• Tidak ada hasil yang ditemukan

Вестник КазАТК

N/A
N/A
Protected

Academic year: 2024

Membagikan "Вестник КазАТК"

Copied!
8
0
0

Teks penuh

(1)

UDC 004.83 DOI 10.52167/1609-1817-2022-123-4-183-190

J.B. Polatova, G.S. Bukenov, I.N. Bukenova Almaty Technological University, Almaty, Kazakhstan

E-mail: [email protected]

DEVELOPMENT OF AN INFORMATION APPLICATION OF AN ONLINE EXCHANGE OFFICE FOR CRYPTOCURRENCY

Abstract. The emergence of cryptocurrency in the modern world has radically changed the attitude of investors to many financial instruments and assets. Bitcoin managed to earn a lot of amazing capitals, and today many people are striving to get into this trend. An excellent solution for automating the workflow with small amounts of money has become an online exchanger. This article discusses a program developed by the authors for currency exchange, money conversion. The program created for this work uses MD5 hashing algorithm. The main purpose of this study is to implement a complete control of the financial activity of the foreign exchange bureau, as well as to provide electronic accounting of receipts and expenditures. The main advantage of this currency exchange program is that it helps limit the potential losses caused by currency fluctuations.

Keywords. Cryptocurrency, Bitcoin, exchange office, encryption, RSA, MD5.

Introduction.

Nowadays, when storing all data in the cloud and on the Internet, it is very important to ensure data security in the first place. To encrypt personal data, it is necessary to use the most secure algorithms. Online cryptocurrency exchange point is a special service, a website often used by the cryptocurrency community, users of online platforms. You can use them to convert Bitcoin, Etherium and other digital coins into fiat currency and vice versa.

The quotation of the exchange bureau should be competitive, and the exchange rate and commission should not be lower than the average quotation on the market. The average rate can be seen on Coinmarketcap, but you need to compare it with the rate of your competitors (the rate will be higher). Some exchanges increase the exchange rate, but receive a lower commission, others do the opposite.

Materials and Methods.

In the program created for this work, all transactions are performed using the RSA encryption method. Due to the high security, new technologies do not prevent the use of RSA today, for example, for the transmission of encrypted keys [2].

The RSA cryptosystem has some data:

- КВ public key, say recipient B;

- kB key;

-message M;

- ciphertext C

This data is taken from a set of integers. ={0,1,2,…,n-1}, where n is a module, n=p∙q Here p and q are random prime numbers.

p and q are chosen so that they have the same length and remain confidential, which is necessary for maximum security.

The set Zn forms a modulo n arithmetic with addition and multiplication operations modulo n.

The КВ public key for the following conditions is chosen randomly:

(2)

1<< КВ<< φ(n), НОД(КВ , φ(n))=1

φ(n) = (p-1)∙(q-1), (1) Here φ(n) is an Euler function.

The Euler function φ(n) shows the number of natural numbers that are prime to n in the range from 1 to n. The second of these conditions states that the КВ public key and the Euler function φ(n) must be mutually prime.

Then the secret key КВ is computed using the extended Euclidean algorithm satisfying the following conditions: kB ∙ КВ = 1(mod φ(n)) or

kB = (mod(p-1)∙(q-1)). (2)

The recipient B knows a pair of prime numbers (p, q). This gives him an easy way to find φ(n), and the problem can be solved. It should also be noted that kB and n must be prime numbers.

To encrypt the data one must use the public key КВ. And to decrypt it, the hidden key kB

is used [1].

After the cryptographic transformation of the cipher C using the pair " КВ of the public key, message M" can be determined by the following formula [2]:

C = (M) = (M) = (mod n). (3)

Squaring all M and multiplying it again by M modulo n as an algorithm for fast computation of the cryptogram C uses a series of operations.

