Shtemenko High Military School (Military Institute)
Author list of organization
List of articles written by the authors of the organization
-
Description
In the article, we present the mathematical model of referring documents entering the automated system to the spheres of users responsibility. The possibility of application of mathematical apparatus of final predicates algebra as a basic means of model description is proved
-
ERROR CHECK IN OPERATING CRYPTOGRAPHICALLY SECURE PSEUDORANDOM NUMBER GENERATORS
DescriptionAlgorithms and constructing schemes of trusted pseudorandom number generators (PRNG) based on multivalued codes of residue number system are presented. An algorithm for numerical control of the operation of arithmetic adder Zm, differing by the introduction of various rules for performing the operation of "forming" of the overflow flag bit and the correction operation of the supervision data adjusting is developed. A scheme for local control of the adder Zm, which differs from the known by introduction of the overflow flag bit generation scheme and accounting scheme of the supervision data adjusting is constructed. End-to-end monitoring scheme of modular adder control and key storage device (KSD) for holding the crypto key with residual class code is constructed. The proposed scheme differs from the known by additional memory page, overflow flag bit generation scheme and by accounting scheme of the supervision data adjusting. The results of a comparative evaluation of the developed pattern for local and end-to-end monitoring of modular adder control with hardware redundancy are provided. Based on the results of the comparative evaluation it is expedient to use the modular control method in order to increase the reliability of the PRNG. At the same time, the developed algorithms and end-to-end monitoring schemes ensure elimination of the fracture areas in the control and expansion of fragments of the local (intermediate) PRNG control with minimal hardware and time redundancy. Application field of the developed algorithms and control schemes are digital devices with cryptographic functions
-
QUANTUM DISTRIBUTION SYSTEMS: PHYSICAL BASES, PROTOCOLS, OPPORTUNITIES OF THEIR IMPLEMENTATION
DescriptionThe aim of the article is to analyze existing quantum distribution systems, their facilities, physical bases of quantum objects behavior used in quantum distribution systems and protocols of quantum keys distribution
-
Description
The goal of the study is to research time characteristics of pseudo-noise sequence acquisition method for multicarrier communication systems of MC-DSCDMA, that allows low hardware requirements and able to operate in low quality channels. The way of achieving this lies in using a mathematical model of algorithm. The achieved results show suitability of MC-DS-CDMA-signals optimization for pseudo-noise sequence acquisition efficiency increase. The achieved results can be applied in MC-DS-CDMA communication systems development
-
Description
The goal of the study is to research experimentally a pseudo-noise sequence acquisition method for multicarrier communication systems of MC-DSCDMA, that allows low hardware requirements and able to operate in low quality channels. The way of achieving this lies in using a specially developed computer model of algorithm in Simulink. The achieved results have shown high efficiency of the considered acquisition method in contrast to sequential search method. The proposed algorithm can be used in multicarrier systems for acquisition of aperiodic pseudo-noise sequences in wireless public networks and in military communication networks
-
Description
In the given article the mathematical representation analysis of documental reference model of the automated system in the information areas of the actor’s liability is made, which allows to make a conclusion of discretionary access control
-
AUTOMATIC CLASSIFICATION OF FORMAL DOCUMENTS IN ELECTRONIC DOCUMENT MANAGEMENT SYSTEM
DescriptionThis article presents a method for automatic classification of electronic documents, based on the analysis of document metadata with using the final predicates algebra