Krasnodar Military Institute. SM Shtemenko
Author list of organization
List of articles written by the authors of the organization

Description
The goal of the study is to research experimentally a pseudonoise sequence acquisition method for multicarrier communication systems of MCDSCDMA, that allows low hardware requirements and able to operate in low quality channels. The way of achieving this lies in using a specially developed computer model of algorithm in Simulink. The achieved results have shown high efficiency of the considered acquisition method in contrast to sequential search method. The proposed algorithm can be used in multicarrier systems for acquisition of aperiodic pseudonoise sequences in wireless public networks and in military communication networks

Description
The goal of the study is to research time characteristics of pseudonoise sequence acquisition method for multicarrier communication systems of MCDSCDMA, that allows low hardware requirements and able to operate in low quality channels. The way of achieving this lies in using a mathematical model of algorithm. The achieved results show suitability of MCDSCDMAsignals optimization for pseudonoise sequence acquisition efficiency increase. The achieved results can be applied in MCDSCDMA communication systems development

QUANTUM DISTRIBUTION SYSTEMS: PHYSICAL BASES, PROTOCOLS, OPPORTUNITIES OF THEIR IMPLEMENTATION
DescriptionThe aim of the article is to analyze existing quantum distribution systems, their facilities, physical bases of quantum objects behavior used in quantum distribution systems and protocols of quantum keys distribution

Description
The technique relates to the area of distribution of key information in cryptographic communication systems. The purpose of the work was to solve the problem of increasing the speed of distribution of key information for special bodies of federal bodies of critical facilities in the conditions of networkcentric management and creating alternative options for the distribution of key information when key documents are compromised to special equipment. By applying the methodology, a solution to this problem is achieved by applying a key distribution method based on asymmetric cryptography using symmetric polynomials

MODELLING OF OPTICAL PULSE SIGNALS IN QUANTUM CRYPTOGRAPHY COMMUNICATION SYSTEMS
DescriptionIt is necessary to know exact value of the full dispersion of waveguides, which leads to broadening and reduction of pulse amplitude for modeling laser radiation passage in quantum cryptography systems. The operation purpose was obtaining of dependences on a wavelength of various dispersion types according to the Sellmeier’ sequationand optical pulse radiation modelling in quantum communication systems. Dependences of the material, waveguide and chromatic dispersions on length of a wave according to the Sellmeier’s equation which allows to consider an optical fiber’s material are received. Distribution of a cryptographic impulse through fiberoptical communication lines of various extent is simulated

Description
In clause the main rules of the theory of modularcluster networks are opened. The methods of the theory allow effectively to troubleshoot of dynamic simulation of complex information systems at solution of the class of the tasks coupled to the analysis of functional  structural properties of the information architecture.

NOISEIMMUNITY OF PSEUDONOISE SEQUENCE ACQUISITION ALGORITHM FOR MCCDMA COMMUNICATION SYSTEMS
DescriptionThe goal of the study is to research a noiseimmunity of pseudonoise sequence acquisition method for multicarrier communication systems MCCDMA, using a segment of the pseudonoise sequence. The goal was achieved by running a simulation developed in MATLAB. By analyzing the results, we can show that the developed mathematical model produces the lower bound for pseudonoise sequence acquisition probability. The resulting analytical estimations might be used during the design phrase for pseudonoise sequence acquisition systems for MCCDMA based military communication networks

DESING OF AUTOMATED SYSTEMS IN SECURED EXECUTION OF MILITARY USE
DescriptionIn the work we have developed a structural modeling of the optimal choice of information security devices in the design of automated systems in the protected execution in the transition to network centric methods of control of troops and weapons

DEVELOPING A COUNTERMEASURES TO USING COVERT CHANNELS IN PACKETSWITCHED NETWORKS
DescriptionIn the given article a model which allows defining general characteristics of covert channels in packetswitched networks as well as countermeasures to covert channels developed on the basis of the model in question are presented
 Description