Article

Article title STRATEGY OF DECISION OF TASKS OF DEFENCE OF INFORMATION FROM POSITIONS OF VIRTUALIZATION OF PROCESSES OF ANTIJAMMING ENCRYPTION
Authors V.V. Kotenko, M.J. Lukin, S.V. Mirgorodsky
Section SECTION I. INFORMATION SECURITY
Month, Year 08, 2015 @en
Index UDC 621.39
DOI
Abstract Original solution of problem of complex decision of tasks of providing of informative safety and antijammingness is offered. From positions of well-known approaches the decision of this problem is not possible because of antagonism of strategic aims of transformation of information at providing of informative safety and providing of antijammingness. Possibility of decision of problem opens approach from positions of theory of virtualization. A research aim is development of strategy of complex decision of tasks of defence of information from positions of virtualization of processes of antijamming encryption. On the basis of theoretical ground of terms of virtualization the synthesis of algorithms and models of encryption optimizing the complex decision of tasks of providing of informative safety and antijammingness in relation to the condition of virtualization comes true. A virtualization will be realized by including of the module of virtualization of dataflow, carrying out decoding of codegrams initial and virtual dataflows, encryption of results of decoding, delays in time of codegrams and reports. It provides optimization of initial transformations of encryption and decoding in part of the opened possibilities of the complex providing of encipherement, authentification, imitozashchity and antijammingness. Computer realization of offer algorithms and models as a programmatic complex allowed to make an experimental analysis offered approach.

