Given an achievable upper bound for the degree of distinctness of a connected permutation automaton with a given diameter.
Keywords:STATE MACHINE, THE DEGREE OF DISTINCTIVENESS, THE DIAMETER OF THE MACHINE
Baranov A.P., Baranov P.A.
This paperwork is dedicated to research of k-length CRC value distribution for data interval with volume n. The paperwork examines CRC value distribution’s behavior under conditions of big n’s and fixed values of k (k = const, n ->∞). By means of character theory application we find the conditions of asymptotic unification of CRC distribution. Asymptotic results could be applied for error estimation for various telecommunication protocols (e.g. USB, X.25, HDLC, Bluetooth, Ethernet and others).
Keywords:INFORMATION SECURITY, CRC, ERROR PROBABILITY, UNIFORM DISTRIBUTION, TELECOMMUNICATION PROTOCOLS
Belim S.V., Belim S.Yu.
In article modification of the KDP-scheme of pre-distribution of keys for computer systems with discretionary model of security is considered. Access restriction defines the forbidden transmission channels of information. The scheme of pre-distribution of keys is built in such a way that for the forbidden channels becomes impossible to find a key of information exchange. An example of creation of the offered scheme is reviewed.
Keywords:KDP-SCHEME, PRE-DISTRIBUTION OF KEYS, DISCRETIONARY MODEL OF SECURITY
The peculiarities of bench testing taking into account some difficulties of chip (like “Atmel”) power consumption analysis are considered. It is intended to use for further breaking of hardware-implemented block ciphers based on side attacks.Description of the minimal requested set of devices to solve this problem is presented.Analysis of the most popular cryptographic operations resulting in a leakage through such side channel is given.
Keywords:hardware cipher implementation, secret key, S-box, power consumption, side-channel attacks, differential power analysis (DPA)
Shniperov A.N., Nikitina K.A.
This paper presents a new method of text steganography based on Markov chains. The basic idea of the method is to hide information in the text, that is automatically generated based on a Markov model of the original text. An algorithmic implementation of the developed method is given and the results of tests of created software package, that allows to generate texts within hidden data, are analysed. Generated texts show a good approximation of the natural language.
Keywords:TEXT STEGANOGRAPHY, MARKOV CHAINS, AUTOMATIC GENERATION OF TEXTS, NATURALNESS OF TEXT
The method of key distribution in wireless networks with mobile units based on the MIMO channels is investigated. The description of the method is given. The expressions for estimating of both the correct and wrong decision probability based on the use of a quantization signal phase with guard interval at MIMO channel output are proved. Optimization of system parameters providing the highest key generation rate is investigated under the condition of given probability for shared key coinciding.
Keywords:WIRELESS NETWORK SECURITY, MIMO CHANNELS, KEY DISTRIBUTION
Sukhoparov M.E., Lebedev I.S.
This article provides a method for the implementation of the algorithm of symmetric encryption GOST 28147 - 89 with the use of NVIDIA CUDA technology. Determine the most high-speed version of the system parameters and operation to ensure maximum system performance. Assess the effectiveness of the proposed solutions, as well as a comparative analysis of the approach to existing solutions.
Keywords:SYMMETRIC ENCRYPTION, SECURITY INFORMATION, GRAPHICS PROCESSOR, MULTI-THREADED COMPUTATION.
Azhmuhamedov I.M., Vybornova O.N., Brumshtein U.M.
Method of selecting optimum tactics is suggested for lowering the current information security risk to acceptable level specified by the decision maker is offered. It based on introduction of metric characteristics of acceptable and current risks, as well as algorithms of curve construction for acceptable risk and determination of current information security risk.
Keywords:INFORMATION ASSETS, INFORMATION SECURITY RISKS, RISK-MANAGEMENT, THE COSTS OF RISK REDUCTION, FUZZY CONDITIONS
Sympa is the open source mailing list server. CipherSaber-1 pseudo random number generator is used to secure stored Sympa user credentials. As shown in this article the securing method is vulnerable and the stored password recovery could be done with low computation complexity and moreover parallel computations may be used.
Keywords:RENATER SYMPA, ACCOUNT, STORAGE
Author describes prototype of computing device with non von-Neiman architecture, based on non – classic extremely productive models with global addressed memory and using new technologies of data transmitting operations, new 3D constructives for making efficient IT- defense.
