FIELD: engineering of technical means for complex protection of information during its storage and transfer.
SUBSTANCE: method for complex information protection is realized in following order: prior to transfer into communication channel or prior to recording into memory, state of used communication channel or information storage environment is analyzed, from M possible codes parameters of optimal (n,k) code for current status of channel or information storage end are determined, information subject to protection is split on q-nary symbols l bits long (q=2l) for each q-nary system gamma combinations l bits long are formed independently from information source, for each set of k informational q-nary symbols (n-k) excessive q-nary symbols are formed in accordance to rules of source binary (n,k) code, each q-nary symbol is subjected to encrypting stochastic transformation with participation of gamma, after receipt from communication channel or after reading from memory for each q-nary symbol combination of gamma with length l is generated, synchronously with transferring side, reverse stochastic decrypting transformation is performed for each q-nary symbol with participation of gamma, by means of checking expressions of source binary code localized are correctly read from memory or received q-nary symbols, untrustworthily localized symbols are deleted, integrity of message is restored by correcting non-localized and erased q-nary symbols of each block, expressing their values through values of trustworthily localized or already corrected q-nary symbols, if trustworthy restoration of integrity of code block is impossible it is deleted, number of deleted blocks is counted, optimality is determined within observation interval of used code with correction of errors for current state of channel, if code optimum criterion exceeds given minimal and maximal limits, code is replaced with optimal code synchronously at transferring and receiving parts of channel in accordance to maximum transfer speed criterion.
EFFECT: efficiency of each protection type and increased quality of maintenance of guaranteed characteristics of informational system.
18 cl
Title | Year | Author | Number |
---|---|---|---|
METHOD OF TRANSMISSION AND COMPLEX PROTECTION OF INFORMATION | 2007 |
|
RU2367007C2 |
METHOD FOR ADAPTIVE INFORMATION TRANSFER | 2004 |
|
RU2264647C1 |
UNIVERSAL METHOD FOR TRANSMITTING INFORMATION WITH CONTROLLABLE PARAMETERS | 2006 |
|
RU2319199C2 |
DEVICE FOR CORRECTING ERRORS IN MEMORY BLOCKS | 0 |
|
SU1086460A1 |
DEVICE FOR RECEIVING DISCRETE INFORMATION WITH ERROR CORRECTION | 0 |
|
SU919119A1 |
METHOD FOR BLOCK ENCRYPTION OF INFORMATION | 2004 |
|
RU2266622C1 |
RANDOM NUMBERS GENERATION METHOD | 2003 |
|
RU2246129C2 |
DATA TRANSMISSION SYSTEM THROUGH FEEDBACK CHANNELS | 0 |
|
SU966923A1 |
DEVICE FOR CORRECTING ERROR PACKETS | 0 |
|
SU794756A1 |
METHOD OF DATA CONVERSION | 2003 |
|
RU2254685C2 |
Authors
Dates
2007-01-20—Published
2005-05-11—Filed