Inverse function C = (mod n). From this we see that in practice it is impossible to find the value of M by the known C, КВ and n at n≈2512. But the inverse problem or decryption of C-cryptogram with a secret key kB and ciphertext C can be solved by the following formula:

M = (C) = (C) = (mod n). (4)

The decoding process can be described as follows: ( (M)) = M.

MD5 encryption method. The program created for this job created all the logins and passwords in the database using the MD5 encryption method.

First, let's look at the hash function. It takes as input a number of rotating bits and outputs a hash code of length - a fixed path. The hash code is called a message digest, in the case when targeting a hash function is very difficult. The computational algorithm digest - message digest assumes a unique hash code.

MD5 encryption is a hashing method that includes a "print" or "number" for the next authentication process. In this way, you can make sure that the information is secure. It should be noted that the 128-bit hashing method allows you to store passwords [4].

The hash amount is a hexadecimal notation. MD5 is of a similar type. MD4 was a previous algorithm, but it was not as reliable. And so it was replaced by an improved one. Its work is a process of converting the original information in a certain order, in a certain number of bits, in a system of calculating the calculated value. So, hash code, hash, hash sum are basic concepts.

When it is necessary to additionally verify the integrity of the information, a hashing algorithm is used. This process is performed in the initial hashing step by the MD5 function.

(3)

Then the obtained values are validated. When the test is complete, the process of comparing and tracing the original values takes place. If the values match, there is no cause for concern. If the values diverge, the integrity and security of the information is compromised [7].

The user can use the MD5 hashing algorithm to check the security of files downloaded from the Internet. The HashTab utility helps here. This software allows you to change the properties of files and also use hash coding algorithms. The utility is publicly available and can be downloaded for free.

You can also use this method of coding information yourself when developing web applications. When creating and configuring a script, panel or authentication system can be hash code generation for individual strings [6].

Results and discussion.

The hidden key kB and a pair of numbers (p, q) is protected by the recipient B, which makes up the cryptosystem. Their Product gives the value of modulo n. Also, the recipient B is aware of the value of the public key Кв and the modulus N. The cracker, on the other hand, is only aware of Кв and n. If the cracker can classify the value of n by the factors p and q, then he could know the numbers "hidden step {p,q,KB}". And thus calculate the value φ(n)=(p-1)(q-1) of the Euler function and determine the value of the hidden key kB. Here it must be the condition that the chosen lengths of p and q must be at least 100 decimal places. In this case, the calculated number n cannot be classified as a multiplier. For example, suppose an attacker intercepts all messages from an open channel and learns the symbols e=37, n=77, y1=47, y2=1. But based on this intermediate data, the attacker cannot know the original ciphertext.

The cipher text decryption task in particular is equivalent to the classification of large numbers (small 77 digits in the example).

Developed foreign exchange software allows companies to buy and manage foreign currency to support international transactions.

Cryptocurrency implemented bitcoin, cryptocurrency etherium and e-wallets PayPal, Yandex, money by online conversion system [8]. When logging into the system, any user from the home page can change the desired currency to another, and to facilitate the user, the system has a calculator, which is shown in Figure 1.

Figure 1-Main page

(4)

If the user has selected the desired item, click "Exchange" button, you will need to fill bitcoin or wallet address, specifying where to transfer the mail and money or cryptocurrency, as shown in Figure 2. This is the type of exchange without the user registering. If the user registers and then re-enters the system to exchange, he or she will undergo a special verification for self-approval.

Figure 2 - Buying Bitcoin

When the user fills in all the necessary data, the request is sent for processing. At the bottom of the main page, the latest conversions and their status are displayed, i.e. the user keeps track of his request, Figure 3.

Figure 3-Recent conversions

(5)

Now let's look at the admin job, the admin job is the most important and complex job in the program. Figure 4.

Figure 4-Administrator login page

When you log in, you see the main page and the menu is located on the left, Figure 5.

Figure 5-Main page of the admin

In it you can handle payment gateways, through which you can make payments. This is shown in Figure 6.

