Virtual Immediate Coding

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    A distinctive feature of virtualization of noise-immune encoding is the realized possibility of complex solution of problems of noise immunity, protection against information intrusions and imitating resistance. This, with relatively low economic costs, will significantly expand the capabilities of telecommunications systems in terms of information security. The effectiveness of the complex solution of information protection tasks from the positions of virtualization of the noise-immune encoding processes is experimentally proved in the work. The effectiveness of protection from information intrusions provided by virtual noise-immune codes and the effect of virtualization on the efficiency of the original noise-immune code were experimentally investigated. The obtained results show that virtual noise-resistant coding provides the effectiveness of protection from information intrusions, comparable with the efficiency of modern standards of cryptographic protection, with significantly lower complexity of practical implementation. In general, the results of experimental studies show that the virtualization of the process of noise-immune encoding from the perspective of the approach proposed in [1] opens an additional possibility of protecting information in the part of ensuring information security.

     


  • Keywords


    information security, coding, noise immunity, encryption, virtualization, optimization, information flow, information security.

  • References


      [1] V.V. Kotenko, The theory of virtualization and protection of telecommunications: monograph - Taganrog: Publishing house of the TTI SFU, 2011. P. 244.

      [2] V.V. Kotenko, The effectiveness of virtual noise-immune coding . News of SFedU. Technical science. – 2016. – № 9 (182). – P.15-27.

      [3] V.V. Kotenko, K.E Rumyantsev, Theory of Information and Protection of telecommunications: Monograph. - Rostov-on-Don: Southern Federal University Publishing House, 2009.- P. 369.

      [4] V.V. Kotenko, Virtualization continuous data protection process with respect to the theoretical conditions undecipherability. Information counter the threats of terrorism. 2013. № 20. P. 140-147.

      [5] V.V. Kotenko, S.V. Kotenko, Identification analysis of cryptographic algorithms from the point of virtualization IDs / Proceedings of the SFU. Technical science. 2015. Number 8 (169). P 32-46.

      [6] V.V. Kotenko, A.R. Kertiev, Model of crypto algorithm with the virtualization of estimations / the International magazine of experimental education. 2015. № 8-3. P. 411-412.

      [7] V.V. Kotenko Virtualization continuous data protection process with respect to the theoretical conditions undecipherability / Information counter the threats of terrorism. 2013. № 20. P. 140-147.

      [8] V.V. Kotenko, S.V. Polikarpov, The strategy of forming virtual sample spaces ensembles key in solving the problems of information security. Problems of information security. - 2002. - №2. - P. 47-51.

      [9] V.V. Kotenko, K.E. Rumyantsev, S.V. Polikarpov A new approach to assessing the effectiveness of encryption methods from the standpoint of information theory . Questions of information security. - 2004. - №1.- P.16-22.

      [10] J. Irvine, D. Harle Types of coding. Data Communications and Networks. John Wiley & Sons, 2002. – P 268.

      [11] V.V. Kotenko, K.E. Rumyantsev, Y.V. Yukhanov, A.S. Evseev, Virtualization technologies of information security processes in computer networks // Herald of computer and information technologies: scientific and practical. Zh., Moscow. - 2007. - №9 (39). - P. 46-56.

      [12] V.V. Kotenko The strategy of applying the theory of the virtualization of information flows for solving information security. Proceedings of the IX International scientific-practical conference "Information Security". - Taganrog - 2007. - P. 68-73.

      [13] V.V. Kotenko, K.E. Rumyantsev, S.V. Polikarpov, A method of encrypting binary data // The patent for the invention № 2260916 Russian Federation. Published: 20.09.2005 Bull. №26. P. 1-3

      [14] V.V. Kotenko Evaluation of the information of the image of the object from the point of virtual knowledge theory. News TSURE. - Taganrog: - 2006. - №4 (48). - P. 42-48.

      [15] V.V. Kotenko Virtualization is the process of continuous protection of information concerning the conditions of theoretical undecipherability. Information counter terrorist threats. Scientific-practical zhurnal.-2013.-№20- P. 140-147.

