started in 2013 with a definition of the ESIS encryption rule [15] which is brand-
new and multi-level cryptographic law being applied in crypto-systems that do not need any kind of key
management techniques. Maybe in the past that would be assumed as a perfect secrecy many
cryptographers looked for, but at this modern time it’s just a strong encryption algorithm that opened a
completely novel approach to binary systems as it has become clear binary algebra is a branch of
mathematics offering nearly limitless opportunities even nowadays. In other words, scientists,
researchers and engineers need to dig deep in order to understand all characteristics of binary systems
and consequently fully apply them. Further, such an investigation has introduced a plenty of new cutting-
edge projects such as static neutralizer [17] which is strongly correlated with endpoint and data protection,
as well as deep insight into singularity of that mathematical theory. Main contribution of this effort is an
explanation of link cryptographic system design from both – theoretical and practical point of view. As
link encryption is a challenge to a wide spectrum of defense industries across the globe the idea is to
encourage army researchers and developers to tackle such an engineering problem being from national
significance to every armed forces. Also, there is proposed how to make an innovative cryptographic
channel taking advantage over static absorber mathematical model in creating a neutralizing shield to
core signal either being plaintext or ciphertext depending if it is dealt with pure link or combined
encryption, respectively. From a developer’s perspective, it’s needed to know that link cryptography uses
a diagonal square matrix which external elements are protection shield to any cryptanalysis attack
sending a step function in order to obtain some step response, while central element is only a signal
carrier that can be open or encrypted depending on a sort of that cryptosystem, so far.
Cryptanalysis is an important practice in cryptology which in modern times serves to do some readings
of certain communication channel in order to figure out which content is delivered via such an information
exchange platform. On the other hand, application of 3x3 diagonal square matrix in developing
communication track can provide many options in playing with cryptographic algorithms, but in this case
it is suggested to cope with dot static absorber’s rule that in sense of programming can be defined through
some coding functions which role is to give adequate response to any external high-tech attack.
Apparently, if a set of 1s is sent to some communication in order to get some streaming from such a data
transfer system it’s obvious that excitation will vanish in such a singular point not sending back any
feedback information to attacker. Indeed, it’s truly like a black hole which can trap anything even a light
itself into such a horizon leaving only darkness behind itself as its gravitational field is too strong to let
anything escape from so. Current technologies such as artificial intelligence (AI) and machine learning
(ML) could in such a fashion serve for a plenty of usages of those techniques in designing next generation
Cyber Defense eMagazine – January 2023 Edition 106
Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.