Mathematical aspects of the combined application of the AES algorithm and steganographic methods in authentication key protection

Authors

DOI:

https://doi.org/10.20535/2411-1031.2025.13.2.344592

Keywords:

cybersecurity, neural networks, machine learning, cryptography, steganography, authentication keys, password manager

Abstract

The article examines the mathematical foundations of the combined application of the AES algorithm and steganographic methods in the protection of authentication keys. It is shown that the use of symmetric encryption ensures a high level of confidentiality and cryptographic strength, but has limitations in cases where communication channels remain accessible for adversarial analysis. To mitigate these risks, the integration of steganographic techniques is substantiated as an additional security layer that enables concealing the very existence of protected data. A mathematical model of the combined approach is proposed, taking into account the entropy characteristics of the keys, probabilistic estimates of AES resistance to attacks, and indicators of steganographic concealment capacity. An analytical evaluation of the proposed approach demonstrates a reduction in the probability of unauthorized disclosure of authentication keys compared to traditional protection methods. The obtained results have practical significance for the development of multi-level cybersecurity architectures in access control systems, cloud services, and password managers such as LastPass, where the secure storage and transmission of authentication keys are critical.

Author Biographies

Tatiana Fesenko, National University “Poltava Polytechnic named after Yury Kondratyuk”, Poltava

candidate of technical sciences, associate professor, associate professor of the department of computer and information technologies and systems of the Educational and scientific institute of information technologies and robotics

Yuliya Kalashnikova, National University “Poltava Polytechnic named after Yury Kondratyuk”, Poltava

assistant of the department of computer and information technologies and systems at the Educational and scientific institute of information technologies and robotics

References

N.A. Oktarini Saputri, and N.E. Sari, “Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm”, Journal of Data Science, vol. 19, 12 p. 2023. [Online]. Available: https://iuojs.intimal.edu.my/index.php/jods/article/view/23. Accessed on: Aug. 19, 2025.

K. Chaitanya, M. Prasanth, S.V. Saisrinivasreddy, and S.K. Kumar, “Securing of aes based on secure hash algorithm for image steganography”, International Journal of Health Sciences, vol. 6, no. S2, pp. 1489-1499, 2022. doi: https://doi.org/10.53730/ijhs.v6nS2.5107.

S. Gangurde, and K. Tiwari, “LSB Steganography Using Pixel Locator Sequence with AES”, arXiv:2012.02494, 2020. doi: https://doi.org/10.48550/arXiv.2012.02494.

M. Poudel, and N. Rahimi, “Machine Learning-Based AES Key Recovery via Side-Channel Analysis on the ASCAD Dataset”, arXiv:2508.11817, 2025. doi: https://doi.org/10.48550/arXiv.2508.11817.

K. Ramezanpour, P. Ampadu, and W. Diehl, “SCAUL: Power Side-Channel Analysis with Unsupervised Learning”, IEEE Transactions on Computers, vol. 69, no. 11, pp. 1626-1638, 2020. doi: https://doi.org/10.1109/TC.2020.3013196.

W. Tang, B. Li, S. Tan, M. Barni, and J. Huang, “CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography”, IEEE Transactions on Information Forensics and Security, vol. 14, iss. 8, pp. 2074-2087, 2019. doi: https://doi.org/10.1109/TIFS.2019.2891237

Y. Ren, Y. Liu, and L. Wang, “Using Contrastive Learning to Improve the Performance of Steganalysis Schemes”, in X. Zhao, A. Piva, and P. Comesaña-Alfaro, Eds. Digital Forensics and Watermarking. IWDW 2021. Lecture Notes in Computer Science(RO), vol. 13180. Springer, Cham, pp. 212-226. doi: https://doi.org/10.1007/978-3-030-95398-0_15.

A. Kuznetsov et al., “Image steganalysis using deep learning model”, Multimed Tools Appl, vol. 83, pp. 48607-48630, 2024. doi: https://doi.org/10.1007/s11042-023-17591-0.

“An Encryption Model that Prioritizes your Security”, LastPass. [Online]. Available: https://www.lastpass.eu/security/zero-knowledge-security. Accessed on: Aug. 19, 2025.

J. Gentles, M. Fields, G. Goodman, and S. Bhunia, “Breaking the Vault: A Case Study of the 2022 LastPass Data Breach”, arXiv:2502.04287, 2025. doi: https://doi.org/10.48550/arXiv.2502.04287.

J. Blocki, B. Harsha, S. Zhou, “On the Economics of Offline Password Cracking”, arXiv:2006.05023, 2020. doi: https://doi.org/10.48550/arXiv.2006.05023.

Q.A. Mahdi et al., “Development of a method of structural-parametric assessment of the object state”, Eastern-European Journal of Enterprise Technologies, vol. 5, no. 4 (113), pp. 34-44, 2021. doi: https://doi.org/10.15587/1729-4061.2021.240178.

M. Koval, O. Sova, O. Orlov, Y. Zhyvylo, and I. Zhyvylo, “Improvement of complex resource management of special-purpose communication systems”, Eastern-European Journal of Enterprise Technologies, vol. 5, no. 9-119, pp. 34-44, 2022. doi: https://doi.org/10.15587/1729-4061.2022.266009.

Ye. Zhyvylo, and V. Kuz, “Risk Management of Critical Information Infrastructure: Threats-Vulnerabilities-Consequences”, Theoretical and Applied Cybersecurity: scientific journal, vol. 5, no. 2, pp. 68-80, 2023. doi: https://doi.org/10.20535/tacs.2664-29132023.2.280377.

S. Kashkevich, A. Shyshatskyi, O. Dmytriieva, Y. Zhyvylo, G. Plekhova, and S. Neronov, “The development of management methods based on bio-inspired algorithms” in Information and control systems: modelling and optimizations. Collective monograph, A. Shyshatskyi, Ed. Kharkiv, Ukraine: Technology Center PC, 2024, pp. 35-69p. doi: http://doi.org/10.15587/978-617-8360-04-7.

Y. Zhyvylo, D. Shevchenko, and O. Chernonoh, “Typology of cybersecurity systems in information and telecommunication systems of military (special) purpose”, Modern information technologies in the sphere of security and defence, vol. 42 (3), pp. 37-44, 2021. doi: http://doi.org/10.33099/2311-7249/2021-42-3-37-44.

Y. Zhyvylo, “Situation center of the Ministry of defense of Ukraine – a model of early detection and analysis of crisis situations in the state security sector”, Pressing Problems of Public Administration, vol. 1 (60), pp. 27-41, 2022. doi: https://doi.org/10.26565/1684-8489-2022-1-02.

Ye. Zhyvylo, and D. Shevchenko, “Cybersecurity Risk Assessment and Privacy Control in Government Information Systems”, Coll. of scien. works of the Taras Shevchenko National University of Kyiv, no. 75, pp. 66-76, 2022. doi: https://doi.org/10.17721/2519-481X/2022/75-07.

Y. Zhyvylo, “National macrofinancial stability in the context of cyber threats”, Pressing Problems of Public Administration, vol. 2 (65), pp. 347-369, 2024. doi: https://doi.org/10.26565/1684-8489-2024-2-18.

Published

2025-11-27

How to Cite

Fesenko, T., & Kalashnikova, Y. (2025). Mathematical aspects of the combined application of the AES algorithm and steganographic methods in authentication key protection. Collection "Information Technology and Security", 13(2), 178–191. https://doi.org/10.20535/2411-1031.2025.13.2.344592

Issue

Section

CRYPTOLOGY