Secure Communicating Systems: design, analysis, and implementation
A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.
Подобные документы
The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
??????, добавлен 01.11.2021The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.
?????, добавлен 18.09.2012The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
??????, добавлен 15.04.2024Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
??????, добавлен 14.01.2017Consideration of the safety of autonomous systems and robots. Analysis of threats related to the use of artificial intelligence in autonomous vehicles, robots and other autonomous systems. Information flows in autonomous systems and communications.
??????, добавлен 20.03.2024Standards and the Standardization Process: International, National and Industrial organizations. Cryptographic evaluation bodies. Security Mechanisms and Services. Encryption and Modes of Operation for Block Ciphers. Cryptographic Hash Functions.
?????, добавлен 08.03.2014Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
???????????? ??????, добавлен 17.03.2016- 8. Brute force
Consideration of the state of US policy in the area of private and public encryption of data. An analysis of the legality of the use by the state of private information about their citizens fininsah. The study of features the standard encryption.
?????, добавлен 08.03.2014 The prerequisites for the emergence and formation of areas of computer science that explores the possibilities of electronic encryption devices using large-scale integrated computer circuits. The structure of cryptographic techniques to explore data.
?????, добавлен 08.03.2014Computer security approach. Message authentication codes. Bilinear maps from elliptic curve pairings. Cryptographic hash functions. Method of session key generation. Secure authenticated encryption schemes. An efficient protocol in extended model.
?????, добавлен 08.03.2014Universal design principles. Peculiarities of using multi-sensory systems. Applying speech, non-speech, sound, touch, handwriting and gestures in multi-modal systems. Recognition problems in interactive computer systems. Personal orientation of design.
???????????, добавлен 28.12.2013Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.
??????, добавлен 01.02.2024Features a combination of different approaches to work with sets of objects, their classes to the design and development of artificial intelligence systems to analyze information using object-oriented programming. Determining properties of object class.
??????, добавлен 28.02.2016Arithmetic and number theory in C and C++. The fundamental operations in programs. Modular arithmetic: calculating with residue classes. Addition chains and windows. Cryptographic application of exponentiation. A modern the data encryption standard.
?????, добавлен 08.03.2014Criteria for desirable cryptographic systems and protocols. Security properties for authenticated key establishment. Standard notation of mathematical foundations. Classical ciphers: usefulness and security. The optimal asymmetric encryption padding.
?????, добавлен 13.03.2014Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.
??????, добавлен 22.12.2016- 17. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
??????, добавлен 06.05.2018 Encryption standard adopted by the USA government through a competitive Advanced Encryption Standard. Evaluation algorithms for the various platforms. Cryptographic analysis and its properties. Testing of individual algorithms. Algorithmic version of AES.
?????, добавлен 15.09.2012The article reviews the contemporary land information systems of land management. The current problems of information support for land management are identified. Suggestions how to improve the information systems using technologies are presented.
??????, добавлен 28.09.2016Android operating system security. Analysis and processing of personal data. Ways to overcome security protection. Analysis of existing systems determines the level of danger. Encryption with a public-key. Structure, components of Android applications.
???????????, добавлен 27.01.2015Consideration of methods of information coding. Use of coded pages for the improvement of design objects. Study of the functional purpose of barcode and QR-code. Analysis of the engineering sequence of the artistic and graphic process of code creation.
??????, добавлен 03.07.2023Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
?????, добавлен 08.03.2014Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.
?????, добавлен 08.03.2014The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.
??????, добавлен 10.05.2018Outline of conference proceedings in the field of development of cryptography. The use of Boolean functions in the shift registers with feedback relationship used to encrypt information. Options graphs encoding and selection of programmable design.
?????, добавлен 08.03.2014