Article

Article title EFFICIENCY OF VIRTUAL NOISEPROOF CODING
Authors V.V. Kotenko
Section SECTION I. INFORMATION TECHNOLOGIE AND PROTECTION OF INFORMATION
Month, Year 09, 2016 @en
Index UDC 621.39
DOI 10.18522/2311-3103-2016-9-1526
Abstract The analysis of strategic models of information transfer and security from the point of view of the theory of virtualization is carried out. The carried-out analysis showed a possibility of en-hancement of the known decisions by ensuring cryptographic efficiency of coding on the basis of virtualization of information flows. Distinctive feature of virtualization of noiseproof coding is the realized possibility of the complex solution of tasks of noise stability, cryptographic protection and mimic resistance. In case of rather low economic costs it will permit to significantly expand the capabilities of telecommunication systems regarding information security. Virtualization is imple-mented by turning on at the output of coding transformation and the input of decoding transfor-mation the module of information flow virtualization which performs decoding of patterns of initial and virtual information flows, coding of decoding results and time lags in patterns and messages. It provides an optimization of initial transformations of coding and decoding. The efficiency of the complex solution of tasks of information security from the point of view of virtualization of processes of noiseproof coding is experimentally proved herein. The efficiency of cryptographic protection provided with virtual noiseproof codes and influence of virtualization on efficiency of source noiseproof code have been experimentally studied. An efficiency evaluation of cryptographic protection has been performed by application of the approved complex of the NIST STS tests during experimental check of computer model of the virtual coding complex and the aes256-cbc basic cryptographic algorithm. The received results show that the virtual noiseproof coding provides the efficiency of cryptographic protection comparable with the efficiency of modern standards of cryptographic protection, in case of much lower complexity of practical implementation. In the conditions of high quality communication in case of probability of error in the channel of tele-communication 10-4 the virtualization of process of noiseproof coding does not impact on initial properties of noiseproof codes. In the conditions of bad communication quality in case of proba-bility of error in the channel of telecommunication 10-2–10-3 the virtualization of process of noiseproof coding can impact on initial properties of noiseproof codes. In general, the received results of pilot studies show that the virtualization of the noiseproof coding process in the light of the approach proposed herein provides additional capabilities of information security.

Download PDF

Keywords Information security; coding; noiseproof feature; encoding; virtualization; optimization; da-taflow; information safety.
References 1. Kotenko V.V. Teoriya virtualizatsii i zashchita telekommunikatsiy: monografiya [The theory of virtualization and protection of telecommunications: monograph]. Taganrog: Izd-vo TTI YuFU, 2011, 244 p.
2. Kotenko V.V., Rumyantsev K.E. Teoriya informatsii i zashchita telekommunikatsiy: monografiya [Theory of Information and Protection of telecommunications: monograph]. Rostov-on-Don: Izd-vo YuFU, 2009, 369 p.
3. Kotenko V.V. Virtualizatsiya protsessa zashchity nepreryvnoy informatsii otnositel'no usloviy teoreticheskoy nedeshifruemosti [Virtualization continuous data protection process with respect to the theoretical conditions nedeshifruemosti], Informatsionnoe protivodeystvie ugrozam terrorizma [Information counter the threats of terrorism], 2013, No. 20, pp. 140-147.
4. Kotenko V.V., Kotenko S.V. Identifikatsionnyy analiz kriptograficheskikh algoritmov s pozitsiy virtualizatsii identifikatorov [Identification analysis of cryptographic algorithms from the point of virtualization IDs], Izvestiya YuFU. Tekhnicheskie nauki [Izvestiya SFedU. Engineering Sciences], 2015, No. 8 (169), pp. 32-46.
5. Kotenko V.V., Kertiev A.R. Model' algoritma shifrovaniya s virtualizatsiey otsenok [Model of cryptoalgorithm with the virtualization of estimations], Mezhdunarodnyy zhurnal eksperimental'nogo obrazovaniya [The International magazine of experimental education], 2015, No. 8-3, pp. 411-412.
6. Kotenko V.V. Virtualizatsiya zashchity diskretnoy informatsii otnositel'no usloviy neproduktivnosti analiza klyucha [Virtualization protect digital information on the conditions unproductive analysis key], Informatsionnoe protivodeystvie ugrozam terrorizma [Information counter the threats of terrorism], 2011, No. 17, pp. 96-105.
