{"id":3033,"date":"2023-10-11T15:32:45","date_gmt":"2023-10-11T10:32:45","guid":{"rendered":"http:\/\/vestnik.polytech.tj\/?p=3033"},"modified":"2023-10-11T15:37:11","modified_gmt":"2023-10-11T10:37:11","slug":"application-of-operator-matrix-method-and-double-key-in-object-encryption","status":"publish","type":"post","link":"https:\/\/vestnik.polytech.tj\/?p=3033&lang=en","title":{"rendered":"APPLICATION OF OPERATOR-MATRIX METHOD AND DOUBLE KEY IN  OBJECT ENCRYPTION"},"content":{"rendered":"<p><!--vcv no format--><!-- vcwb\/dynamicElementComment:624f0ab0 --><!-- \/vcwb\/dynamicElementComment:624f0ab0 --><!-- vcwb\/dynamicElementComment:29895f84 --><!-- \/vcwb\/dynamicElementComment:29895f84 --><!-- vcwb\/dynamicElementComment:8984e8fe --><!-- \/vcwb\/dynamicElementComment:8984e8fe --><!-- vcwb\/dynamicElementComment:a48b0bfa --><\/p>\n<div class=\"vce-row-container\" data-vce-boxed-width=\"true\">\n<div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-a48b0bfa\" data-vce-do-apply=\"all el-a48b0bfa\">\n<div class=\"vce-row-content\" data-vce-element-content=\"true\"><!-- vcwb\/dynamicElementComment:fad958f2 --><\/p>\n<div class=\"vce-col vce-col--md-78p vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-fad958f2\">\n<div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-fad958f2\">\n<div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-fad958f2\"><!-- vcwb\/dynamicElementComment:297bf280 --><\/p>\n<div class=\"vce-text-block\">\n<div class=\"vce-text-block-wrapper vce\" id=\"el-297bf280\" data-vce-do-apply=\"all el-297bf280\">\n<p><strong><span style=\"font-size: 14pt;\">Authors<\/span><\/strong><\/p>\n<p><em><strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Gafurov M.Kh.<\/strong> &#8212; Candidate of technical sciences, associate professor, Tajik technical <\/em><em>University, Khujand, Republic of Tajikistan, mirugaf56@gmail.com<\/em><\/p>\n<p><span style=\"font-size: 14pt;\"><strong>Annotation<\/strong><\/span><\/p>\n<p><em>&nbsp; &nbsp; &nbsp; This article discusses how to build an alphabet substitution, create and use a two-key cipher using the example of the operator-matrix substitution method. It should be noted that the operator-matrix substitution method has a high resistance of the encrypted object. The rapid development of science and technology, the digitalization of various spheres of society, the widespread use of modern technologies in the activities of most important public spheres greatly simplifies the process of accessing secret and other restricted information for foreign states, which requires more attention from us to strengthening the national system of technical information protection. Currently, in information systems, there are specialized software products that protect information objects using various methods of substituting an open object with an encrypted object or vice versa, with the help of which interested individuals or groups, upon gaining access, quickly convert the encrypted text object into an open one and become aware of its contents. To prevent and protect an open object, it is required to propose new highly resistant substitution methods. The author of the article concluded that when choosing a second substitution key, an arbitrary pair of elements is proposed, in each pair one is Gafurov M.Kh. Application of operator-matrix method and double key in object encryption 19 replaceable, the other is replacing, the more elements in the substitution set, the closer the probability of determining an arbitrary variant of the substitution key is to zero<\/em><\/p>\n<p><span style=\"font-size: 14pt;\"><strong><em>Key words<\/em><\/strong><\/span><\/p>\n<p><em> method, object, alphabet, encryption, decryption, sets, operator, symbol, key, variant, stability<\/em><\/p>\n<\/div>\n<\/div>\n<p><!-- \/vcwb\/dynamicElementComment:297bf280 --><\/div>\n<\/div>\n<\/div>\n<p><!-- \/vcwb\/dynamicElementComment:fad958f2 --><!-- vcwb\/dynamicElementComment:ed86fdf2 --><\/p>\n<div class=\"vce-col vce-col--md-22p vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last\" id=\"el-ed86fdf2\">\n<div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-ed86fdf2\">\n<div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-ed86fdf2\"><!