摘要:
The invention relates to the field of computer engineering and cryptography and, in particular, to methods for implementing linear transformations which operate with a specified speed and require minimum amount of memory, for further usage in devices for cryptographic protection of data. The technical result relates to enabling to select inter-related parameters (performance and required amount of memory) for a particular computing system when implementing a high-dimensional linear transformation. The use of the present method allows to reduce the amount of consumed memory at a given word size of processors employed. To this end, based on a specified linear transformation, a modified linear shift register of Galois-type or Fibonacci-type is generated according to the rules provided in the disclosed method, and the usage thereof enables to obtain the indicated technical result.
摘要:
A method of preventing reuse of digital data packets in a network data transmission system, the method being executed by a system including computers connected via the network data transmission system, the computers sending and receiving messages as a sequence of digital data packets, the method comprising: generating payload data and metadata for each packet to be sent, as well as data for checking integrity of the metadata, the metadata including a serial number of the packet, a sending time of the data packet; sending the packet over the data transmission network; specifying an allowable value of a mismatch time interval; providing, in memory, areas to store a sending time of a last received packet, a serial number of the last received packet, a list of serial numbers of previously received packets; receiving the packet including the payload data and the metadata; checking for reuse of the received packet by checking whether the sending time of the received packer is outside the mismatch time interval and whether the number of the received packet matches the number of the last received packet or numbers in the list of serial numbers of previously received packets; and, based on results of the check, accepting or discarding the packet.
摘要:
The present invention relates to systems for cryptographic protection of information which use keys derived from quantum keys from an associated quantum key distribution (QKD) system, in order to improve security of transmitted information. A system comprises a transmitting node and a receiving node of a single-pass QKD system, and two encryptors connected by a classical communication channel. The one encryptor is further connected to the transmitting node of the QKD system by a 1st local communication link, and the other encryptor is connected to the receiving node of the QKD system by a 2nd local communication link. A method comprises: generating encryption keys and authentication keys based on quantum keys of a size not less than the one specified in operation of the system; exchanging service data in course of execution of the quantum protocol using the encryption keys and authentication keys, and providing identity of the encryption keys and the authentication keys. The technical result refers to: 1) enhanced security of user data being transmitted; 2) enhanced robustness of the system; 3) reduced cost of manufacturing, deploying, and operating the system by reducing the number of classic communication links; 4) improved strength of quantum keys.
摘要:
The invention relates to the field of computer engineering and cryptography and, in particular, to methods for implementing linear transformations which operate with a specified speed and require minimum amount of memory, for further usage in devices for cryptographic protection of data. The technical result relates to enabling to select inter-related parameters (performance and required amount of memory) for a particular computing system when implementing a high-dimensional linear transformation. The use of the present method allows to reduce the amount of consumed memory at a given word size of processors employed. To this end, based on a specified linear transformation, a modified linear shift register of Galois-type or Fibonacci-type is generated according to the rules provided in the disclosed method, and the usage thereof enables to obtain the indicated technical result.