      [16] V.V. Kotenko Information resources protection in position of information protection process virtualization with absolute uncertainty of the source // Technical and natural sciences: Theory and practice. Proceedings of materials of international scientific e-Symposium. Russia, Moscow, 27 - 28 March 2015. - Kirov, 2015. – P. 73 – 90.

      [17] S.V. Kotenko, V.V. Kotenko, K.E. Rumyantsev, Evaluation of auricular-diagnostic identification topology effectiveness // Technical and natural sciences: Theory and practice. Proceedings of materials of international scientific e-Symposium. Russia, Moscow, 27 - 28 March 2015. - Kirov, 2015. – P. 91 – 107.

      [18] S.A. Khovanskov, O.R. Norkin, S.S. Parfenov, V.S. Khovanskova, Algorithmic support distributed computing using hierarchical computing structure // Informatization and Communication. - 2014. - № 2 (156). – P. 71-75.

      [19] V.V. Kotenko, I.M. Pershin, S.V. Kotenko, Features of the analysis based on the identification information of virtualization image the location of objects in the GIS // Proceedings of SFU. Technical science. - 2014. - №8 (157). - P. 212-219.

      [20] V.V. Kotenko, K.E. Rumyantsev, S.V. Kotenko, Methodology of identification analysis of communication systems: monograph. - Rostov-on-Don: Southern Federal University Publishing House, 2014. P 226.

      [21] R. Gallagher Information theory and reliable communication. - Moscow: Soviet radio, 1974. - 720.

      [22] S.V. Kotenko, Virtualization is the process of continuous protection of information concerning the conditions of theoretical nedeshifruemosti. / Information counter terrorism threats. Scientific-practical zhurnal.-2013.-№20- P. 152 -158.

      [23] V.V. Kotenko , K.E. Rumjantsev , S.V. Kotenko . New Approach to Evaluate the Effectiveness of the Audio Information Protection for Determining the Identity of Virtual Speech Images // Proceeding of the Second International Conference on Security of Information and Networks. The Association for Computing Machinery. New York, 2009. – P. 235 –239.

      [24] W.Peterson, E. Weldon Codes correcting mistakes / W. Peterson, E. Weldon / / M .: Mir, 1976. – P 223.

      [25] K. Shannon, Works on the theory of information and cybernetics / K. Shannon - M .: Izd-vo inostr. lit., 1963. – P. 829.

      [26] R.J. McEliece. A Public-Key Criptosystem Based on Algebraic Theory. // DGN Progress Report 42-44, Jet Propulsi on Lab. Pasadena, CA. January – February, 1978. – P. 114-116.

      [27] H. Niederreiter. Knapsack-Type Cryptosystems and Algebraic Coding Theory. // Probl. Control and Inform. Theory. – 1986. – V.15. – P. 19-34.

      [28] D. Кimura. Functional asymmetry of the brain in dichotic listening //Cortex, 1967. —№ 3. —P. 163-178.

      [29] R. Morelos-Zaragoza, The art of noise-immune coding / Morelos-Zaragoza R. Methods, algorithms, application: Trans. with English. - Moscow: Technosphere, 2006. – P. 320.

      [30] V.V. Kotenko Theory of virtualization and protection of telecommunications: monograph / Kotenko VV- Taganrog: Publishing house of TIT SFedU, 2011. – P. 236.

      [31] A.I. Velichkin Transmission of analog messages over digital channels. - Moscow: Radio and Communication, 1983. – P. 284.

      [32] V.V. Kotenko, K.E. Rumyantsev. Information Theory and Protection of Telecommunications: Monograph. - Rostov-on-Don: SFU Publishing House, 2009. – P. 369.

      [33] R.M. Akert, A.T. Panter. Extraversion and the ability to decode nonverbal communication // Per. and individual. Differ. 1988, 9. — l 6. — P. 965-972


 

View

Download

Article ID: 16315
 
DOI: 10.14419/ijet.v7i3.13.16315




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.