7. Kotenko V.V., Kotenko S.V., Rumyantsev K.E., Gorbenko Yu.I. Strategiya zashchity nepre-ryvnoy informatsii s pozitsiy virtualizatsii ansamblya klyuchey na formal'nye otnosheniya ansambley [Continuous data protection strategy with a key position in the band virtualization formal relations ensembles], Prikladnaya radioelektronika [Applied electronics], 2013, Vol. 12, No. 3, pp. 308.
8. Kotenko S.V., Kotenko V.V. Metodika identifikatsionnogo analiza protsessov pomekhoustoychivogo kodirovaniya pri kodirovanii dlya nepreryvnykh kanalov [Methods of identification analysis of error-correcting coding in encoding processes for continuous channel], Informatsionnoe protivodeystvie ugrozam terrorizma [Information counter the threats of terrorism], 2013, No. 20, pp. 151-157.
9. Kotenko S.V., Pershin I.M., Kotenko V.V. Osobennosti identifikatsionnogo analiza na osnove informatsionnoy virtualizatsii izobrazheniy mestopolozheniya ob"ektov v GIS [Features of identification analysis on the basis of information in the GIS objects virtualization location im-ages], Izvestiya YuFU. Tekhnicheskie nauki [Izvestiya SFedU. Engineering Sciences], 2014, No. 8 (157), pp. 212-219.
10. Kotenko V.V. Informatsionnoe kvantovanie [Information quantization], Informatsionnoe protivodeystvie ugrozam terrorizma [Information counter the threats of terrorism], 2007,
No. 9, pp. 97-99.
11. Kotenko V.V. Informatsionnaya otsenka kachestva svyazi [Information evaluation of the quality of communication], Informatsionnoe protivodeystvie ugrozam terrorizma [Information counter the threats of terrorism], 2007, No. 9, pp. 50-55.
12. Kotenko V.V. Teoremy kodirovaniya dlya diskretnykh kanalov pri peredache informatsii nepreryvnykh istochnikov [Coding theorem for discrete channel with continuous transfer of in-formation sources], Informatsionnoe protivodeystvie ugrozam terrorizma [Information counter the threats of terrorism], 2007, No. 9, pp. 184-187.
13. Kotenko V.V. Teoreticheskoe obosnovanie virtual'nykh otsenok v zashchishchennykh tele-kommunikatsiyakh [The theoretical justification of virtual assessments of protected telecom-munications], Materialy XI Mezhdunarodnoy nauchno-prakticheskoy konferentsii «Informatsionnaya bezopasnost'» [XI International scientific-practical conference "Information Security"]. Part 1. Taganrog: Izd-vo TTI YuFU, 2010, pp. 177-183.
14. Kotenko V.V. Virtualizatsiya protsessa zashchity diskretnoy informatsii [Virtualization is the process of protecting digital information], Aktual'nye voprosy nauki: Materialy II Mezhdunarodnoy nauchno-prakticheskoy konferentsii [Actual questions of science: Proceedings of the II International Scientific and Practical conference]. Moscow: Izd-vo Sputnik, 2011, pp. 36-40.
15. Kotenko V.V. Strategiya primeneniya teorii virtualizatsii informatsionnykh potokov pri reshenii zadach informatsionnoy bezopasnosti [The strategy of applying the theory of the virtualization of information flows for solving information security], Izvestiya YuFU. Tekhnicheskie nauki [Izvestiya SFedU. Engineering Sciences], 2007, No. 1 (76), pp. 26-37.
16. Kotenko V.V., Polikarpov S.V. Strategiya formirovaniya virtual'nykh vyborochnykh prostranstv ansambley klyucha pri reshenii zadach zashchity informatsii [The strategy of forming virtual sample spaces ensembles key in solving the problems of information security], Voprosy zashchity informatsii [Problems of information security], 2002, No. 2, pp. 47-51.
17. Kotenko V.V., Rumyantsev K.E., Polikarpov S.V. Novyy podkhod k otsenke effektivnosti sposobov shifrovaniya s pozitsiy teorii informatsii [A new approach to assessing the effective-ness of encryption methods from the standpoint of information theory], Voprosy zashchity informatsii [Questions of information security], 2004, No. 1, pp. 16-22.
