Research of Methods of Secured Data Transmission in a Local Network

Keywords: Encryption, Secure data transmission, Cryptographic protocols, Secure communication channel, E2EE

Abstract

Purpose. Study of methods and principles of ensuring secure data transmission in a local network and development of a software utility for establishing a secure communication channel.

Method. Based on the use of the AES cryptographic algorithm and the Diffie-Hellman key exchange protocol, as well as the application of byte sequence transformations during the generation of a shared secret key.

Findings. Consist in the analysis of the principles of functioning of end-to-end encryption (E2EE), consideration of cryptographic algorithms used within E2EE, and the study of Man-in-the-Middle (MITM) threats for such systems. Within the practical part, a utility was implemented that ensures secure data transmission in a local network.

Theoretical implications. Consists in deepening the understanding of cryptographic protection mechanisms when organizing secure data exchange in local networks.

Practical implications. Consists in creating an applied software implementation that can be used to form a secure communication channel in the conditions of publicly accessible or potentially vulnerable local networks.

The value. Consists in the possibility of using the proposed approach when designing or upgrading secure data exchange systems in network infrastructure of various scales.

Downloads

Download data is not yet available.

References

Serror, J., Jean Jarry, C., & Rouphael, R. (2019, March 4). From Julius Caesar to the blockchain: A brief history of cryptography. Variances. Retrieved from : https://www.ensae.org/fr/variances/article/from-julius-caesar-to-the-blockchain-a-brief-history-of-cryptography/4942

Sidhpurwala, H. (2023, January 12). A brief history of cryptography. Red Hat. Retrieved from : https://www.redhat.com/en/blog/brief-history-cryptography

Aumasson, J.-P. (2017). Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press. Retrieved from : https://www.google.com.ua/books/edition/Serious_Cryptography/hLcrDwAAQBAJ?hl=ru&gbpv=0

State Service of Special Communications and Information Protection of Ukraine. (n.d.). What is end-to-end encryption often referred to when speaking about messengers? Retrieved from : https://www.cip.gov.ua/ua/news/sho-take-end-to-end-shifruvannya-yake-chasto-zgaduyut-govoryachi-pro-mesendzheri

Amazon Web Services. (n.d.). What Is SMTP? Retrieved from : https://aws.amazon.com/what-is/smtp/?nc1=h_ls

Krasnov, O. V. (n.d.). Functions of the PGP encryption program and its application / Security utilities. Modern Informatics (the power of practice in theory). Retrieved from : https://alextexnok.blogspot.com/p/pgp.html

OpenPGP. (2024, September 29). About OpenPGP. Retrieved from : https://www.openpgp.org/about/

XMPP Standards Foundation. (n.d.). About XMPP. Retrieved from : https://xmpp.org/about/

Goldberg, I., & the OTR Development Team. (n.d.). Off-the-Record Messaging [Project homepage]. Retrieved from : https://otr.cypherpunks.ca/

Ehrenkret, M. (2023, September 19). Quantum resistance and the Signal Protocol. Signal. Retrieved from : https://signal.org/blog/pqxdh/

National Institute of Standards and Technology (NIST), Dworkin, M. J., Barker, E., Nechvatal, J., Foti, J., Bassham, L., Roback, E., & Dray Jr., J. (2001, November 26). Advanced Encryption Standard (AES). Federal Information Processing Standards (FIPS 197). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.FIPS.197

Srėbaliūtė, A. (2024, May 28). AES encryption: What is it & how does it safeguard your data? NordLayer. Retrieved from : https://nordlayer.com/blog/aes-encryption/

GeeksforGeeks. (2025, July 23). RSA Algorithm in Cryptography. Retrieved from : https://www.geeksforgeeks.org/computer-networks/rsa-algorithm-cryptography/

Lytvynenko, V. (2023, April 21). RSA encryption algorithm, types of attacks on it. Implementation in Python. DOU. Retrieved from : https://dou.ua/forums/topic/43026/

Rescorla, E. (1999, June). Diffie-Hellman Key Agreement Method. RFC 2631. Internet Engineering Task Force. Retrieved from : https://datatracker.ietf.org/doc/html/rfc2631

Cyber Witcher. (2023, May 1). MITM cheat sheet. HackYourMom. Retrieved from : https://hackyourmom.com/en/kibervijna/shpargalka-mitm/

Fortinet. (n.d.). Man‑in‑the‑Middle Attack: Types and Examples. Retrieved from : https://www.fortinet.com/resources/cyberglossary/man-in-the-middle-attack

Imperva. (n.d.). ARP Spoofing (ARP cache poisoning) — What it is and how it works. Retrieved from : https://www.imperva.com/learn/application-security/arp-spoofing/

Cabinet of Ministers of Ukraine. (n.d.). What is an electronic digital signature (EDS)? Retrieved from : https://www.kmu.gov.ua/usi-pitannya-po-e-poslugam/sho-tak-elektronnij-cifrovij-pidpis-ecp


Abstract views: 96
PDF Downloads: 79
Published
2025-10-31
How to Cite
Sokolovskyi, M., Tureha, M., & Shved, M. (2025). Research of Methods of Secured Data Transmission in a Local Network. Social Development and Security, 15(5), 209-228. https://doi.org/10.33445/sds.2025.15.5.17
Section
Engineering and Technology

Most read articles by the same author(s)