Please use this identifier to cite or link to this item: https://er.chdtu.edu.ua/handle/ChSTU/4540
Full metadata record
DC FieldValueLanguage
dc.contributor.authorFaure, Emil-
dc.contributor.authorShcherba, Anatoly-
dc.contributor.authorMakhynko, Mykola-
dc.contributor.authorBazilo, Constantine-
dc.contributor.authorVoronenko, Iryna-
dc.contributor.authorФауре, Еміль Віталійович-
dc.contributor.authorЩерба, Анатолій Іванович-
dc.contributor.authorМахинько, Микола Вікторович-
dc.contributor.authorБазіло, Костянтин Вікторович-
dc.contributor.authorВороненко, Ірина Вікторівна-
dc.date.accessioned2023-09-26T12:06:11Z-
dc.date.available2023-09-26T12:06:11Z-
dc.date.issued2023-
dc.identifier.isbn978-3-031-35087-0-
dc.identifier.issn2198-4182-
dc.identifier.urihttps://link.springer.com/chapter/10.1007/978-3-031-35088-7_7-
dc.identifier.urihttps://er.chdtu.edu.ua/handle/ChSTU/4540-
dc.description.abstractThe study develops a concept for providing secure information interaction that will apply the permutation-based three-pass cryptographic protocol under the conditions of strong noise in the communication channel. The research substantiates the procedure based on majority and correlation processing of fragments received from the communication channel having a length equal to the permutation length to synchronize frames (permutations) under the conditions of strong noise. The findings suggest that reliable permutation transmission under the conditions of strong noise in the data communication channel can be ensured by the method that uses circular bit shifts of another permutation with the maximum value of the minimum Hamming distance to all its circular shifts as symbols for the permutation to be transmitted. Constructing an ensemble of messages (permutations) has been achieved by using affine and projective general linear groups. An algorithm for building and storing ensembles of messages has been developed. This approach enabled generating network and session keys during data exchange in addition to providing the required code distance for permutation codelists (arrays). Further analysis has proved that the proposed codewords generation scheme can also be effectively applied for non-separable factorial data coding, for instance, when providing informational interaction of objects with a dynamically changing structure.uk_UA
dc.language.isoenuk_UA
dc.publisherSpringer, Chamuk_UA
dc.subjectPermutationuk_UA
dc.subjectFactorial codinguk_UA
dc.subjectShort packetuk_UA
dc.subjectPermutation codeuk_UA
dc.subjectFrame synchronizationuk_UA
dc.subjectReliabilityuk_UA
dc.subjectSecurityuk_UA
dc.titleConcept for Using Permutation-Based Three-Pass Cryptographic Protocol in Noisy Channelsuk_UA
dc.typeBook chapteruk_UA
dc.citation.spage99uk_UA
dc.citation.epage113uk_UA
dc.title.bookSystems, Decision and Control in Energy V. Studies in Systems, Decision and Controluk_UA
Appears in Collections:Наукові публікації викладачів (ФІТІС)

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.