Keywords:VIRTUALIZATION, INFORMATIONAL SECURITY, NON VON-NEIMAN ARCHITECTURE, 3D CONSTRUCTIVES
In this article author illustrates marker scanning as new scientific approach in the field of secured IT-systems developing, describing information system states with semantic patterns as uncontrolled context transisions using variables that resolved on all sets by implementation of procedure languages and non-procedure programming languages.
Keywords:VIRTUALIZATION, INFORMATIONAL SECURITY, NEW GENERATION OPERATION SYSTEM, MARKER SCANNING, EXAFLOPS SUPERCOMPUTERS
Poltavtseva M.A., Lavrova D.S., Pechenkin A.I.
This paper proposes an approach that provides a reduction of large volumes of heterogeneous data from devices of the Internet of Things, based on data aggregation and normalization processes. To reduce data volumes and to increase execution speed aggregation and normalization processes are encouraged to process the data from the device on a multiprocessor cluster. The article describes in detail the approach to this problem in the partition related subtasks, indicating which of them can be performed in parallel. Designed task allocation algorithm between nodes of the cluster and multiprocessor tasks scheduling algorithm on multiprocessor cluster node.
Keywords:INTERNET OF THINGS, AGGREGATION, NORMALIZATION, PLANNING, MULTIPROCESSOR CLUSTER
Zegzhda P.D., Kalinin M.O.
The paper reviews the problem of performance degradation at network traffic protection and processing mechanisms being applied in distributed IT systems. There is discussed the approach of net traffic flows classification and distribution between virtual machines. Based on that model, a high performance security gateway is proposed. This gateway runs on virtualized platform and parallelizes the net traffic processing. This approach increases the speed and reliability of security tools.
Project is financially supported by MinistryofEducationandScienceofRussianFederation, Federal Program "Researching and Development in Priority Directions of Scientific and Technological Sphere in Russia within 2014-2020" (Contract No.14.575.21.0079; June 17, 2014).
Keywords:VIRTUALIZATION, TRAFFIC FLOWS CLASSIFICATION, PARALLEL PROCESSING, PERFORMANCE
Tarasov P.A., Isaev Е.А., Kornilov V.V.
The article discusses the various types of vulnerabilities of wireless sensor networks and classification of attacks on the security of these networks. For each attack demonstrated the possible means of protection and prevention, detection and possible response, and shows the necessity of development and introduction of new high-tech solutions to guarantee the security of wireless sensor networks.
Keywords:WIRELESS SENSOR NETWORKS, WSN, INFORMATION SECURITY, ZIGBEE
Zegzhda D.P., Stepanova T.V., Suprun A.F.
In this paper authors propose a novel approach of calculation the upper and lower boundaries of an index of controllability multi-agent systems, formalized as probability of existence of a way from any node to controlling center is offered, the time of transmission of the message does not exceed a constant t. Controllability - one of properties of this system, defining stability of its functioning. For calculation of boundaries of controllability the regular graph in the form of a tree with the virtual peaks is offered, allowing to apply methods of calculation of number of peaks on a certain circle.
Keywords:MULTI-AGENT SYSTEMS, OPERATING STABILITY, CONTROLLABILITY, MANAGEABILITY, GRAPH THEORY
The paper introduces new approach to security of symbiotic equipment and software Cyber-physic Systems on the basis of homeostasis, i.e. the properties to maintain the system functioning in the hostile environment. Author proposes formal dynamic model based on this approach.
Keywords:CYBER-PHYSIC SYSTEMS, CYBERTHREAT, CYBERSECURITY,HOMEOSTASIS, DYNAMIC MODEL
Ivanov A.I., Gazin A.I., Perfilov K.A., Vyatchanin S.E.
It is shown that presentation of continuous illumination and probability function with small number of examples biometric origin create quantizing noise with a high value of AM andpotency. The statistical test of Smirnov – Kolmogorovrepresents the estimation of maximum modulus value of noise elimination. The statistical criteria of Cramer-vonMizes is quadratic estimator of noise quantization potency. Using such an interpretation, it is possible to eliminate noises of quantization biometric data with the help of using multivariate variant of Cramer-von Mizes statistical criteria. It is believed that Cramer-von Mizes statistical criteria in small number of samples works more effectively, than chi square criteria of Peterson.
