Article

Article title THE INFORMATION PROTECTION TECHNOLOGY USING NON-POSITIONAL CODES FOR CONTROL SYSTEMS REMOTE OBJECTS
Authors I.A. Kalmykov, T.A. gish, M.I. Kalmykov, D.O. Naumenko, A.V. Dunin
Section SECTION V. CONCEPTUAL AND APPLIED ISSUES OF INFORMATION SECURITY
Month, Year 05, 2015 @en
Index UDC 631.8
DOI
Abstract To ensure the effective operation of the system monitoring framework, monitoring and control of remote ecologically dangerous objects at the present time widely used satellite communication systems. The introduction of the subscriber terminal control of a remote object challenge-response system of identification of the satellite will enable the hardware-software complex to the organization of information exchange to produce the definition of the status of the spacecraft, which is within sight. In this case, the use of the system identify "friend or foe" will decrease down the probability of faults and failures in the functioning of the equipment ecologically dangerous technologies from imposing false governors, coming from alien spacecraft. To improve the EF-performance, the challenge-response system it is proposed to use the Protocol with zero disclosure. However, in the process of communication between the satellite and the object to manage the situation may arise interception, modification and imposing false information. To ensure a high level of protection of information from unauthorized access, it is proposed to use the algorhythm encryption, implemented in polynomial system classes deductions. The aim of this work is to increase cryptotanshinone challenge-response system, which will reduce the probability of imposing false information.

