V. V. Kirichenko


This paper analyses the issues of closing the communication channel with an unmanned aerialvehicle by using cryptographic means. Requirements applicable to such means are formulated. The methodof information encryption envisaging use of direct and reverse dynamical systems is considered.There has been carried out a series of experiments on information conversion with the encryptiondecryptionsystem that showed some algorithm features based on the above mentioned systems


Aircraft motion control; unmanned aerial vehicle; UAV communication channels; cryptographic protection; block packet cipher; Lorenz system; ring of integers


V. Slyusar. (2010). Data transmission from the board of the UAV: NATO standards. ELECTRONICS: NTB, no. 3. pp. 80–86. http:// /UAV-1.pdf

V. M. Ilyushka and T.M. Narytnik, “The data transmission system based on high-altitude unmanned aerial vehicle (SPD “Phaeton”)”. Communication, 2004, no. 7. pp. 38–39.

S. V. Galushko, “Unmanned aerial vehicles radically change the face of the future of aviation”. Science and Life, 2001, no. 9, pp. 18–20.

V. V. Kirichenko, “The effectiveness of the use of inverse control systems for the conversion and transmission of information.” Abstracts of the 11th International Scientific and Technical Conference “Modeling, identification, synthesis control systems”. Moscow. 2008, pp. 46–47.

V. V. Kirichenko, “Using inverse control systems for encoding and transmission.” Abstracts of Scientific and Technical Conference “The problems of global communication, navigation, surveillance and air traffic management CNS/ATM”. 2014, Kyiv. 139 p.

A. M. Kovalev, V. A. Kozlovsky and V. F. Scsherbak, Generalized Inverse dynamical systems in problems of encryption, Applied Discrete Mathematics, 2009, no. 1, pp. 20–21.

M. J. Sobhy and A. Shehata, Secure computer communication using haotic algorithms. Int. J. of Bifurcation and Chaos. vol. 10, no. 12, 2000, pp. 2831–2839.

A statistical test suite for random and pseudorandom number generators for cryptographic applications, A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. arker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, San Vo. National Institute of Standards and Technology Special Publication 800-22 revision 1a, April 2010. 131 p. /documents/SP800- 2rev1a.pdf

B. Ya. Ryabko and A. N. Fionov, Cryptographic methods of information protection. Moscow: Hotline-Telecom. 2005, 232 p.

Full Text: PDF


  • There are currently no refbacks.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.