Mathematical modeling of intellectual and cryptographic protection of authentication keys
DOI:
https://doi.org/10.20535/2411-1031.2025.13.2.344591Keywords:
cybersecurity, neural networks, mathematical modeling, intellectual-cryptographic system, preventive response, authentication keys, entropic analysis, adaptive optimization, deep learningAbstract
The article substantiates the scientific and methodological foundations of mathematical modeling of intellectual-cryptographic systems for preventive response to authentication key compromise threats. A generalized conceptual model is proposed, integrating symmetric encryption mechanisms (in particular, the AES algorithm), steganographic methods for concealing cryptographic parameters, and intelligent attack prediction modules based on deep learning techniques. The developed mathematical framework is grounded in the synthesis of probability theory, information entropy, and adaptive optimization principles, enabling quantitative assessment of compromise risks and the formation of dynamic response strategies under variable threat conditions. Special attention is given to formalizing adaptive adjustment processes of cryptographic complexity levels and degrees of concealment, depending on the results of intelligent traffic analysis and anomaly detection in data transmission channels. Approaches to building energy- and computation-efficient implementations of such systems for embedded and mobile environments with limited resources are also examined. The obtained results establish the scientific basis for developing a new class of intellectual-cryptographic systems capable of self-learning, adaptive security parameter management, and preventive response to potential authentication data compromise threats in a dynamic information environment.
References
J. Fridrich, and M. Goljan, “Practical Steganalysis of Digital Images – State of the Art”, in Proc. SPIE 4675, Security and Watermarking of Multimedia Contents IV, San Jose, California, USA, 2002. doi: https://doi.org/10.1117/12.465263.
J. Zhu, R. Kaplan, J. Johnson, and L. Fei-Fei, “HiDDeN: Hiding Data With Deep Networks”, in Proc. Part XV, Computer Vision – ECCV 2018: 15th Eur. Conf., Munich, Germany, 2018, pp. 682-697. doi: https://doi.org/10.1007/978-3-030-01267-0_40.
E. Barker, NIST Special Publication 800-57 Part 1 Revision 5. Recommendation for Key Management: Part 1 – General. USA: NIST, 2020, doi: https://doi.org/10.6028/NIST.SP.800-57pt1r5.
ENISA Threat Landscape 2024, Sep. 2024. [Online]. Available: https://www.enisa.europa.eu/sites/default/files/2024-11/ENISA%20Threat%20Landscape%202024_0.pdf. Accessed on: May 23, 2025.
I. Romashko, and Yu. Kalashnikova, “Cisco SecureX and Zero Trust: modern approaches to cyber defense”, Science and technology today, no. 9 (50), pp. 1475-1489, 2025. doi: https://doi.org/10.52058/2786-6025-2025-9(50)-1475-1489.
S. Kashkevich, A. Shyshatskyi, O. Dmytriieva, Y. Zhyvylo, G. Plekhova, and S. Neronov, “The development of management methods based on bio-inspired algorithms” in Information and control systems: modelling and optimizations. Collective monograph, A. Shyshatskyi, Ed. Kharkiv, Ukraine: Technology Center PC, 2024, pp. 35-69 p. doi: http://doi.org/10.15587/978-617-8360-04-7.
S. Al-Sarawi, M. Anbar, K. Alieyan, and M. Alzubaidi, “Internet of Things (IoT) Communication Protocols: Review”, in Proc. IEEE 8th International Conference on Information Technology (ICIT), 2017, Amman, Jordan, pp. 685-690. doi: https://doi.org/10.1109/ICITECH.2017.8079928.
N. Papernot, P. McDaniel, I. Goodfellow, S. Jha, Z. B. Celik, and A. Swami “Practical Black-Box Attacks against Machine Learning”, in Proc. Asia Conference on Computer and Communications Security (ASIA CCS '17), 2017, Abu Dhabi, UAE, pp. 506-519. doi: https://doi.org/10.1145/3052973.3053009.
M. Koval, O. Sova, O. Orlov, A. Shyshatskyi, Y. Artabaiev, O. Shknai, A. Veretnov, O. Koshlan, Y. Zhyvylo, and I. Zhyvylo, “Improvement of complex resource management of special-purpose communication systems”, Eastern-European Journal of Enterprise Technologies, vol. 5, no. 9 (119): Information and controlling system, pp. 34-44, 2022. doi: https://doi.org/10.15587/1729-4061.2022.266009.
E. Barker, NIST Special Publication 800-175B. Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms. USA: NIST, 2016. doi: http://dx.doi.org/10.6028/NIST.SP.800-175B.
B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 20th Ann. ed. USA: John Wiley & Sons, Inc., 2015.
Q.A. Mahdi et al., “Development of a method of structural-parametric assessment of the object state”, Eastern-European Journal of Enterprise Technologies, vol. 5, no. 4 (113): Mathematics and Cybernetics – applied aspects, pp. 34-44, 2021. doi: https://doi.org/10.15587/1729-4061.2021.240178.
Ye. Zhyvylo, and V. Kuz, “Risk Management of Critical Information Infrastructure: Threats-Vulnerabilities-Consequences”, Theoretical and Applied Cybersecurity: scientific journal, vol. 5, no. 2, pp. 68-80, 2023. doi: https://doi.org/10.20535/tacs.2664-29132023.2.280377.
Ye. Zhyvylo, and D. Shevchenko, “Cybersecurity Risk Assessment and Privacy Control in Government Information Systems”, Coll. of scien. works of the Taras Shevchenko National University of Kyiv, no. 75, pp. 66-76, 2022. doi: https://doi.org/10.17721/2519-481X/2022/75-07.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Collection "Information Technology and Security"

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors that are published in this collection, agree to the following terms:
- The authors reserve the right to authorship of their work and pass the collection right of first publication this work is licensed under the Creative Commons Attribution License, which allows others to freely distribute the published work with the obligatory reference to the authors of the original work and the first publication of the work in this collection.
- The authors have the right to conclude an agreement on exclusive distribution of the work in the form in which it was published this anthology (for example, to place the work in a digital repository institution or to publish in the structure of the monograph), provided that references to the first publication of the work in this collection.
- Policy of the journal allows and encourages the placement of authors on the Internet (for example, in storage facilities or on personal web sites) the manuscript of the work, prior to the submission of the manuscript to the editor, and during its editorial processing, as it contributes to productive scientific discussion and positive effect on the efficiency and dynamics of citations of published work (see The Effect of Open Access).