FIELD: computer science.
SUBSTANCE: system has center of certification, forming and distribution of keys, at least one user device and at least one distributed data processing server. Method describes operation of said system. Subsystem for forming open keys contains memory block for tables of secret substitutions of columns and rows of secret keys tables, memory block for table of symmetric substitution of columns and rows of external key table, register for sequence of transitive connection between rows of secret substitutions tables, block for logical output on sequence of transitive dependence, memory block for table of relative non-secret substitution of columns and rows of external key table, open key register, input commutation block and control block.
EFFECT: higher efficiency, broader functional capabilities.
5 cl, 15 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR STEGANOGRAPHICAL CLOAKING OF INFORMATION | 2008 |
|
RU2374770C1 |
DEVICE PROTECTING AGAINST UNAUTHORISED ACCESS TO INFORMATION | 2007 |
|
RU2334272C1 |
METHOD OF HIDDEN TRANSFER OF CODED INFORMATION ALONG MULTIPLE COMMUNICATION CHANNELS | 2011 |
|
RU2462825C1 |
METHOD FOR COMPLEX PROTECTION OF INFORMATION PROCESSING IN COMPUTER AGAINST UNAUTHORIZED ACS, INSPECTION BOOKMARKS AND VIRUSES | 1998 |
|
RU2137185C1 |
METHOD FOR SYNTHESIS OF SELF-TEACHING SYSTEM FOR EXTRACTING KNOWLEDGE FROM TEXT DOCUMENTS FOR SEARCH ENGINES | 2002 |
|
RU2273879C2 |
METHOD OF CODING BY ADAPTIVE METHOD OF MULTIALPHABETICAL REPLACEMENT | 2010 |
|
RU2469484C2 |
HOMOMORPHOUS ENCRYPTION FOR AUTHENTICATION USING PASSWORD | 2018 |
|
RU2774807C2 |
INFORMATION PROTECTION METHOD | 2017 |
|
RU2648598C1 |
METHOD AND DEVICE FOR PROTECTING DATA TRANSMITTED USING BLOCK SEPARABLE CODES FROM INTRUDER IMITATING ACTIONS | 2019 |
|
RU2738789C1 |
METHODS FOR SAFE GENERATION OF CRYPTOGRAMS | 2015 |
|
RU2710897C2 |
Authors
Dates
2005-08-27—Published
2001-07-05—Filed