Keywords:NOISE ELIMINATION OF QUANTIZATION BIOMETRIC DATA WHILE USING MULTIVARIATE TEST CRAMER–VON MIZES IN SMALL SAMPLES
Zhuravel E.P., Sherstyuk Yu.M.
In article risk of information security on a classification sign of a type of impact on the equipment and control systems of communication networks in the enhanced telecom operations map are considered and the technical solution directed on decrease and/or weakening of their influence for ensuring functioning in the conditions of the incidents connected with threats and/or violations of information security is proposed.
Keywords:CONTROL PLANE; FUNCTIONAL SUPPORT PLANE.
Konoplev A.S., Kalinin M.O.
The paper describes architecture of access control system in distributed computing networks which provides data security against the attacks of user privileges escalation. Comparison of proposed system with analogs is presented. The results of access control system effectiveness estimates are also provided.
Keywords:DISTRIBUTED COMPUTING NETWORKS, GRID SYSTEM, UNAUTHORIZED ACCESS, ACCESS CONTROL, ACCESS CONTROL SYSTEM.
The paper highlights problem of information security in distributed computing networks. Grid system architecture features have been analyzed. Information security threats in distributed computing networks are classified. The existing security arrangements for Grid systems are presented, their disadvantages are admitted. The complex of information security challenges of distributed computing networks is formulized which are aimed to provide defense against the unauthorized access.
Keywords:DISTRIBUTED COMPUTING NETWORKS, GRID SYSTEM, INFORMATION SECURITY, SECURITY THREATS, ACCESS CONTROL POLICY.
Proposed an approach to the construction of the security incident analysis systems for Internet of Things. This approach consists in the consideration of Internet of Things as a self-similar system with its normal functioning. A graph model of the Internet of Things as a cyber physical system, based on the sufficiency of analysis of paired relationships extracted from the digital stream of messages from devices to identify security incidents.
Keywords:INTERNET OF THINGS, SECURITY INCIDENT, DATA ANALYSIS, AGGREGATION, LARGE VOLUMES OF DATA, PAIRED RELATIONS, SELF-SIMILARITY.
Nikonov V.V., Loss V.P., Ross G.V.
This article describes the features of the implementation of the system to identify abnormal network activity. Developed algorithms and software systems to identify abnormal network activity and detect threats.
Keywords:CONTINGENCY NETWORK ACTIVITY, NETWORK THREATS, AGENTS LOG ACTIVITY PROFILE, THE NETWORK NODE CARD SOCKET, THE WINSOCK LIBRARY.
SukhoparovM.E., LebedevI.S., KorzhukV.M., KrivtsovaI.E., PecherkinS.A.
The proposed solution is to use methods that ensure the implementation of preventive measures aimed at increasing the complexity of the implementation of information security threats on a compact device based on PC-104 + form factor. The estimation of the information counter attacks and simulated device status in various modes, and the introduction of additional security features.
Keywords:WIRELESS LINKS, INFORMATION PROTECTION SYSTEM, INFORMATION SECURITY, COUNTERING INFORMATION ATTACKS.
Baranov A.P., Baranov P.A.
A white binary noise information distortion model is proposed in papers  and . In this paperwork we analyze limiting behavior of CRC error probabilities with low values of p, which stands for distortion probability of a single bit that belongs to the information being transferred. Using acquired theoretical results we assess values of error probabilities to claim transferred information packet
Keywords:INFORMATION SECURITY, CRC, ERROR PROBABILITY, LOW DISTORTION LEVEL, TELECOMMUNICATION PROTOCOLS.
Belim S.V., Bogachenko N.F.
The algorithm for distribution of cryptographic keys which is based on the hierarchical structure of objects in the system is presented in this article. The substantiation of the algorithm for certain types of the objects hierarchy is given. The mechanism of the setting of the mandatory and discretionary access control using the developed algorithm is suggested.
Keywords:CRYPTOGRAPHIC KEYS DISTRIBUTION, OBJECT HIERARCHY, HASH FUNCTION, ACCESS CONTROL.
Sumkin K.S., Loss V.P., Ross G.V.