(6)

Figure 6 - Payment gateways

Also in the menu of administrator's work will be written page of user settings, conversion processing, history of conversion of money or cryptocurrency. The admin can customize all the pages. In the Questions and Answers section you can write the most common questions and answers. In the Settings section you can change all the additional information on the site.

The home page also has a Support Programs section, where the affiliate program is located. And the Contact section contains contacts and a feedback form. The main page also displays a list of the most frequently asked questions. Information about the company is also on the main page. It has been placed on the site as a simple text. The system has also developed a registration system for regular users.

Conclusion.

Today, cryptocurrencies continue to grow. Thus, the number of users of electronic money is steadily increasing. The popularity of bitcoin has led to the emergence of other cryptocurrencies, which with not high popularity and opportunities will grow along with bitcoin. In some countries, including Kazakhstan, explaining the concern for people with cryptocurrencies began to fight. Throwing them into the struggle the collapse of cryptocurrencies happened because of bitcoin. The struggle is related to the desire to fix the emission function of the currency, due to which the authorities are in the hands of the state and prevent the creation of alternative sources of emission, which are not the means of payment regulated by any state. Nevertheless, they cannot physically prohibit cryptocurrency transactions on the Internet. However, to prohibit the mining of cryptocurrencies, including bitcoins, requires access to every computer device, which is prohibited by the laws of many countries as an invasion of privacy [9].

Initially, it was difficult to buy and exchange cryptocurrencies. But in the era of technology and the development of the Internet exchanges began to open the purchase of cryptocurrencies and optimize the conversion. So far, online conversion is considered a very convenient system even for the common man. Summarizing all the studied information, today there are about 8000 types of cryptocurrencies, well, and of course enough online exchangers.

(7)

When creating an online exchange point, the system is clear, reliable for any user and will be in demand, the exchange will happen quickly.

The software developed by the authors can be used by accountants and other specialists, who are responsible for the purchase and sale of foreign currency. The main advantage of this currency exchange software is that it helps limit the potential losses caused by currency fluctuations.

I recommend using an online exchange for exchanging or buying cryptocurrencies.

REFERENCES

[1] Aleks Fork, Bitcoin. Bol'she chem den'gi/Aleks Fork. - 2016. - 280 c.

[2] Natanijel' Popper, Cifrovoe Zoloto. Neverojatnaja istorija bitkojna ili o tom, kak idealisty i biznesmeny izobretajut den'gi zanovo/Natanijel' Popper. - 2016. - 350 c.

[3] Pol Vin'ja, Majkl Kejsi − Jepoha kriptovaljut. Kak bitkojn i blokchejn menjajut mirovoj jekonomicheskij porjadok // Mann, Ivanov i Ferber, - 2017.

[4] Novosti i sobytija seti Bitcoin, http://bitcoin-info.net/.

[5] Kak otkryt' obmennik kriptovaljuty s nulja, s chego nachat' i skol'ko mozhno zarabotat', https://abcbiznes.ru/kriptovaljuta/17163-kak-otkryt-obmennik-kriptovaljuty.html.

[6] Kak sozdat' obmennik kriptovaljut s nulja, https://5bitcoin.ru/kak-sozdat-obmennik- kriptovaljut/.

[7] Singh S. Kniga shifrov. Tajnaja istorija shifrov i ih rasshifrovki. - M.: Ast, Astrel', 2006. 447 s.

[8] Baujer F. Rasshifrovannye sekrety. Metody i principy kriptologii. - M.: Mir, 2007.

550 c.3.

