The Methods of Information Security Based on Blurring of System
The paper present the model of researching system with own known input, output and set of discrete internal states. These theoretical objects like an absolutely protected from research system and an absolutely indiscernible data transfer channel are defined. Generalization of the principle of Shanno...
Main Author: | Mikhail Andreevich Styugin |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2016-03-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/40 |
Similar Items
-
Security Analysis of QAM Quantum-Noise Randomized Cipher System
by: Yukai Chen, et al.
Published: (2020-01-01) -
Avalanche effect and bit independence criterion of perfectly secure Shannon cipher based on matrix power
by: Matas Levinskas, et al.
Published: (2021-09-01) -
Perfectly Secure Shannon Cipher Construction Based on the Matrix Power Function
by: Eligijus Sakalauskas, et al.
Published: (2020-05-01) -
Robust Secure Authentication and Data Storage with Perfect Secrecy
by: Sebastian Baur, et al.
Published: (2018-04-01) -
MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features
by: Rahul Saha, et al.
Published: (2019-01-01)