Keywords:IDENTIFICATION AND AUTHENTICATION OF USERS, CLUSTERING, FUZZY SETS, FUZZY RELATIONAL DATA MODEL, THE MEMBERSHIP FUNCTION.
Investigation of hardware implemented block cipher based on Feistel structure is considered. It is shown that such cipher can be easily broken in real time even for very long key length. The most vulnerable to such attack operations within encryption algorithm are found. The main approaches are presented that simplify the way to break any hardware implemented cipher if it does not have special protection.
Keywords:SECRET KEY, ALGORITHM DES, DPA, SPA ATTACKS, S-BOXES, POWER ATTACKS, SIDE-CHANNEL ATTACKS, DIFFERENTIAL POWER ANALYSIS.
The article describes questions of heuristic malware detection based on hidden markov models application to reduce risk of malware infection.
Keywords:ANTIVIRUS TOOLS, HIDDEN MARKOV MODELS, MALWARE.
P. D. Zegzhda, D. P. Zegzhda, A. I. Pechenkin, M. A. Poltavtseva
Предложенная графовая модель для решения задачи управления безопасностью информационных систем включает моделирование атак различного рода на информационные системы. Выбран оптимальный способ размещения средств контроля доступа к данным и дана количественная оценка защищенности конкретных узлов системы.
Keywords:security assessment, information systems security, modeling systems, computer systems security, information security tools.
Volkova V.N., Chernyy Yu.Yu.
It is proposed to study issues of information security on the base the laws of systems theory and to substantiate the importance the takes into account social effects of cyber-space.
Keywords:laws of systems theory, information, information security, cyberspace, systems theory, entropy-negentropy processes.
L. V. Utkin, V. S. Zaborovsky, S. G. Popov
Рассмотрена процедура предварительной обработки данных для контроля информационной безопасности элементов системы роботов, которая использует специальный вид нейронной сети — автокодер для решения двух задач. Первая задача — уменьшение размерности обучающих данных для вычисления расстояния Махаланобиса — одна из лучших метрик для обнаружения аномального поведения роботов или сенсоров в системе роботов. Вторая — применение автокодера для передачи обучения на целевых данных, которые соответствуют экстремальным условиям функционирования системы роботов.
Keywords:multi-robot system, information security control, anomaly detection, autoencoder, Mahalanobis distance, transfer learning, target and source data.
A. S. Zaitsev, A. A. Malyuk
The paper considers classifying models that allow to detect potential insider basing on technical and behavioural indicators under conditions of incomplete information about his behaviour.
Keywords:information security insider threats, data mining, classifying models, CHAID, neural networks, decision trees
Sh. G. Magomedov, T. Yu. Morozova, D. A. Akimov
The paper proposes a procedure for the use of residual classes of systems in the formation of the encryption keys that allows for modification and key exchange without any interaction with the network security system in a continuous mode as needed on the basis of residual classes of systems.
Keywords:residue number system, encryption, information security, computer network
O. V. Trubienko, V. I. Kuznetsov
On the basis of statistical data the EMERCOM of Russia on emergency situation the authors come to the conclusion about the need to create a complex system of intellectual-term monitoring of dynamic objects of industrial facilities and residential buildings. The article describes the composition and operation of the monitor system of complex the monitor.
Keywords:innovation, safety, security complex
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina
Now there is a large number of the directions and of the results of development of artificial intelligence systems. The paper is devoted to the available description of connection of some problems of information security and the opportunities given by data mining.
Keywords:information security, data mining, the distributed information systems
V. G. Anisimov, E. G. Anisimov, D. A. Bazhin, P. D. Zegzhda, A. F. Suprun
The article considers the methodological statements, concerning the creation of models and methods for decision support in the sphere of security monitoring organization for information systems. The designation of monitoring is to neutralize the internal and external impacts leading to occasional or intentional access to stored or processed data, as well as to its damage or distortion.
