//Росатом/ ВНИИЭФ
 
Главная / Publishing activities /Proceedings of the RFNC-VNIIEF /Vol. 17/2012 /

Vol. 17/2012

SECTION 10


Research of Decentralized Algorithms Transformation for the Purpose of Increase of Management Contour Security of Automated Systems

A. P. Martynov, D. B. Nikolaev, A. G. Silaev

Two improved updating decentralized algorithms of transformation on the basis of algorithm RSA are offered. It is spent their comparisons with cryptographic characteristics of algorithm RSA. The analysis of the possible influences based on wrong use of algorithm, and also the influences using a factorization method of the basis transformation parameters is made.


Pulse Code Relays

S. N. Goncharov, O. A. Zherdin, A. P. Martynov, G. I. Shishkin

The technical decisions of pulse code relays, forming a target signal only after receipt of certain quantity of pulses on certain inputs in certain sequence, are submitted. The degree of their security from unauthorized inclusion is considered.


Formation of Offers for Construction of Set Class Block Converters

N. A. Zaharova, D. B. Nikolaev, V. N. Fomchenko

Тhe development of  technique experimental check of stability transformation is based on an existing statistical material. The technique allows to estimate transformation properties. Research of maintenance of protection questions and analysis of cryptographic characteristics is carried out by the example of the set class of block transformations.


Stochastic Coding Such as Element of the Data Safety Method

I. A. Nemchenko, D. B. Nikolaev, A. P. Martynov

Researches of stochastic security method are carried out. Properties of stochastic generation algorithm of random numbers are analyzed. The possibility of practical realization of transformation system with the properties which are coming nearer to absolute privacy is shown.


Оptimization Algorithm of Security System Designing

N. A. Zaharova, D. B. Nikolaev, E. P. Pogodin, V. N. Fomchenko

System classification of security information models is carried out. Approaches of construction of security systems are offered and system classifications of information threats are developed. Process of creation of optimum security information systems is structured.

 

SECTION 11


Construction of Adapted Hardware-Software Complex for Functional Control of Electronic Devices

I. A. Nemchenko, S. N. Goncharov, V. B. Medvedev, A. V. Novikov

The hardware-software complex intended for carrying out of electronic devices checks, such as availability or absence of electric circuit, the control of facilities of connectio/switching-off power circuit of the tested device and check of parameters of switched circuits is submitted.


Development of Directory System for Estimation of Radiating Stability of Radio-Electronic Equipment

G. I. Balkovaja, E. V. Burenkova, M. K. Smirnov

The principles of designing of directory system containing all volume of the radiating stability information, necessary for development radio-electronic equipment are stated. This system provides reception of information in the set form, excludes mistakes at formation of accounting and help documents.


Dynamically Adapted Model of Complex Systems Management

I. A. Nemchenko, D. B. Nikolaev, V. N. Fomchenko

Results of modelling of dynamically adapted control system based on a neural network are submitted. The developed model provides a noise stability and functional reliability in conditions of uncertainty, high efficiency and reliability of information processing.



Pages: | 1 | 2 | 3 | 4

 
© 2012-2025 FSUE RFNC - VNIIEF
607188
Sarov, Nizhny Novgorod region, Muzrukov Ave, 10
Tel.: 8 (83130) 2-05-95
Fax: 8 (83130) 2-14-35
E-mail: press@vniief.ru