3 research outputs found
ΠΠ΅ΡΠΎΠ΄ ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²ΠΈ S-Π±Π»ΠΎΠΊΡΠ² Π· Π²Π»Π°ΡΡΠΈΠ²ΡΡΡΡ ΠΊΠΎΡΠ΅Π»ΡΡΡΠΉΠ½ΠΎΡ ΡΠΌΡΠ½Π½ΠΎΡΡΡ ΠΊΠΎΠΎΡΠ΄ΠΈΠ½Π°ΡΠ½ΠΈΡ ΡΡΠ½ΠΊΡΡΠΉ
Π ΠΎΠ·Π³Π»ΡΠ΄Π°ΡΡΡΡΡ ΠΌΠ΅ΡΠΎΠ΄ΠΈ ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²ΠΈ ΠΊΠΎΡΠ΅Π»ΡΡΡΠΉΠ½ΠΎ-ΡΠΌΡΠ½Π½ΠΈΡ
Π±ΡΠ»Π΅Π²ΠΈΡ
ΡΡΠ½ΠΊΡΡΠΉ ΡΠ° Π΅Π»Π°ΡΡΠΈΡΠ½ΠΈΡ
ΡΡΠ½ΠΊΡΡΠΉ Π΄Π»Ρ ΡΠΈΠ½ΡΠ΅Π·Π° ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΡΡΠ½ΠΈΡ
Π°Π»Π³ΠΎΡΠΈΡΠΌΡΠ². ΠΠ°ΠΏΡΠΎΠΏΠΎΠ½ΠΎΠ²Π°Π½ΠΎ Π΅Π²ΡΠΈΡΡΠΈΡΠ½ΠΈΠΉ Π°Π»Π³ΠΎΡΠΈΡΠΌ ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²ΠΈ Π·Π±Π°Π»Π°Π½ΡΠΎΠ²Π°Π½ΠΎΡ ΠΊΠΎΡΠ΅Π»ΡΡΡΠΉΠ½ΠΎ-ΡΠΌΡΠ½Π½ΠΎΡ ΡΡΠ½ΠΊΡΡΡ, Π° ΡΠ°ΠΊΠΎΠΆ ΠΌΠ΅ΡΠΎΠ΄ ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²ΠΈ S-Π±Π»ΠΎΠΊΡΠ² Π· Π²Π»Π°ΡΡΠΈΠ²ΡΡΡΡ ΠΊΠΎΡΠ΅Π»ΡΡΡΠΉΠ½ΠΎΡ ΡΠΌΡΠ½Π½ΠΎΡΡΡ ΠΏΠ΅ΡΡΠΎΠ³ΠΎ ΠΏΠΎΡΡΠ΄ΠΊΡ ΠΊΠΎΠΎΡΠ΄ΠΈΠ½Π°ΡΠ½ΠΈΡ
ΡΡΠ½ΠΊΡΡΠΉ.Methods of construction of correlative-immune Boolean functions and resilient functions for synthesis of cryptographic algorithms are regarded. It is proposed heuristic algorithm of construction of
balanced correlative-immune function, and also are proposed methods of construction of S-blocks with property of first-order correlative immunity of the coordinate functions
ΠΡΡΠ½ΠΊΠ° Π·Π°Π³ΡΠΎΠ· Π² ΡΠΎΠ·ΠΏΠΎΠ΄ΡΠ»Π΅Π½ΠΈΡ ΠΌΠ΅ΡΠ΅ΠΆΠ°Ρ
Π ΠΎΠ·Π³Π»ΡΠ΄Π°ΡΡΡΡΡ ΠΏΠΈΡΠ°Π½Π½Ρ Π·Π°Ρ
ΠΈΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ
ΡΠ΅ΡΡΡΡΡΠ² ΠΊΠΎΠΌΡΠ½ΡΠΊΠ°ΡΡΠΉΠ½ΠΎΡ ΠΌΠ΅ΡΠ΅ΠΆΡ Π·Π²βΡΠ·ΠΊΡ
ΡΠΎΠ·ΠΏΠΎΠ΄ΡΠ»Π΅Π½ΠΎΡ ΠΎΠ±ΡΠΈΡΠ»ΡΠ²Π°Π»ΡΠ½ΠΎΡ ΠΌΠ΅ΡΠ΅ΠΆΡ, Π½Π°Π²ΠΎΠ΄ΡΡΡΡΡ Ρ
Π°ΡΠ°ΠΊΡΠ΅ΡΠΈΡΡΠΈΠΊΠΈ ΠΉ ΠΌΠ΅Ρ
Π°Π½ΡΠ·ΠΌΠΈ ΡΠ΅Π°Π»ΡΠ·Π°ΡΡΡ Π·Π°Π³ΡΠΎΠ· Π² ΡΠΎΠ·ΠΏΠΎΠ΄ΡΠ»Π΅Π½ΠΈΡ
ΠΌΠ΅ΡΠ΅ΠΆΠ°Ρ
, Π½Π°Π²ΠΎΠ΄ΠΈΡΡΡΡ ΡΡ
ΠΊΠ»Π°ΡΠΈΡΡΠΊΠ°ΡΡΡ Ρ ΠΏΡΠΎΠΏΠΎΠ½ΡΡΡΡΡΡ ΠΌΠΎΠ΄Π΅Π»Ρ Π·Π°Π³ΡΠΎΠ·.The questions of defense of informative resources of communication network of the distributed computer network are examined, description and mechanisms of realization of threats in the distributed networks is pointed, their classification is pointed and the model of threats is offered