Download PDF

Keywords System identification "friend or foe"; cryptographic authentication protocol; a pseudo-random function; modular algebraic structures; the encryption algorithm; polynomial class system of deductions.
References 1. Tsentr podderzhki operatsiy kompanii Shlyumberzhe [Support center operations Schlumberger]. Available at: http://www.slb.ru/page.php?code=28.
2. http://www.esa.int/Our_Activities/Observing_the_Earth/CryoSat.
3. Gal'kevich A.I., Vladimirov S.O., Dubrovskiy V.M. i dr. Nizkoorbital'naya kosmicheskaya sistema personal'noy sputnikovoy svyazi i peredachi dannykh [Low-orbit space system of personal satellite communication and data transmission], Under ed. A.I. Gal'kevicha. Tambov: OOO «Izd-vo Yulis», 2011, 169 p.
4. Kalmykov I., Katkov K., Naumenko D., Sarkisov A., Makarova A. Parallel Modular Technologies in Digital Signal Processing, Life Science Journal, 2014, No. 11 (11s), pp. 435-438.
5. Katkov K., & Kalmykov I. Application of Parallel Technologies in Navigation Management under the Conditions of Artificial Ionospheric Disturbances, World Applied Sciences Journal, 2013, No. 26 (1), pp. 108-113.
6. Omondi A., & Premkumar B. Residue number systems: theory and implementation. UK: Imperial College Press. 2007.
7. Kalmykov I.A., Dagaeva O.I. Novye tekhnologii zashchity dannykh v elektronnykh kommercheskikh sistemakh na osnove ispol'zovaniya psevdosluchaynoy funktsii [New technologies of e-commerce systems data security based on the usage of pseudorandom function], Izvestiya YuFU. Tekhnicheskie nauki [Izvestiya SFedU. Engineering Sciences], 2012, No. 12 (137), pp. 218-224.
8. Kalmykov I.A., Dagaeva O.I. Primenenie sistemy ostatochnykh klassov dlya formirova-niya psevdosluchaynoy funktsii povyshennoy effektivnosti [Application of the system of residual classes for the formation of a pseudo-random function with increased efficiency], Vestnik Severo-Kavkazskogo federal'nogo universiteta [Bulletin of the North Caucasian Federal University], 2012, No. 3 (32), pp. 26-31.
9. Camenisch J., Gross T., & Sommer D. Assertion message signatures. Patent US 8 341 416 B2. 2012. December 25.
10. Agbedemnab P.A. and Bankas E.K. A Novel RNS Overflow Detection and Correction Algorithm for the Moduli Set 2n-1, 2n, 2n+1, International Journal of Computer Applications (0975 – 8887). January 2015, Vol. 110, No. 16, pp. 30-34.
11. Chu J., Benaissa M. Error detecting AES using polynomial residue number system, Microprocessor and Microsystems, 2013, No. 37, pp. 228-234.
12. Kalmykov I.A., Pashintsev V.P., Vel'ts O.V., Kalmykov M.I. Metody zashchity peredavae-moy informatsii dlya sistem udalennogo kontrolya i upravleniya vysokotekhnologicheskimi ob"ektami [Methods of protection of the transmitted information systems for remote monitoring and control of technological objects], Vestnik Severo-Kavkazskogo federal'nogo universiteta [Bulletin of the North Caucasian Federal University], 2014, No. 4 (43), pp.38-43.
13. Kalmykov I.A., Sarkisov A.B., Makarova A.V., Kalmykov M.I. Rasshirenie metodov zashchity sistem elektronnoy kommertsii na osnove modulyarnykh algebraicheskikh skhem [Enhanced protection methods of electronic commerce on the basis of modular algebraic scheme], Izvestiya YuFU. Tekhnicheskie nauki [Izvestiya SFedU. Engineering Sciences], 2014, No. 2 (151), pp. 218-225.
14. Kalmykov I.A., Dagaeva O.I., Naumenko D.O., Vel'ts O.V. Sistemnyy podkhod k primene-niyu psevdosluchaynykh funktsiy v sistemakh zashchity informatsii [A systematic approach to the use of pseudo-random functions in the systems of information protection], Vestnik Severo-Kavkazskogo federal'nogo universiteta [Bulletin of the North Caucasian Federal University], 2012, No. 3 (32), pp. 26-34.
15. Wang Q. Compact k-spendable E-cash with Anonymity Control Based Offline TTP, International Journal of Innovative Computing, Information and Control, 2011, No. 7 (1), pp. 459-469.
16. Kalmykov I.A., Kikhtenko O.A., Baril'skaya A.V., Dagaeva O.I. Kriptograficheskaya sis-tema na baze nepozitsionnykh polinomial'nykh algebraicheskikh struktur [A cryptographic system based on non-polynomial algebraic structures], Vestnik Severo-Kavkazskogo federal'nogo universiteta [Bulletin of the North Caucasian Federal University], 2010, No. 2, pp. 51-57.
17. Kalmykov I.A., Chipiga A.F., Kikhtenko O.A., Baril'skaya A.V. Kriptograficheskaya zashchita dannykh v informatsionnykh tekhnologiyakh na baze nepozitsionnykh polinomial'nykh sistem [Cryptographic protection of data in information technology on base nepozicionnyh polynomial systems], Izvestiya YuFU. Tekhnicheskie nauki [Izvestiya SFedU. Engineering Sciences], 2009, No. 11 (100), pp. 210-220.
18. Kalmykov I.A., Chipiga A.A. Algoritm obespecheniya informatsionnoy skrytnosti dlya adaptivnykh sredst peredachi informatsii [Algorithm software information of stealth technology, adaptive means of transmitting information], Infokommunikatsionnye tekhnologii [Infocommunication Technologies], 2007, Vol. 5, No. 3, pp. 159-162.
19. Kalmykov I.A., Kalmykov M.I. Strukturnaya organizatsiya parallel'nogo spetsprotsessora tsifrovoy obrabotki signalov, ispol'zuyushchego modulyarnye kody [Structural organization of parallel special processor for digital signal processing using modular codes], Teoriya i tekhnika radiosvyazi [Theory and Technique of Radio Communication], 2014, No. 2, pp. 60-66.
20. Berezhnoy V.V., Kalmykov, I.A. Chervyakov N.I., Shchelkunova Yu.O., Shilov A.A. Neyrosetevaya realizatsiya v polinomial'noy sisteme klassov vychetov operatsiy TsOS povyshennoy razryadnosti [Neural implementation of a polynomial system classes deductions DSP operations increased bit depth], Neyrokomp'yutery: razrabotka, primenenie [Neurocomputers: development, application], 2004, No. 5-6, pp. 94.
21. Kalmykov I.A., Rezen'kov D.N., Gordenko D.V., Sarkisov A.B. Metody i algoritmy re-konfiguratsii nepozitsionnykh vychislitel'nykh struktur dlya obespecheniya otkazoustoy-chivosti spetsprotsessorov [Methods and algorithms for reconfiguration of non-computational structures for fault tolerance special processor]. Stavropol': Fabula, 2014, 180 p.
22. Barsagaev A.A, Kalmykov M.I. Algoritmy obnaruzheniya i korrektsii oshibok v modulyarnykh polinomial'nykh kodakh [Algorithms for detection and correction of errors in modular polynomial codes], Mezhdunarodnyy zhurnal eksperimental'nogo obrazovaniya [International journal of experimental education], 2014, No. 3-1, pp. 103-107.

Comments are closed.