The Methods of Information Security Based on Blurring of System

The paper present the model of researching system with own known input, output and set of discrete internal states. These theoretical objects like an absolutely protected from research system and an absolutely indiscernible data transfer channel are defined. Generalization of the principle of Shanno...

Full description

Bibliographic Details
Main Author: Mikhail Andreevich Styugin
Format: Article
Language:English
Published: Moscow Engineering Physics Institute 2016-03-01
Series:Bezopasnostʹ Informacionnyh Tehnologij
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/40
id doaj-ec06bad56d4b473a875a60a01541378b
record_format Article
spelling doaj-ec06bad56d4b473a875a60a01541378b2020-11-24T23:53:22ZengMoscow Engineering Physics Institute Bezopasnostʹ Informacionnyh Tehnologij2074-71282074-71362016-03-0123112714040The Methods of Information Security Based on Blurring of SystemMikhail Andreevich Styugin0Siberian Federal UniversityThe paper present the model of researching system with own known input, output and set of discrete internal states. These theoretical objects like an absolutely protected from research system and an absolutely indiscernible data transfer channel are defined. Generalization of the principle of Shannon Secrecy are made. The method of system blurring is defined. Theoretically cryptographically strong of absolutely indiscernible data transfer channel is proved and its practical unbreakable against unreliable pseudo random number generator is shown. This paper present system with blurring of channel named Pseudo IDTC and shown asymptotic complexity of break this system compare with AES and GOST.https://bit.mephi.ru/index.php/bit/article/view/40information securityprotection from researchperfect secrecypseudo random numbercipher
collection DOAJ
language English
format Article
sources DOAJ
author Mikhail Andreevich Styugin
spellingShingle Mikhail Andreevich Styugin
The Methods of Information Security Based on Blurring of System
Bezopasnostʹ Informacionnyh Tehnologij
information security
protection from research
perfect secrecy
pseudo random number
cipher
author_facet Mikhail Andreevich Styugin
author_sort Mikhail Andreevich Styugin
title The Methods of Information Security Based on Blurring of System
title_short The Methods of Information Security Based on Blurring of System
title_full The Methods of Information Security Based on Blurring of System
title_fullStr The Methods of Information Security Based on Blurring of System
title_full_unstemmed The Methods of Information Security Based on Blurring of System
title_sort methods of information security based on blurring of system
publisher Moscow Engineering Physics Institute
series Bezopasnostʹ Informacionnyh Tehnologij
issn 2074-7128
2074-7136
publishDate 2016-03-01
description The paper present the model of researching system with own known input, output and set of discrete internal states. These theoretical objects like an absolutely protected from research system and an absolutely indiscernible data transfer channel are defined. Generalization of the principle of Shannon Secrecy are made. The method of system blurring is defined. Theoretically cryptographically strong of absolutely indiscernible data transfer channel is proved and its practical unbreakable against unreliable pseudo random number generator is shown. This paper present system with blurring of channel named Pseudo IDTC and shown asymptotic complexity of break this system compare with AES and GOST.
topic information security
protection from research
perfect secrecy
pseudo random number
cipher
url https://bit.mephi.ru/index.php/bit/article/view/40
work_keys_str_mv AT mikhailandreevichstyugin themethodsofinformationsecuritybasedonblurringofsystem
AT mikhailandreevichstyugin methodsofinformationsecuritybasedonblurringofsystem
_version_ 1725470099888930816