-- vcwb\/dynamicElementComment:7a3d9269 --><\/p>\n<div class=\"vce-text-block\">\n<div class=\"vce-text-block-wrapper vce\" id=\"el-7a3d9269\" data-vce-do-apply=\"all el-7a3d9269\">\n<table style=\"border-collapse: collapse; width: 100%;\" border=\"1\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\">\n<p style=\"line-height: 1;\">Language<\/p>\n<p style=\"line-height: 1;\"><span style=\"font-weight: 400; font-style: normal;\">english<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<p><!-- \/vcwb\/dynamicElementComment:7a3d9269 --><!-- vcwb\/dynamicElementComment:4526d705 --><\/p>\n<div class=\"vce-text-block\">\n<div class=\"vce-text-block-wrapper vce\" id=\"el-4526d705\" data-vce-do-apply=\"all el-4526d705\">\n<table style=\"border-collapse: collapse; width: 100%;\" border=\"1\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\">\n<p style=\"line-height: 1;\">Type<\/p>\n<p style=\"line-height: 1;\"><span style=\"font-weight: 400; font-style: normal;\">technical<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<p><!-- \/vcwb\/dynamicElementComment:4526d705 --><!-- vcwb\/dynamicElementComment:ab834728 --><\/p>\n<div class=\"vce-text-block\">\n<div class=\"vce-text-block-wrapper vce\" id=\"el-ab834728\" data-vce-do-apply=\"all el-ab834728\">\n<table style=\"border-collapse: collapse; width: 100%;\" border=\"1\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\">\n<p style=\"line-height: 1;\">Year<\/p>\n<p style=\"line-height: 1;\"><span style=\"font-weight: 400; font-style: normal;\">2023<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<p><!-- \/vcwb\/dynamicElementComment:ab834728 --><!-- vcwb\/dynamicElementComment:ee20f632 --><\/p>\n<div class=\"vce-text-block\">\n<div class=\"vce-text-block-wrapper vce\" id=\"el-ee20f632\" data-vce-do-apply=\"all el-ee20f632\">\n<table style=\"border-collapse: collapse; width: 100%;\" border=\"1\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\">\n<p style=\"line-height: 1;\">Page<\/p>\n<p style=\"line-height: 1;\"><span style=\"font-weight: 400;\">18-19<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<p><!-- \/vcwb\/dynamicElementComment:ee20f632 --><\/div>\n<\/div>\n<\/div>\n<p><!-- \/vcwb\/dynamicElementComment:ed86fdf2 --><\/div>\n<\/div>\n<\/div>\n<p><!-- \/vcwb\/dynamicElementComment:a48b0bfa --><!-- vcwb\/dynamicElementComment:ccc70b8d --><\/p>\n<div class=\"vce-row-container\" data-vce-boxed-width=\"true\">\n<div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-ccc70b8d\" data-vce-do-apply=\"all el-ccc70b8d\">\n<div class=\"vce-row-content\" data-vce-element-content=\"true\"><!-- vcwb\/dynamicElementComment:fbc31ca2 --><\/p>\n<div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-fbc31ca2\">\n<div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-fbc31ca2\">\n<div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-fbc31ca2\"><!-- vcwb\/dynamicElementComment:7ad056f4 --><\/p>\n<div class=\"vce-text-block\">\n<div class=\"vce-text-block-wrapper vce\" id=\"el-7ad056f4\" data-vce-do-apply=\"all el-7ad056f4\">\n<p><span style=\"font-size: 14pt;\"><strong>References<\/strong><\/span><\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li><em>Burkhanova N.M. The budget system of the Russian Federation. \u2013 M.: Eksmo, 2007, 32 p.<\/em><\/li>\n<li><em>Burkhanova N.M. Economical geography. Cheat sheets. \u2013 M.: Eksmo, 2008, 32 p.<\/em><\/li>\n<li><em>Katasonov V.Yu. America v. Russia. \u2013 M.: Book World, 2015, 449 p.<\/em><\/li>\n<li><em>Katasonov V.Yu. Anti-crisis. Survive and conquer. \u2013 M.: Algorithm, 2015, 149 p.<\/em><\/li>\n<li><em>Katasonov V.Yu. The battle for the ruble. \u2013 M.: Book World, 2015, 288 p.<\/em><\/li>\n<li><em>Klimova M.A. Wage. \u2013 M.: Tax Herald, 2008, 320 p.<\/em><\/li>\n<li><em>Klimova M.A. Income tax. \u2013 M.: Tax Herald, 2008, 98 p.<\/em><\/li>\n<li><em>Nikanorov P.S. Cooperative activity. \u2013 M.: Tax Bulletin, 2008, 320 p.<\/em><\/li>\n<li><em>Nikanorov P.S. Mediation activities. \u2013 M.: Tax Bulletin, 2008, 320 p.<\/em><\/li>\n<li><em>Panchenko T.M. Loans and loans. \u2013 M.: Tax Bulletin, 2008, 158 p.