Keywords:information system, security, risk, monitoring organization, model
D. S. Lavrova
In this paper proposed an ontological model of the subject field of the Internet of Things, which provides a detailed view of the linkages and relationships between the elements of the system at different levels of abstraction, with varying degrees of detail. Designed ontological model allows us to understand the technical aspects of the development of SIEM-system for the identification and analysis of security incidents in the Internet of Things
Keywords:Internet of things, security incident, data analysis, aggregation, large volumes of data, SIEM system, ontology
N. A^. Bazhaev, I. E. Krivtsova, I. S. Lebedev, M. E. Sukhoparov
Considered a wireless network under "broadcast storm" attack, in order to determine the availability of stand-alone units, the ability to carry out their tasks in the functional impact of the information. Identified a number of conditions for the organization of attack by a potential intruder. The analysis of system availability of devices based on wireless technologies.
Proposed model can be used to determine the technical characteristics of a wireless ad hoc network of devices.
Keywords:information security, wireless networks, multi-agent systems, vulnerability, accessibility of devices, information security model
D. V. Ivanov, D. A. Moskvin, A.V. Myasnikov
The article presents results of analyze of user data replication mechanisms. The authors have classified replication mechanisms, have identified its advantages and disadvantages, and have proposed a method that uses NFC technology to establish a secure channel data replication.
Keywords:REPLICATION, USER PROFILE, SECURE CHANNEL, NFC, EMULATION, DATA TRANSFER
N. N. Shenets, I. V. Bulatov
In this work the modular threshold secret sharing schemes are considered, in particular, Shamir’s scheme and general modular scheme in the univariate polynomial ring over Galois field. Different qualitative and numerical properties of such schemes are compared; the problems of its optimal realization are studied.
Keywords:words: modular secret sharing schemes, ideality, perfectness, computational complexity.
E. B. Aleksandrova, E. N. Shkorkina
In cryptographic protocols, being implemented in the systems using resource-constrained devices, hard computations can be outsourced to cloud servers. Light-weight arithmetic operations are carried out on the device. The tripartite key-agreement protocol with two servers in the one-malicious version of two untrusted program model is suggested.
Keywords:Outsourcing algorithm, bilinear pairing, tripartite Diffie–Hellman protocol
D. P. Zegzhda, E. B. Aleksandrova, A. S. Konoplev
The paper reviews the problem of unauthorized access to the data in distributed computing networks. Available implementations of authentication mechanisms in Grid systems are discussed, their disadvantages are considered. The group signature approach is proposed, which exceeds unauthorized access to computing environment and provides integrity of transmitted data.
Keywords:distributed computing networks, Grid system, unauthorized access, authentication, group signature, elliptic curve
Sikarev I.A., Volkova T.A., Galochkin R.N.
The problem of calculating coefficients of mutual difference (CMD) for complex discrete-manipulated signals (DMS) with discontinuous in time structure in terms of (measure of) determining the degree of electromagnetic protection is considered.
Keywords:DISCRETE-MANIPULATED SIGNALS (DMS), SIGNALS WITH DISCONTINUOUS IN TIME STRUCTURE, NARROW-BAND INTERFERENCE, COEFFICIENT OF MUTUAL DIFFERENCE (CMD).
PavlenkoE.Yu., YarmakA.V., MoskvinD.A.
The article presents results of the malware identification problem research in Google Android operating system. To resolve this problem authors have created the system, based on the fuzzy clustering method which use an application parameters vector. This vector is result of the static and dynamic analysis of the application code. The paper describes the application settings that are used for drawing vector features, and also highlights the efficiency of the use of different criteria of separability in relation to the task and given the format of the input data. An experimental evaluation of the proposed system, showing a high level of malware detection for the Google Android operating system.
Keywords:Google Android, security of mobile devices, cluster analysis, machine learning, malware, static analysis, dynamic analysis.
ZegzhdaP.D., MalyshevE.V., PavlenkoE.Y.
In this paper, authors consider the problem of identifying automatically managed accounts (bots) in social networks and propose a method for bots detection based on machine learning methods. The paper describes an example of a method based on artificial neural network training, also were represented parameters of user account in social network for bots detection. An experimental evaluation of the proposed system shows a high degree of bots detection in social networks.
Keywords:information security, social networks, bots in social networks, neural network, bot detection
Kalinin M., Busygin А., Konoplev A.
Annotation:The paper reviews the problem of TLS protocol based applications. It highlights attack scenarios to such applications, using certificate revocation vulnerabilities. There is a comparison of X.509 certificate status verification methods is presented which is applied in conjunction with TLS protocol, their advantages and disadvantages are specified.
