【24h】

Integrated methods of information security in telecommunication systems

机译:电信系统中信息安全的集成方法

获取原文
获取原文并翻译 | 示例

摘要

The importance of the task of countering the means of unauthorized access is to preserve the integrity of restricted access information circulating in computer networks determines the relevance of investigating perspective methods of cryptographic transformations, which are characterized by high speed and reliability of encryption. The methods of information security in the telecommunication system were researched based on integration of encryption processes and noise-immune coding. The method for data encryption based on generic polynomials of cyclic codes, gamut of the dynamic chaos sequence, and timer coding was proposed. The expediency of using timer coding for increasing the cryptographic strength of the encryption system and compensating for the redundancy of the verification elements was substantiated. The method for cryptographic transformation of data based on the gamma sequence was developed, which is formed by combining numbers from different sources of dynamical chaos generators. The efficiency criterion was introduced for the integrated information transformation method.
机译:对抗未经授权的访问手段的任务的重要性是保持计算机网络中流通的受限访问信息的完整性,这决定了研究加密转换的透视方法的相关性,这些方法以加密的高速性和可靠性为特征。基于加密过程和抗噪编码的集成,研究了电信系统中的信息安全方法。提出了一种基于循环码通用多项式,动态混沌域和定时器编码的数据加密方法。证实了使用定时器编码来增加加密系统的加密强度并补偿验证元素的冗余的权宜之计。开发了一种基于伽玛序列的数据密码转换方法,该方法是通过组合来自不同动态混沌发生器来源的数字而形成的。为集成信息转换方法引入了效率准则。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号