The Methods of Information Security Based on Blurring of System
The paper present the model of researching system with own known input, output and set of discrete internal states. These theoretical objects like an absolutely protected from research system and an absolutely indiscernible data transfer channel are defined. Generalization of the principle of Shanno...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2016-03-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/40 |
id |
doaj-ec06bad56d4b473a875a60a01541378b |
---|---|
record_format |
Article |
spelling |
doaj-ec06bad56d4b473a875a60a01541378b2020-11-24T23:53:22ZengMoscow Engineering Physics Institute Bezopasnostʹ Informacionnyh Tehnologij2074-71282074-71362016-03-0123112714040The Methods of Information Security Based on Blurring of SystemMikhail Andreevich Styugin0Siberian Federal UniversityThe paper present the model of researching system with own known input, output and set of discrete internal states. These theoretical objects like an absolutely protected from research system and an absolutely indiscernible data transfer channel are defined. Generalization of the principle of Shannon Secrecy are made. The method of system blurring is defined. Theoretically cryptographically strong of absolutely indiscernible data transfer channel is proved and its practical unbreakable against unreliable pseudo random number generator is shown. This paper present system with blurring of channel named Pseudo IDTC and shown asymptotic complexity of break this system compare with AES and GOST.https://bit.mephi.ru/index.php/bit/article/view/40information securityprotection from researchperfect secrecypseudo random numbercipher |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Mikhail Andreevich Styugin |
spellingShingle |
Mikhail Andreevich Styugin The Methods of Information Security Based on Blurring of System Bezopasnostʹ Informacionnyh Tehnologij information security protection from research perfect secrecy pseudo random number cipher |
author_facet |
Mikhail Andreevich Styugin |
author_sort |
Mikhail Andreevich Styugin |
title |
The Methods of Information Security Based on Blurring of System |
title_short |
The Methods of Information Security Based on Blurring of System |
title_full |
The Methods of Information Security Based on Blurring of System |
title_fullStr |
The Methods of Information Security Based on Blurring of System |
title_full_unstemmed |
The Methods of Information Security Based on Blurring of System |
title_sort |
methods of information security based on blurring of system |
publisher |
Moscow Engineering Physics Institute |
series |
Bezopasnostʹ Informacionnyh Tehnologij |
issn |
2074-7128 2074-7136 |
publishDate |
2016-03-01 |
description |
The paper present the model of researching system with own known input, output and set of discrete internal states. These theoretical objects like an absolutely protected from research system and an absolutely indiscernible data transfer channel are defined. Generalization of the principle of Shannon Secrecy are made. The method of system blurring is defined. Theoretically cryptographically strong of absolutely indiscernible data transfer channel is proved and its practical unbreakable against unreliable pseudo random number generator is shown. This paper present system with blurring of channel named Pseudo IDTC and shown asymptotic complexity of break this system compare with AES and GOST. |
topic |
information security protection from research perfect secrecy pseudo random number cipher |
url |
https://bit.mephi.ru/index.php/bit/article/view/40 |
work_keys_str_mv |
AT mikhailandreevichstyugin themethodsofinformationsecuritybasedonblurringofsystem AT mikhailandreevichstyugin methodsofinformationsecuritybasedonblurringofsystem |
_version_ |
1725470099888930816 |