• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site
Of all publications in the section: 33
Sort:
by name
by year
Article
Баранов А. П. Проблемы информационной безопасности. Компьютерные системы. 2009. № 4. С. 51-55.
Added: Feb 7, 2013
Article
Баранов А. П., Баранов П. А. Проблемы информационной безопасности. Компьютерные системы. 2016. № 1. С. 70-75.

This paperwork is dedicated to research of k-length CRC value distribution for data interval with volume n. It is shown in research [1] that CRC value could be represented as a sum of special-way formed random vectors over k-dimension vector space GFk(2) over a two-element 0,1-field (GF(2)).If the message or errors are modeled using independent random 0,1 values sequences, CRC could be regarded as a sum of independent random vector components.

The paperwork examines CRC value distribution’s behavior under conditions of big n’s and fixed values of k. By means of character theory application we find the conditions of asymptotic unification of CRC distribution.

Asymptotic results could be applied for error estimation for various telecommunication protocols (e.g. USB, X.25, HDLC, Bluetooth, Ethernet and others).

Added: Dec 5, 2015
Article
Баранов П. А., Баранов А. П. Проблемы информационной безопасности. Компьютерные системы. 2017. № 4.

The article analyzes possibilities of errors in telecommunication protocols using packet data transmission. Probabilistic model of a prolonged-action additive interference is represented as a sequence of executions of independent interference blocks with definite length. The paper shows that in certain conditions concerning a polynomial of degree k, used for creation of CRC code, with block size s, probability of error occurrence α is close to 2-k and doesn’t depend on s if distortion probability P1 is significant. It is demonstrated that for low values of P1=δ/n, δ>0, CRC error probability depends on s. Authors make an example of an interference with s = k, where error probability α is higher than 2^(-k) value (δ2^(k-1))/k times, therefore α=δ/2k  and CRC is not efficient.

Added: Feb 26, 2018
Article
Баранов А. П. Проблемы информационной безопасности. Компьютерные системы. 2014. № 4. С. 9-16.

The basic principle of this article is structured representation of computer technologies. Application of this principle shows that any independent part of information computing system could be represented as a set of connection hardware units and different computers with specialized roles in the system. The items of the set, in turn, are operated through an external control subsystem. It is shown that currently the main issue of information security is to reach the needed level of availability and invulnerability to computer attacks.

Added: Nov 4, 2016
Article
Гетьман А. И., Падарян В. А. Проблемы информационной безопасности. Компьютерные системы. 2014. № 3. С. 123-130.
Added: Nov 7, 2018
Article
Миронкин В. О., Маршалко Г. Б. Проблемы информационной безопасности. Компьютерные системы. 2017. № 1. С. 43-49.

We consider a variant of a neural symmetric cipher, describe its probabilistic model. We show that this cipher is equivalent to the proportional substitution cipher. We propose an algorithm for reconstruction of a plaintext from cipher text, using properties of the space of enciphered characters.

Added: Feb 21, 2017
Article
Елин В. М. Проблемы информационной безопасности. Компьютерные системы. 2015. № 1. С. 74-82.

The peculiarities of the legal regulation of civil and building a system of civil protection of the computer information in the Russian Federation at the present time. The concept of computer information is subject to a comprehensive analysis by application of the law on electronic documents and computer programs (databases).

Added: Feb 5, 2016
Article
Баранов А. П., Баранов П. А. Проблемы информационной безопасности. Компьютерные системы. 2017. № 2. С. 39-45.

The paper considers certain probability-theoretic models of packet mode-transferred information distortions. Attention is drawn mainly to distortions, including possible interferences influencing multiple transfer cycles. Distortions are modeled by a consequential impacts that are defined by dependent random variables. K-dimensioned values of CRC, respectively allow representation as a sum of k-dimensioned independent random variables.

In some cases it is possible to bring them to a sum of independent terms in a k-dimensioned vector space over a two-element field and, afterwards, apply to them existing limit theorems dealing with convergence to uniform distributions.

The paper discusses prospects for impacts stretching to m cycles of acquiring convergence conditions for CRC distribution as a sum of m-dependent terms or ones not interconnected to a non-homogeneous Markov chain.

Added: Sep 11, 2017
Article
Баранов П. А. Проблемы информационной безопасности. Компьютерные системы. 2015. № 1. С. 46-51.

Enhanced electronic signature (hereinafter ES) application while transmitting a message over telecommunication channels reveals even most minor (down to single-bit) message change.