Keywords:certificate revocation, TLS protocol, authentication, man-in-the-middle attacks, Grid system, X.509 standard.
M. O. Kalinin, A. A. Minin
This paper reviews security problems in computer networks with dynamic topology (e.g. mesh, MANET, computing grid). There is suggested a method of security threats detection in such networks based on graph modeling
Keywords:network with dynamic topology, mesh, adhoc, sensor network, security, security node, traffic statistics
A. A. Grusho, N. A. Grusho, M. V. Levykin, E. E. Timonina
In the paper the concept of integrated virtualization of information technology and tasks for the purpose of isolation of valuable information from risk hosts is entered. The technology of realization of business processes and in parallel the technology of realization of the principles of isolation for ensuring information security is considered. At a certain stage of realization of business processes the security model and model developed for business process is unified. The resulted model can be implemented with the help of integrated system of virtual computers and the operated information flows.
Keywords:information security, the distributed information systems, virtualization
A. Y. Chernov, A. S. Konoplev
The paper reviews the problem of construction trusted executable environment on modern PC architecture. It shows main features of software execution on different privilege levels. Intel ME architecture has been reviewed. There are Intel ME potential threats highlighted and shown possible ways to solve them.
Keywords:Trusted execution, PC architecture, hypervisor, virtualization, BIOS, Intel ME
Zegzhda D.P., Moskvin D.A., Dakhnovich A.D.
The article presents results of analyze of WiFi network protection mechanisms. The authors propose the access point authentication method, which can be used in various designed networks.
Keywords:WiFi, client protection, access point, wireless client, authentication
D. P. Zegzhda, E. S. Usov, A. V. Nikolsky, E. Y. Pavlenko
In this paper is considered the problem of users’ data confidentiality in cloud systems from attacks by the provider. The system of secure cloud computing using Intel Software Guard Extensions technology (SGX) is also considered. The paper describes Intel SGX technology, the basic concepts and security mechanisms. Possibility of using this technology in the cloud system is shown. An experimental scheme of the proposed system provides data confidentiality for cloud systems users, and provides a method of implementation of the scheme in existing cloud systems.
Keywords:Intel SGX, enclave, cloud systems, data confi dentiality, encryption, hypervisor, protected memory.
D. V. Kostin, O. I. Sheluhin
The objective of this work is to assess the robustness of machine learning based encrypted traffic classification to detect network intrusion. In this work, we have focused on the identification of four types of encrypted traffic: Skype, Tor, PuTTY (SSHv2) and CyberGhost (VPN). In order to classify encrypted traffic five different machine learning algorithms are employed. These are Naive Bayes, C4.5, AdaBoost and Random Forest. We describe a comparison the two methods of traffic classification based on machine learning: generation and analysis of network flows and analysis of each network packet.
Keywords:TRAFFIC CLASSIFICATION, ENCRYPTED TRAFFIC, MACHINE LEARNING, INTRUSION DETECTION SYSTEM.
D. V. Ivanov, D. A. Moskvin, T. D. Ovasapyan
The article describes the approaches to the detection of active network nodes in the IPv6 address space. Two main families of approaches are described: with and without using the initial sample.
Keywords:networks, information security audit, internet, ipv6, network nodes
I. V. Alekseev, V. V. Platonov
Annotation:Method of detecting malware that uses encryption as a disguise. The paper describes the modification of statistical spectral test based on entropy analysis.
Keywords:potential malware detection, cryptоr, statistical tests, entropy.
L. V. Utkin, V. S. Zaborovsky, S. G. Popov
Anomaly detection of the robot system behavior is one of the important components of the information security control. In order to control robots equipped with many sensors it is difficult to apply the well-known Mahalanobis distance which allows us to analyze the current state of the sensors. Therefore, the Siamese neural network is proposed to intellectually support the security control. The Siamese network simplifies the anomaly detection of the robot system and realizes a non-linear analogue of the Mahalanobis distance. This peculiarity allows us to take into account complex data structures received from the robot sensors.
Keywords:multi-robot system; security control; anomaly detection; Siamese neural network; Mahalanobis distance; sensor
Systems that have a complex technical implementation usually contain many vulnerabilities which cannot be found at the development stage. The present paper reviews a method of modeling information systems, which allows formalizing the amount of information obtained by a researcher. Two methods of establishing systems protected from research are presented. One method is related to complicating the algorithms and the other one is related to their multiplication.
