Shtemenko High Military School (Military Institute)
Author list of organization
List of articles written by the authors of the organization
-
Description
The technique relates to the area of distribution of key information in cryptographic communication systems. The purpose of the work was to solve the problem of increasing the speed of distribution of key information for special bodies of federal bodies of critical facilities in the conditions of network-centric management and creating alternative options for the distribution of key information when key documents are compromised to special equipment. By applying the methodology, a solution to this problem is achieved by applying a key distribution method based on asymmetric cryptography using symmetric polynomials
-
QUANTUM DISTRIBUTION SYSTEMS: PHYSICAL BASES, PROTOCOLS, OPPORTUNITIES OF THEIR IMPLEMENTATION
DescriptionThe aim of the article is to analyze existing quantum distribution systems, their facilities, physical bases of quantum objects behavior used in quantum distribution systems and protocols of quantum keys distribution
-
MODELLING OF OPTICAL PULSE SIGNALS IN QUANTUM CRYPTOGRAPHY COMMUNICATION SYSTEMS
DescriptionIt is necessary to know exact value of the full dispersion of waveguides, which leads to broadening and reduction of pulse amplitude for modeling laser radiation passage in quantum cryptography systems. The operation purpose was obtaining of dependences on a wavelength of various dispersion types according to the Sellmeier’ sequationand optical pulse radiation modelling in quantum communication systems. Dependences of the material, waveguide and chromatic dispersions on length of a wave according to the Sellmeier’s equation which allows to consider an optical fiber’s material are received. Distribution of a cryptographic impulse through fiber-optical communication lines of various extent is simulated
-
ERROR CHECK IN OPERATING CRYPTOGRAPHICALLY SECURE PSEUDORANDOM NUMBER GENERATORS
DescriptionAlgorithms and constructing schemes of trusted pseudorandom number generators (PRNG) based on multivalued codes of residue number system are presented. An algorithm for numerical control of the operation of arithmetic adder Zm, differing by the introduction of various rules for performing the operation of "forming" of the overflow flag bit and the correction operation of the supervision data adjusting is developed. A scheme for local control of the adder Zm, which differs from the known by introduction of the overflow flag bit generation scheme and accounting scheme of the supervision data adjusting is constructed. End-to-end monitoring scheme of modular adder control and key storage device (KSD) for holding the crypto key with residual class code is constructed. The proposed scheme differs from the known by additional memory page, overflow flag bit generation scheme and by accounting scheme of the supervision data adjusting. The results of a comparative evaluation of the developed pattern for local and end-to-end monitoring of modular adder control with hardware redundancy are provided. Based on the results of the comparative evaluation it is expedient to use the modular control method in order to increase the reliability of the PRNG. At the same time, the developed algorithms and end-to-end monitoring schemes ensure elimination of the fracture areas in the control and expansion of fragments of the local (intermediate) PRNG control with minimal hardware and time redundancy. Application field of the developed algorithms and control schemes are digital devices with cryptographic functions
-
DESING OF AUTOMATED SYSTEMS IN SECURED EXECUTION OF MILITARY USE
DescriptionIn the work we have developed a structural modeling of the optimal choice of information security devices in the design of automated systems in the protected execution in the transition to network centric methods of control of troops and weapons
-
QUANTUM DISTRIBUTION SYSTEMS AND PROBLEMS OF THEIR PRACTICAL IMPLEMENTATION
DescriptionThe goal of the study is to analyze the existing quantum distribution systems, their probable applications, as well as the issues with their practical implementation
-
PRESENTATION OF MANDATORY POLICY OF ACCESS CONTROL VIA THE HARRISONRUSSO-WILLIAM’S MODEL
DescriptionThe accepted model of the access control is realized with the monitor of safety in the protected automated information system. Models of safety are considered, as a rule, as a system which is a single whole and has the uniform monitor of safety. Nevertheless, the architecture of the real automated information systems and processes of their functioning can be characterized by distribution. The distributed automated information system consists more than of one local segment representing isolated set of subjects and objects of access. In the distributed system local segments can be realized both on the basis of discretionary, and on the basis of mandatory models of safety (i.e. to be diverse). One of directions of a safety in this case is realization of the general monitor of the safety providing the uniform (coordinated) policy of access control. For safe interaction of patchwork systems it’s necessary to bring them to a single model. Hence, while the integration of information systems the problem of their interaction becomes persistent. Thus in the systems processing the information of a various level of confidentiality, it is necessary to realize mandatory access control. In given clause the mandatory policy of the safety presented by classical model of Bell-LaPadula, is described by the elements of classical model of Harrison-Russo-William. Using the mechanisms of change of a matrix access the opportunity of assignment and change of confidentiality marks is described and the observance of safe practices within the limits of mandatory access control is analyzed. The safety of application of the given approach has been proved. The perspective direction of research has been defined
-
Description
The goal of the study is to research time characteristics of pseudo-noise sequence acquisition method for multicarrier communication systems of MC-DSCDMA, that allows low hardware requirements and able to operate in low quality channels. The way of achieving this lies in using a mathematical model of algorithm. The achieved results show suitability of MC-DS-CDMA-signals optimization for pseudo-noise sequence acquisition efficiency increase. The achieved results can be applied in MC-DS-CDMA communication systems development
-
Description
In this article we consider the usage of HRU access matrix changing system allowing for information security system which makes mandatory access control in case of information security analysis by using an automatic classification of formalized documents in the system of electronic document management
-
Description
In the article, we present the mathematical model of referring documents entering the automated system to the spheres of users responsibility. The possibility of application of mathematical apparatus of final predicates algebra as a basic means of model description is proved