Кафедри
Постійне посилання на розділhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/35393
Переглянути
5 результатів
Результати пошуку
Документ The development of the method of multifactor authentication based on hybrid cryptocode constructions on defective codes(2017) Yevseiev, S. P.; Kots, Hryhorii; Minukhin, Sergii; Korol, O. G.; Kholodkova, AnnaThe proposed security mechanisms in hybrid-crypto-code systems, based on Niederreiter and McEliece modified asymmetric crypto-code systems on flawed codes allow further use of the methods of strict two-factor authentication on OTP passwords (OTP based 2FA). To ensure the required security and efficiency in the multi-factor authentication protocol, the McEliece and Niederreiter modified asymmetric crypto-code systems, allowing integrated reliability provision in information transmission on the basis of error-correction coding on elliptic codes are used. The use of the MV2 algorithm ensures an increase in the total entropy of the key and the physical separation of the transmission of the authenticator parts by various mobile/Internet communication channels based on multi-channel cryptography systems on flawed codes. The proposed mathematical models and algorithms for the practical implementation of the Niederreiter and McEliece HCCSFC make it possible to significantly reduce the energy capacity of group operations by reducing the power of the Galois field to GF 24–26 by additional transformations based on the MV2 algorithm, ensuring the required cryptographic strength.Документ Construction of hybrid security systems based on the crypto-code structures and flawed codes(ПП "Технологічний Центр", 2017) Yevseiev, S. P.; Korol, O. G.; Kots, HryhoriiIn order to ensure safety of SCCI, it is proposed to use hybrid crypto-code constructions based on the modified asymmetric crypto-code McEliece systems on flawed codes, which make it possible to obtain maximum quantity of emergent properties at minimal resource cost for initiating in the system the synergistic effect of security provision. The main difference from known approaches to the construction of hybrid cryptosystems is the use of MCCS instead of symmetric cryptosystems; to strengthen resistance and to "reduce" the alphabet power (dimensionality of field GF(26–28) to build the McEliece MCCS), the systems on flawed codes are employed. The algorithms proposed in present work for the formation and decryption of a cryptogram in the hybrid cryptosystem based on MCCS on flawed codes make it possible to practically implement HCCSFC. The study that we conducted into energy consumption of major operations in the hybrid cryptosystems and their stability on the basis of the proposed assessment procedure confirms efficiency of their application in order to provide basic requirements to service quality in IES.Документ Development of McEliece modified asymmetric crypto-code system on elliptic truncated codes(ПП "Технологічний Центр", 2016) Yevseiev, S. P.; Rzayev, Kh.; Korol, O. G.; Imanova, Z.Symmetric and asymmetric cryptographic algorithms, providing the required level of cryptographic strength are generally used to ensure security in modern communication systems, and error-correcting coding techniques - to ensure reliability. The use of asymmetric crypto-code systems enables integrated (with one mechanism) provision of the required levels of reliability, security and efficiency in the processing and transmission of confidential information via open channels of telecommunication systems. The research confirms that their usage provides high performance on the level of symmetric encryption algorithms with BSSH, provable cryptographic strength based on theoretical and complexity problems in arbitrary code decoding (1030 – 1035 group operations are provided), and reliability through the use of a shortened algebra-geometric code (Рош10-9 – 10-12 is provided). A major disadvantage of the use of the McEliece cryptographic system are large amounts of critical data (to provide the required cryptographic strength it is necessary to build a system in the GF (210 – 213). In order to reduce the volume of key data (public key), we propose to use shortened codes, that enables to reduce the GF(26 –28), while maintaining a cryptographic strength level, by introducing the character location entropy at initialization vector.Документ Mécanismes intégrés de sécurité et de fiabilité des données dans les systèmes d'information basés sur la théorie des codes correcteurs d’erreurs(Paris University Press, France, 2014) Yevseiev, S. P.; Sverdlo, Tamara; Korol, O. G.Dans cet article, on s’intéresse à l’étude des moyens cryptographiques de la protection de l'information afin d’assurer la sécurité de la transmission de données dans les systèmes d'information. On réalise ainsi une étude comparative des mécanismes intégrés de sécurité et de fiabilité de la transmission de données basés sur l'utilisation de systèmes de chiffrement asymétrique de McEliece et de Niederreiter basés sur les codes correcteurs d'erreurs m-aires.Документ Peculiarities of calculating stationary heating of windings оperating in complex forced control systems(Національний технічний університет "Харківський політехнічний інститут", 2019) Baida, Ye. I.; Clemens, M.; Klymenko, B. V.; Korol, O. G.; Pantelyat, M. G.; Pustovoitov, P. Ye.General description of the research topic. A technique and an algorithm for calculating the thermal field of electromagnets operating in complex forced systems proposed by authors are considered. The widespread use of such devices in electromechanical switching devices allows not only to increase their speed but also significantly reduce the size, mass and energy losses, which indicates the relevance of this topic. The mathematical model of heating the windings of forced electromagnets proposed by the authors is a system of 1D differential equations of stationary heat transfer in a cylindrical coordinate system, supplemented by equations of electrical and magnetic circuits. This model allows to take into account the ripple of the currents in the windings and the losses in the magnetic core due tothese ripples, contains certain signs of scientific noveltyand represents thegoal of the paper. The algorithm developed by the authors for calculating the thermal field of electromagnets operating in forced control systems is a complex iterative cycle. Its implementation is greatly simplified by using the Maple computing environment which allows to realize complicated and cumbersome mathematical transformations, automates the process of computations, and obtain results of numerical simulation in a convenient tabular and/or graphic form, which indicates the practical significanceof this works. The results of comparison of computation results with experimental data presented in the paper indicate the adequacy of the model and algorithm proposed.