Download PDF

Keywords Defense of information; encryption; antijammingness; encipherement; virtualization; optimization; dataflow; informative safety.
References 1. Kotenko V.V. Teoriya virtualizatsii i zashchita telekommunikatsiy: Monografiya [The theory of virtualization and protection of telecommunications: monograph]. Taganrog: Izd-vo TTI YuFU, 2011, 244 p.
2. Kotenko V.V., Rumyantsev K.E. Teoriya informatsii i zashchita telekommunikatsiy: Monografiya [Theory of Information and Protection of telecommunications: Monograph]. Rostov-on-Don: Izd-vo YuFU, 2009, 369 p.
3. Kotenko V.V. Teoreticheskoe obosnovanie virtual'nykh otsenok v zashchishchennykh telekommunikatsiyakh [The theoretical justification of virtual assessments of protected telecommunications], Materialy XI Mezhdunarodnoy nauchno-prakticheskoy konferentsii «Informatsionnaya bezopasnost'» [XI International scientific-practical conference "Information Security"]. Part 1. Taganrog: Izd-vo TTI YuFU, 2010, pp. 177-183.
4. Kotenko V.V. Virtualizatsiya protsessa zashchity diskretnoy informatsii [Virtualization is the process of protecting digital information], Aktual'nye voprosy nauki: Materialy II Mezhdunarodnoy nauchno-prakticheskoy konferentsii [Actual questions of science: Proceedings of the II International Scientific and Practical konferentsii]. Moscow: Izd-vo Sputnik, 2011, pp. 36-40.
5. Kotenko V.V. Strategiya primeneniya teorii virtualizatsii informatsionnykh potokov pri reshenii zadach informatsionnoy bezopasnosti [The strategy of applying the theory of the virtualization of information flows for solving information security], Izvestiya YuFU. Tekhnicheskie nauki [Izvestiya SFedU. Engineering Sciences], 2007, No. 1 (76), pp. 26-37.
6. Kotenko V.V., Polikarpov S.V. Strategiya formirovaniya virtual'nykh vyborochnykh prostranstv ansambley klyucha pri reshenii zadach zashchity informatsii [The strategy of forming virtual sample spaces ensembles key in solving the problems of information security], Voprosy zashchity informatsii [Problems of information security], 2002, No. 2, pp. 47-51.
7. Kotenko V.V., Rumyantsev K.E., Polikarpov S.V. Novyy podkhod k otsenke effektivnosti sposobov shifrovaniya s pozitsiy teorii informatsii [A new approach to assessing the effectiveness of encryption methods from the standpoint of information theory], Voprosy zashchity informatsii [Questions of Information Security], 2004, No. 1, pp. 16-22.
8. Kotenko V.V., Rumyantsev K.E., Yukhanov Yu.V., Evseev A.S. Tekhnologii virtualizatsii protsessov zashchity informatsii v komp'yuternykh setyakh [Virtualization technologies of information security processes in computer networks], Vestnik komp'yuternykh i informatsionnykh tekhnologiy [Herald of Computer and Information Technologies], 2007, No. 9 (39), pp. 46-56.
9. Kotenko V.V. Strategiya primeneniya teorii virtualizatsii informatsionnykh potokov pri reshenii zadach informatsionnoy bezopasnosti [The strategy of applying the theory of the virtualization of information flows for solving information security], Sbornik trudov IX Mezhdunarodnoy nauchno-prakticheskoy konferentsii «Informatsionnaya bezopasnost'» [Proceedings of the IX International scientific-practical conference "Information Security"]. Taganrog, 2007, pp. 68-73.
10. Kotenko V.V., Rumyantsev K.E., Polikarpov S.V. Sposob shifrovaniya dvoichnoy informatsii [A method of encrypting binary data]. Patent RF, No. 2260916, 2005.
11. Kotenko V.V. Otsenka informatsionnogo obraza issleduemogo ob"ekta s pozitsiy teorii virtual'nogo poznaniya [Evaluation of the information of the image of the object from the point of virtual knowledge theory], Izvestiya TRTU [Izvestiya TSURE], 2006, No. 4 (48), pp. 42-48.
12. Kotenko V.V. Virtualizatsiya protsessa zashchity nepreryvnoy informatsii otnositel'no usloviy teoreticheskoy nedeshifruemosti [Virtualization is the process of continuous protection of information concerning the conditions of theoretical nedeshifruemo-sti], Informatsionnoe protivodeystvie ugrozam terrorizma [Information Counter Terrorist Threats], 2013, No. 20, pp. 140-147.
13. Kotenko V.V. Information resources protection in position of information protection process virtualization with absolute uncertainty of the source, Technical and natural sciences: Theory and practice. Proceedings of materials of international scientific e-Symposium. Russia, Moscow, 2728 March 2015. Kirov, 2015, pp. 73-90.
14. Kotenko S.V. Kotenko V.V. Rumyantsev K.E. Evaluation of auricular-diagnostic identification topology effectiveness, Technical and natural sciences: Theory and practice. Proceedings of materials of international scientific e-Symposium. Russia, Moscow, 2728 March 2015. Kirov, 2015, pp. 91-107.
15. Khovanskova V., Khovanskov S. Multiagent systems: security concepts, Technical and natural sciences: Theory and practice. Proceedings of materials of international scientific e-Symposium. Russia, Moscow, 2728 March 2015. Kirov, 2015, pp. 167-175.
16. Khovanskov S.A., Norkin O.R., Parfenova, S.S. Khovanskova V.S. Algoritmicheskoe obespechenie raspredelennykh vychisleniy s ispol'zovaniem ierarkhicheskoy vychislitel'noy struktury [Algorithmic support distributed computing using hierarchical computing structure], Informatizatsiya i svyaz' [Informatization and Communication], 2014, No. 2 (156), pp. 71-75.
17. Kotenko V.V., Kotenko S.V., Ermolaev A.Yu., Krutakov Yu.B. Printsipy identifikatsionnogo analiza kriptograficheskikh algoritmov s pozitsiy informatsionnykh identifikatorov protsessa shifrovaniya [Principles of identification analysis of cryptographic algorithms from the position information of the encryption process identifiers], Informatsionnoe protivodeystvie ugrozam terrorizma [Information Counter Terrorism Threats], 2014, No. 23, pp. 328-332.
18. Kotenko V.V., Pershin I.M., Kotenko S.V. Osobennosti identifikatsionnogo analiza na osnove informatsionnoy virtualizatsii izobrazheniy mestopolozheniya ob"ektov v GIS [Features of the analysis based on the identification information of virtualization image the location of objects in the GIS], Izvestiya YuFU. Tekhnicheskie nauki [Izvestiya SFedU. Engineering Sciences], 2014, No. 8 (157), pp. 212-219.
19. Kotenko V.V., Rumyantsev K.E., Kotenko S.V. Metodologiya identifikatsionnogo analiza infokommunikatsionnykh sistem: Monografiya [Methodology of Identification Analysis of Communication systems: Monograph]. Rostov-on-Don: Izd-vo YuFU, 2014, 226 pp.
20. Kotenko S.V. Virtualizatsiya protsessa zashchity nepreryvnoy informatsii otnositel'no usloviy teoreticheskoy nedeshifruemosti [Virtualization is the process of continuous protection of information concerning the conditions of theoretical nedeshifruemosti], Informatsionnoe protivodeystvie ugrozam terrorizma [Information counter terrorism threats], 2013, No. 20, pp. 152-158.

Comments are closed.