Research of Methods of Secured Data Transmission in a Local Network
Abstract
Purpose. Study of methods and principles of ensuring secure data transmission in a local network and development of a software utility for establishing a secure communication channel.
Method. Based on the use of the AES cryptographic algorithm and the Diffie-Hellman key exchange protocol, as well as the application of byte sequence transformations during the generation of a shared secret key.
Findings. Consist in the analysis of the principles of functioning of end-to-end encryption (E2EE), consideration of cryptographic algorithms used within E2EE, and the study of Man-in-the-Middle (MITM) threats for such systems. Within the practical part, a utility was implemented that ensures secure data transmission in a local network.
Theoretical implications. Consists in deepening the understanding of cryptographic protection mechanisms when organizing secure data exchange in local networks.
Practical implications. Consists in creating an applied software implementation that can be used to form a secure communication channel in the conditions of publicly accessible or potentially vulnerable local networks.
The value. Consists in the possibility of using the proposed approach when designing or upgrading secure data exchange systems in network infrastructure of various scales.
Downloads
References
Serror, J., Jean Jarry, C., & Rouphael, R. (2019, March 4). From Julius Caesar to the blockchain: A brief history of cryptography. Variances. Retrieved from : https://www.ensae.org/fr/variances/article/from-julius-caesar-to-the-blockchain-a-brief-history-of-cryptography/4942
Sidhpurwala, H. (2023, January 12). A brief history of cryptography. Red Hat. Retrieved from : https://www.redhat.com/en/blog/brief-history-cryptography
Aumasson, J.-P. (2017). Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press. Retrieved from : https://www.google.com.ua/books/edition/Serious_Cryptography/hLcrDwAAQBAJ?hl=ru&gbpv=0
State Service of Special Communications and Information Protection of Ukraine. (n.d.). What is end-to-end encryption often referred to when speaking about messengers? Retrieved from : https://www.cip.gov.ua/ua/news/sho-take-end-to-end-shifruvannya-yake-chasto-zgaduyut-govoryachi-pro-mesendzheri
Amazon Web Services. (n.d.). What Is SMTP? Retrieved from : https://aws.amazon.com/what-is/smtp/?nc1=h_ls
Krasnov, O. V. (n.d.). Functions of the PGP encryption program and its application / Security utilities. Modern Informatics (the power of practice in theory). Retrieved from : https://alextexnok.blogspot.com/p/pgp.html
OpenPGP. (2024, September 29). About OpenPGP. Retrieved from : https://www.openpgp.org/about/
XMPP Standards Foundation. (n.d.). About XMPP. Retrieved from : https://xmpp.org/about/
Goldberg, I., & the OTR Development Team. (n.d.). Off-the-Record Messaging [Project homepage]. Retrieved from : https://otr.cypherpunks.ca/
Ehrenkret, M. (2023, September 19). Quantum resistance and the Signal Protocol. Signal. Retrieved from : https://signal.org/blog/pqxdh/
National Institute of Standards and Technology (NIST), Dworkin, M. J., Barker, E., Nechvatal, J., Foti, J., Bassham, L., Roback, E., & Dray Jr., J. (2001, November 26). Advanced Encryption Standard (AES). Federal Information Processing Standards (FIPS 197). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.FIPS.197
Srėbaliūtė, A. (2024, May 28). AES encryption: What is it & how does it safeguard your data? NordLayer. Retrieved from : https://nordlayer.com/blog/aes-encryption/
GeeksforGeeks. (2025, July 23). RSA Algorithm in Cryptography. Retrieved from : https://www.geeksforgeeks.org/computer-networks/rsa-algorithm-cryptography/
Lytvynenko, V. (2023, April 21). RSA encryption algorithm, types of attacks on it. Implementation in Python. DOU. Retrieved from : https://dou.ua/forums/topic/43026/
Rescorla, E. (1999, June). Diffie-Hellman Key Agreement Method. RFC 2631. Internet Engineering Task Force. Retrieved from : https://datatracker.ietf.org/doc/html/rfc2631
Cyber Witcher. (2023, May 1). MITM cheat sheet. HackYourMom. Retrieved from : https://hackyourmom.com/en/kibervijna/shpargalka-mitm/
Fortinet. (n.d.). Man‑in‑the‑Middle Attack: Types and Examples. Retrieved from : https://www.fortinet.com/resources/cyberglossary/man-in-the-middle-attack
Imperva. (n.d.). ARP Spoofing (ARP cache poisoning) — What it is and how it works. Retrieved from : https://www.imperva.com/learn/application-security/arp-spoofing/
Cabinet of Ministers of Ukraine. (n.d.). What is an electronic digital signature (EDS)? Retrieved from : https://www.kmu.gov.ua/usi-pitannya-po-e-poslugam/sho-tak-elektronnij-cifrovij-pidpis-ecp
Abstract views: 96 PDF Downloads: 79
Copyright (c) 2025 Mykhailo Sokolovskyi, Maksym Tureha, Mariia Shved

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).












