Typical solutions for maintaining confidentiality and integrity involve using pre-existing secure protocols and cryptographic algorithms.
Brute force attack on cryptographic algorithm is an important branch of cryptology.
The interfering signal is produced by cryptographic algorithm, with good restoration resistance.