Please use this identifier to cite or link to this item:
https://er.chdtu.edu.ua/handle/ChSTU/4540
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Faure, Emil | - |
dc.contributor.author | Shcherba, Anatoly | - |
dc.contributor.author | Makhynko, Mykola | - |
dc.contributor.author | Bazilo, Constantine | - |
dc.contributor.author | Voronenko, Iryna | - |
dc.contributor.author | Фауре, Еміль Віталійович | - |
dc.contributor.author | Щерба, Анатолій Іванович | - |
dc.contributor.author | Махинько, Микола Вікторович | - |
dc.contributor.author | Базіло, Костянтин Вікторович | - |
dc.contributor.author | Вороненко, Ірина Вікторівна | - |
dc.date.accessioned | 2023-09-26T12:06:11Z | - |
dc.date.available | 2023-09-26T12:06:11Z | - |
dc.date.issued | 2023 | - |
dc.identifier.isbn | 978-3-031-35087-0 | - |
dc.identifier.issn | 2198-4182 | - |
dc.identifier.uri | https://link.springer.com/chapter/10.1007/978-3-031-35088-7_7 | - |
dc.identifier.uri | https://er.chdtu.edu.ua/handle/ChSTU/4540 | - |
dc.description.abstract | The study develops a concept for providing secure information interaction that will apply the permutation-based three-pass cryptographic protocol under the conditions of strong noise in the communication channel. The research substantiates the procedure based on majority and correlation processing of fragments received from the communication channel having a length equal to the permutation length to synchronize frames (permutations) under the conditions of strong noise. The findings suggest that reliable permutation transmission under the conditions of strong noise in the data communication channel can be ensured by the method that uses circular bit shifts of another permutation with the maximum value of the minimum Hamming distance to all its circular shifts as symbols for the permutation to be transmitted. Constructing an ensemble of messages (permutations) has been achieved by using affine and projective general linear groups. An algorithm for building and storing ensembles of messages has been developed. This approach enabled generating network and session keys during data exchange in addition to providing the required code distance for permutation codelists (arrays). Further analysis has proved that the proposed codewords generation scheme can also be effectively applied for non-separable factorial data coding, for instance, when providing informational interaction of objects with a dynamically changing structure. | uk_UA |
dc.language.iso | en | uk_UA |
dc.publisher | Springer, Cham | uk_UA |
dc.subject | Permutation | uk_UA |
dc.subject | Factorial coding | uk_UA |
dc.subject | Short packet | uk_UA |
dc.subject | Permutation code | uk_UA |
dc.subject | Frame synchronization | uk_UA |
dc.subject | Reliability | uk_UA |
dc.subject | Security | uk_UA |
dc.title | Concept for Using Permutation-Based Three-Pass Cryptographic Protocol in Noisy Channels | uk_UA |
dc.type | Book chapter | uk_UA |
dc.citation.spage | 99 | uk_UA |
dc.citation.epage | 113 | uk_UA |
dc.title.book | Systems, Decision and Control in Energy V. Studies in Systems, Decision and Control | uk_UA |
Appears in Collections: | Наукові публікації викладачів (ФІТІС) |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.