Keywords:protection from research, researcher model, indistinguishability, cryptography, block ciphers.
The task of cryptanalysis of methods of cryptography protection with use of new model of optimization methods – the genetic algorithms imitating processes of evolution of wildlife is considered. Application of genetic algorithms for cryptanalysis of the block standard of encoding of AES is described. The block diagram and a information -logical graph-scheme of algorithm, an estimation of necessary minimum number of processors for implementation of algorithm of cryptanalysis, and also some experimental results and the main conclusions are provided.
Keywords:CRYPTANALYSIS, GENETIC ALGORITHM, BLOCK METHODS OF ENCIPHERING, INFORMATION-LOGICAL GRAPH SCHEMЕ, POPULATION OF KEYS, СROSSING-OVER, QUASI-OPTIMUM KEY, INDEPENDENCE MATRIX
Shenets N., Truhina E.
Annotation:In this work the Password Authenticated Connection Establishment (PACE) protocol, wish is used in European smartcard environments, is considered. The modifications of the PACE are proposed. They accelerate the protocol but don’t reflect on its overall security. The new version of PACE is called X‑PACE.
Keywords:password authenticated connection establishment protocol, smartcard security.
R. N. Zharkih, A. A. Kornev
Annotation:Outlines the conceptual aspects of the problems of protection management systems that implement the principle of setecentrizma, characteristic of the era of information confrontation between the conflicting sides. Discusses possible directions of studies based on extensive use of mathematical modeling to enable system positions analyze problematic aspects of control systems. Attention is drawn to the logical dependence of the investigated issues of modern network-centric paradigm of governance. Shows preference for the proposed solutions to the problem as compared to traditional management methods and technologies.
Keywords:data protection, information confrontation, modeling, network-centric technology paradigm real-time management, control system
R. N. Zharkih, A. A. Kornev
Annotation:The paper reviews problems of usage of sensor input panels in secured computer equipment. The challenge is to implement both sufficient screening of device's electronic components, including display as well, and provide usage of the panel at the same time. The article provides survey of different aspects of using existing sensory panels and a possibility of developing an own one, designed in accordance with the formed requirements. Described the concept of building such a panel and technical details obtained with a prototype are given.
Keywords:optical sensor panel, secured input device, information security
Parshutkin A.V., Egin A.V., Zaytsev S.A.
Annotation:This article discusses formation of stray electromagnetic radiation from raster display systems using interfaces data organization exchange standard DVI. Submitted description model of jamming intercept stray electromagnetic radiation optimal receiver.
Keywords:JAMMING, STRAY ELECTROMAGNETIC RADIATION, RASTER DISPLAY SYSTEMS, DVI INTERFACE
Rudy’kh S.V., Sikarev I.A., Galochkin R.N., Kiselevich G.V.
Annotation:The purpose of article is research of questions of fight against the narrow-band hindrances on a range in automated control systems of technical and auxiliary fleet and system of monitoring of navigation signs.
Keywords:INTERNAL WATERWAYS, AUTOMATED IDENTIFICATION SYSTEMS (AIS), ADDITIVE AND MULTIPLICATIVE INTERFERENCE, COEFFICIENT OF MUTUAL DIFFERENCE (CMD)
Anisimov V.G., Anisimov E.G., Zegzhda P.D., Saurenko T.N., Prisyazhnyuk S.P.
Annotation:The article deals the indicators to evaluate the effectiveness of information security system of information interaction in complex distributed organizational management objects and the methods of their determination. The methodology laid stochastic representation of a stream of destructive effects on the process of information interaction between the control elements distributed organizational object.
Keywords:Complex distributed organizational object, information interaction, information security, efficiency, performance
Kucheryavyi M., Storozhik V., Vovenda J.
Annotation:The article considers the security staffing issues in the information field. It focuses on activities FSTEC of Russia in the framework of training in the specialty “Information security”. The article deals with a set of measures for the implementation FSTEC of Russia powers of the center of responsibility for determining the annual admission quotas.
Keywords:information field; security staffing; information security; professional training; responsibility center