18. Kotenko V.V., Rumyantsev K.E., Yukhanov Yu.V., Evseev A.S. Tekhnologii virtualizatsii protsessov zashchity informatsii v komp'yuternykh setyakh [Virtualization technologies of in-formation security processes in computer networks], Vestnik komp'yuternykh i in-formatsionnykh tekhnologiy [Herald of computer and information technologies], 2007, No. 9 (39), pp. 46-56.
19. Kotenko V.V. Strategiya primeneniya teorii virtualizatsii informatsionnykh potokov pri reshenii zadach informatsionnoy bezopasnosti [The strategy of applying the theory of the virtualization of information flows for solving information security], Sbornik trudov IX Mezhdunarodnoy nauchno-prakticheskoy konferentsii «Informatsionnaya bezopasnost'» [Proceedings of the IX International scientific-practical conference "Information Security"]. Taganrog, 2007, pp. 68-73.
20. Kotenko V.V., Rumyantsev K.E., Polikarpov S.V. Sposob shifrovaniya dvoichnoy informatsii [A method of encrypting binary data]. Patent for the invention No. 2260916 Russian Federation. Published: 20.09.2005, Bull. No. 26, pp. 1-3.
21. Kotenko V.V. Otsenka informatsionnogo obraza issleduemogo ob"ekta s pozitsiy teorii virtual'nogo poznaniya [Evaluation of the information of the image of the object from the point of virtual knowledge theory], Izvestiya TRTU [Izvestiya TSURE], 2006, No. 4 (48), pp. 42-48.
22. Kotenko V.V., Rumyantsev K.E., Polikarpov S.V., Levendyan I.B. Komp'yuternaya tekhnologiya virtual'nogo shifrovaniya [Virtual Computer encryption technology], Sovremennye naukoemkie tekhnologii [Modern high technologies], 2004, No. 2, pp. 42.
23. Kotenko V.V. Information resources protection in position of information protection process virtualization with absolute uncertainty of the source, Technical and natural sciences: Theory and practice. Proceedings of materials of international scientific e-Symposium. Russia, Mos-cow, 27-28 March 2015. Kirov, 2015, pp. 73-90.
24. Kotenko S.V. Kotenko V.V. Rumyantsev K.E. Evaluation of auricular-diagnostic identification topology effectiveness, Technical and natural sciences: Theory and practice. Proceedings of materials of international scientific e-Symposium. Russia, Moscow, 27-28 March 2015. Kirov, 2015, pp. 91-107.
25. Khovanskova V., Khovanskov S. Multiagent systems: security concepts, Technical and natural sciences: Theory and practice. Proceedings of materials of international scientific e-Symposium. Russia, Moscow, 27-28 March 2015. Kirov, 2015, pp. 167-175.
26. Khovanskov S.A., Norkin O.R., Parfenova, S.S. Khovanskova V.S. Algoritmicheskoe obes-pechenie raspredelennykh vychisleniy s ispol'zovaniem ierarkhicheskoy vychislitel'noy struktury [Algorithmic support distributed computing using hierarchical computing structure], Informatizatsiya i svyaz' [Informatization and Communication], 2014, No. 2 (156), pp. 71-75.
27. Kotenko V.V., Kotenko S.V., Ermolaev A.Yu., Krutakov Yu.B. Printsipy identifikatsi-onnogo analiza kriptograficheskikh algoritmov s pozitsiy informatsionnykh identifikatorov protsessa shifrovaniya [Principles of identification analysis of cryptographic algorithms from the position information of the encryption process identifiers], Informatsionnoe protivodeystvie ugrozam terrorizma [Information counter terrorism threats], 2014, No. 23, pp. 328-332.
28. Kotenko V.V., Rumyantsev K.E., Polikarpov S.V., Levendyan I.B. Shifrovanie na osnove mnogomernogo predstavleniya virtual'nykh vyborochnykh prostranstv ansambley klyucha [Encryption is based on a multi-dimensional representation of a virtual sample spaces key ensembles], Fundamental'nye issledovaniya [Basic research], 2004, No. 5, pp. 97.
29. Kotenko V.V., Rumyantsev K.E., Kotenko S.V. Metodologiya identifikatsionnogo analiza infokommunikatsionnykh sistem: monografiya [Methodology of identification analysis of communication systems: monograph]. Rostov-on-Don: Izd-vo YuFU, 2014, 226 p.

Comments are closed.