Жансая Полатова, лектор, Алматы технологиялық университеті, Алматы, Қазақстан, [email protected]

Гани Букенов, лектор, Алматы технологиялық университеті, Алматы, Қазақстан, [email protected]

Индира Букенова, магистр, лектор, Алматы технологиялық университеті, Алматы, Қазақстан, [email protected]

КРИПТОВАЛЮТАҒА ОНЛАЙН АЙЫРБАСТАУ ПУНКТІНІҢ АҚПАРАТТЫҚ ҚОСЫМШАСЫН ӘЗІРЛЕУ

Андатпа. Қазіргі әлемде криптовалютаның пайда болуы инвесторлардың көптеген қаржы құралдары мен активтерге қатынасын түбегейлі өзгертті. Биткоин көптеген таңғажайып капиталды таба алды, және бүгінде көптеген адамдар осы үрдіске түсуге тырысады. Интернеттегі айырбастау пункті аз мөлшерде жұмыс процесін автоматтандырудың тамаша шешімі болды. Мақалада авторлар әзірлеген валюта айырбастау, ақша айырбастау бағдарламасы қарастырылады. Бұл жұмыс үшін жасалған бағдарламада MD5 хэштеу алгоритмі қолданылады. Осы зерттеудің негізгі мақсаты валюта айырбастау пунктінің қаржылық белсенділігін толық бақылауды жүзеге асыру, сондай-ақ түсімдер мен шығыстардың электрондық есебін қамтамасыз ету болып табылады. Бұл валюта айырбастау бағдарламасының басты артықшылығы-бұл валюта бағамдарының ауытқуынан туындаған ықтимал шығындарды шектеуге көмектеседі.

Түйінді сөздер. Криптовалюта, Bitcoin, айырбастау пункті, шифрлау, RSA, MD5.

(8)

Жансая Полатова, лектор, Алматинский технологический университет, Алматы, Казахстан, [email protected]

Гани Букенов, лектор, Алматинский технологический университет, Алматы, Казахстан, [email protected]

Индира Букенова, магистр, лектор, Алматинский технологический университет, Алматы, Казахстан, [email protected]

РАЗРАБОТКА ИНФОРМАЦИОННОГО ПРИЛОЖЕНИЯ ОНЛАЙН ОБМЕННОГО ПУНКТА НА КРИПТОВАЛЮТУ

Аннотация. Появление криптовалюты в современном мире коренным образом изменило отношение инвесторов ко многим финансовым инструментам и активам. По биткоину удалось заработать много удивительных капиталов, и сегодня многие стремятся попасть в этот тренд. Отличным решением для автоматизации рабочего процесса с небольшими суммами стал онлайн обменный пункт. В статье рассматривается разработанная авторами программа для обмена валюты, конвертации денежных средств. В программе, созданной для этой работы, используется алгоритм хеширования MD5. Основная цель данного исследования заключается в осуществлении полного контроля финансовой активности пункта обмена валют, а также обеспечение электронного учета поступлений и расходов. Основное преимущество данной программы для обмена валюты заключается в том, что оно помогает ограничить потенциальные убытки, вызванные колебаниями валютных курсов.

Ключевые слова. Криптовалюта, Bitcoin, обменный пункт, шифрование, RSA, MD5.

****************************************************************************

Referensi

Dokumen terkait

Select an address and click the Find Reference Object Button to display a list of functional objects using that address in the Output Window.. Select a functional object in the

New Click this button to attach an Oracle UCM document to the selected Siebel record, by completing fields on the Content Check In Form7. Scan Click this button to scan or import

To pre- view a page, click the File menu, point to Preview In Browser, and then click Adobe BrowserLab, or click the Preview button in the Adobe BrowserLab panel. For

To open the Macro dialog box, click the Macro button on the Developer tab, press Alt+F8, or place the View Macros button on the Quick Access toolbar.. To place the View Macros button

click the play button to view the animation Normal modes of vibration of water molecule 1.Symmetric stretch Click the play button to view the animation 2.Asymmetric stretch Click the

To change the Currency, click the ellipsis button on the currency field to open the list of values and select the required currency sign... DV Amount Fill out the DV Amount

Use Case: Student login Actor: Student Pre-condition: Registration Primary Path  Choose sign in  Fill the data fields  Click the log in button  Take to the home page

Wages Employee Click the salary details button on the Salary page Entered into appearance wages containing employees _ name , address , division, salary data every month in One year ,