<\/em><\/li>\n<li><em>Panchenko T.M. Vacation and social benefits. \u2013 M.: Tax Bulletin, 2008, 340 p.<\/em><\/li>\n<li><em>Starikov N.V. Geopolitics. How it&#8217;s done. \u2013 St. Petersburg: Peter, 2014, 368 p.<\/em><\/li>\n<li><em>Starikov N.V. The nationalization of the ruble. \u2013 St. Petersburg: Peter, 2011, 169 p.<\/em><\/li>\n<li><em>Usmanov Z.D. N-grams in the recognition of homogeneous texts. &#8212; Materials of 20 scientific-practical seminar &#171;New information technologies in automated systems&#187;. \u2013 M.: 2017, P. 52 \u2013 54.<\/em><\/li>\n<li><em>Usmanov Z.D. Algorithm for tuning the clustering of discrete random variables. &#8212; Reports of the Academy of Sciences of the Republic of Tajikistan, 2017, vol. 60, \u2116 9, P. 392 \u2013 397.<\/em><\/li>\n<li><em>Usmanov Z.D. Classifier of discrete random variables. \u2013 Reports of the Academy of Sciences of the Republic of Tajikistan. 2017, vol. 60, \u2116 7 \u2013 8, P. 291 \u2013 300.<\/em><\/li>\n<li><em>Shevchuk D.A. The history of economics. \u2013 M.: Author, 2009, 305 p.<\/em><\/li>\n<li><em>Shevchuk D.A. World economy. Lecture notes. \u2013 Rostov-on-Don: Phoenix, 2007, 417 p.<\/em><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<p><!-- \/vcwb\/dynamicElementComment:7ad056f4 --><\/div>\n<\/div>\n<\/div>\n<p><!-- \/vcwb\/dynamicElementComment:fbc31ca2 --><\/div>\n<\/div>\n<\/div>\n<p><!-- \/vcwb\/dynamicElementComment:ccc70b8d --><!-- vcwb\/dynamicElementComment:e37d3054 --><\/p>\n<div class=\"vce-row-container\" data-vce-boxed-width=\"true\">\n<div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-e37d3054\" data-vce-do-apply=\"all el-e37d3054\">\n<div class=\"vce-row-content\" data-vce-element-content=\"true\"><!-- vcwb\/dynamicElementComment:d2c2a0a2 --><\/p>\n<div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-d2c2a0a2\">\n<div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-d2c2a0a2\">\n<div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-d2c2a0a2\"><!-- vcwb\/dynamicElementComment:415e1dc2 --><\/p>\n<div class=\"vce-text-block\">\n<div class=\"vce-text-block-wrapper vce\" id=\"el-415e1dc2\" data-vce-do-apply=\"all el-415e1dc2\">\n<h2><strong><span style=\"font-size: 14pt;\">Publication date<\/span><\/strong><\/h2>\n<p>09\/22\/2023<\/p>\n<\/div>\n<\/div>\n<p><!-- \/vcwb\/dynamicElementComment:415e1dc2 --><\/div>\n<\/div>\n<\/div>\n<p><!-- \/vcwb\/dynamicElementComment:d2c2a0a2 --><\/div>\n<\/div>\n<\/div>\n<p><!-- \/vcwb\/dynamicElementComment:e37d3054 --><!--vcv no format--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authors &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Gafurov M.Kh. &#8212; Candidate of technical sciences, associate professor, Tajik technical University, Khujand, Republic of Tajikistan, mirugaf56@gmail.com Annotation &nbsp; &nbsp; &nbsp; This article discusses how to build an alphabet substitution, create and use a two-key cipher using the example of the operator-matrix substitution method. It should be noted that the operator-matrix substitution method has a high resistance of the encrypted object. The rapid development of science and technology, the digitalization of various spheres of society, the widespread use of modern technologies in the activities of&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[406],"tags":[416],"class_list":["post-3033","post","type-post","status-publish","format-standard","hentry","category-bulletin_of_pittu-2023","tag-bulletin-of-pittu-2023-1"],"acf":[],"featured_image_src":null,"author_info":{"display_name":"ilhomjonqodirov02","author_link":"https:\/\/vestnik.polytech.tj\/?author=1"},"_links":{"self":[{"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=\/wp\/v2\/posts\/3033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3033"}],"version-history":[{"count":3,"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=\/wp\/v2\/posts\/3033\/revisions"}],"predecessor-version":[{"id":3036,"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=\/wp\/v2\/posts\/3033\/revisions\/3036"}],"wp:attachment":[{"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vestnik.polytech.tj\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}