CONTROL STRING
(FPS-LE edition)
The use of control strings as crypto-primitives is a key component of Subtle technology.
Both digital images, texts or web-documents can be used to generate control strings.
What needs to be understood is that control strings are not secret keys and are not subject to the applicable legal restrictions.
Control strings are simply an additional crypto-primitive that can be used in combination with both standard and non-standard methods for encrypting digital data.
However, in all versions of the FPS up to the PE version, strict restrictions are imposed on the size and format of the image used, as well as the length of the generated control string.
Despite these limitations, the control shear is one of the strongest components for creating strong cryptosystems.
The use of control strings is used in cases when an object-related relational model of digital data encryption is applied.
The use of control strings is used in cases when an object-related relational model of digital data encryption is applied.
Note: Although files are used in this case, this form of encryption has nothing to do with encryption that uses a file as a secret key. These are two very different approaches to encryption.

The generation of a control string is performed by a specialized module, which is activated by clicking on the corresponding button Control string settings , in the Crypto settings panel or by using the key combination [ Alt + I ].
As a result, a module will be activated that allows the generation of a control shear, using digital images that meet the imposed restrictions.

Buttons and keyboard shortcuts
- Load control string primitives ... [ Ctrl + L ]
- Save control string primitives ... [ Ctrl + S ]
- Generate control string ... [ F9 ]
- Refresh settings ... [ F5 ]
- Refresh settings ... [ Ctrl + Del ]
IMPORTANT!
If you use Refresh, the system will restore its settings to those that were last confirmed.
Using Trash restores the system to its original settings.

To generate the control string you need to click on the Control String Key (CS Key) button or use the F9 key.
As a result, a window with coordinates
Xo = 10; Yo = 10
Xr = 100; Yr = 100
will appear on the image.
Тhe parameters of the control string will be displayed in the Digital image protection string field.

You can change the parameters of the control window by positioning the mouse marker inside it and moving it when the left key is pressed.
Any change in the control window results in an automatic change in the generated control string.

If necessary, the system digital image can be replaced by one of the other three that are available.
This can be done by selecting from the Object drop-down menu or by simply clicking on one of them.

Each of the base images can be replaced with another. To do this, you need to click on the Get digital image button or use the key combination [ Ctrl + I ].

The next step is to select one of the included base images or load your own that meets the requirements (format, width and height in pixels).

Once the new image is loaded, it can be used as a basis for generating a control string.

Once the control string is generated, the information about it can be displayed as a systematic report.
The easiest way to do this is to use the key combination [ Ctrl + P ].

In practice, the system report is analogous to the text report for crypto processes.