Insignificant distortions cause complete change of hash-function's result and therefore, lead to non-confirmation of ES. Meaning of the information held in file being transmitted may be uninfluenced by these distortions but totally ruin its legal meaning and mean sending the whole message anew. The situation tends to become more complicated in light of perspective legal-meaning data volume increase.

Thereupon arises the issue of the maximum possible size of a message transferred distortion-free over telecommunication networks based on modern network protocols of different layers. In the following network protocols are considered: Ethernet (Token Ring, FDDI), IP, TCP. Every one of them allows non-zero probability of distorted packet's occasional admission despite the control means. If the number of packets increases sufficiently this probability may become significant. The author proposes to evaluate this probability in low-strength binary white noise possibility modeling conditions.

Using the model proposed the distortion-free message size estimation is made. For the protocols mentioned it is over 1012 bytes.

Added: Jul 15, 2015
Article
Миронкин В. О., Дали Ф. А. Проблемы информационной безопасности. Компьютерные системы. 2017. № 2. С. 46-55.

Some tree-hashing modes are considered. The main requirements to tree-hashing modes are formulated.

Added: Oct 28, 2017
Article
Борисенко Б. Б., Килюшева Е. Д. Проблемы информационной безопасности. Компьютерные системы. 2014. № 4. С. 76-84.
Added: Nov 24, 2015
Article
Миронкин В. О., Чухно А. Б. Проблемы информационной безопасности. Компьютерные системы. 2018. № 2. С. 69-73.

In this paper a generalization of the classical birthday problem for the case of several independent samples of arbitrary power is considered. Exact and asymptotic expressions describing the probability of the intersection of these samples are obtained.

Added: Jul 26, 2018
Article
Баранов А. П. Проблемы информационной безопасности. Компьютерные системы. 2013. № 3. С. 55-61.

In this article the estimation of Mahlanobis's distance" is observed, in conditions of dual channel receiving of binary signal. The biggest value of the probability value Pn p is corresponded to the biggest Mahlanobis's distance. The importance of estimation value is postulated by the size of controlling zone that is necessary before being provided the secured state of processing information, which is existed in spurious emission and is regulated by recommendations of FSTEK of Russia. Unlike to works made and published before the algorithms of estimation of value Prp , which aren't using the information about training, binary, referent sequence, are proposed.

Added: Jan 14, 2014
Article
Дали Ф. А., Миронкин В. О. Проблемы информационной безопасности. Компьютерные системы. 2018. № 1. С. 113-121.

Two models of the tree modes of hash functions are introduced. For each model algorithms of computing of the hash code are formulated and their numerical characteristics are obtained. In terms of the constructed models we classify some existing algorithms for parallel hashing and identify some weaknesses of corresponding primitives.

Added: May 28, 2018
Article
Нестеренко А. Ю. Проблемы информационной безопасности. Компьютерные системы. 2012. № 2. С. 76-82.

In this work we present two new protocols for secure management of remote objects. These protocols are released in group of points of elliptic curve, defined over finite field, with usage of russian cryptography standards.

Added: Nov 27, 2012
Article
Миронкин В. О. Проблемы информационной безопасности. Компьютерные системы. 2015. № 4. С. 140-146.

A comparative analysis of the probability characteristics of the test algorithm and the development of key reference model is done. A statistical method for determining nonequiprobability generated key sequence is proposed. 

Added: Apr 24, 2016
Article
Бабаш А. В., Кудияров Д. С. Проблемы информационной безопасности. Компьютерные системы. 2013. № 3. С. 49-54.

Sufficient conditions under which the periods of the sequences of maps generator IA divisible by 2n.

Added: Jan 7, 2014
Article
Бабаш А. В., Кудияров Д. Проблемы информационной безопасности. Компьютерные системы. 2013. № 3. С. 49-54.
Added: Mar 7, 2014
Article
Бабаш А. В., Кудияров Д. Проблемы информационной безопасности. Компьютерные системы. 2013. № 3. С. 49-54.
Added: Mar 8, 2014
Article
Баранов А. П. Проблемы информационной безопасности. Компьютерные системы. 2007. № 1. С. 11-14.
Added: Feb 7, 2013
Article
Бабаш А. В. Проблемы информационной безопасности. Компьютерные системы. 2014. Т. 4. С. 66-76.

Proposed development known cryptographic techniques to determine the period range in Vigenère cipher on encrypted text

Added: Feb 15, 2016
1 2