Abstract
In order to increase the reliability of legal data and for the proper operation of the hardware and software systems, it is necessary that the hardware component receives data only from the corresponding software. Otherwise, the data received from extraneous programs can lead to errors in the operation of the device or even a complete loss of its functionality or data. In order to identify the challenges of the transfer of blocks, this study focuses on a comprehensive study of the problems arising from the transmission of information in the form of separate data blocks and of the influence of the number of unauthorized blocks on the probability of collisions. In this study, we describe a method for distinguishing legal software data from data sent by unauthorized software sources. The analysis of the methods of reducing the probability of errors occurring at the receiver is done through the use of a buffer to store and a set of mathematical equations. The same way the analysis of the methods of possibility of reducing the reception of the unauthorized blocks when receiving individual blocks of information is done as well. Finally, we measure the extent of the effect of intensity of receiving unauthorized blocks and hash field length.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Babich, N.P., Zhukov, I.A.: Osnovy cifrovoj skhemotekhniki (The basics of Digital Circuit), p. 480. DMK Press (2007)
Sumathi, R.: A Secure data transfer mechanism using single-handed re-encryption technique. In: International Conference on Emerging Trends in Science, Engineering and Technology, pp. 1–9 (2012)
Hao, P., Shi, Q.: Matrix factorizations for reversible integer mapping. IEEE Trans. Signal Process. 49, 2314–2324 (2001)
Group PCI special interest PCI express base specification revision 3.0 (2019). https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.694.7081&rep=rep1&type=pdf. Accessed 5 Sept 2019
Ivanov, M.A.: Krptograficheskie metody zashchity informacii v komp'yuternyh sistemah i setyah (Cryptographic Methods of Security Information in Computer Systems and Networks), p. 400. MEPhI, Moscow (2012)
Bellare, M., Kiliany, J., Rogawayz, P.: The security of the cipher block chaining message authentication code. J. Comput. Syst. Sci. 61, 362–399 (2000)
Tanygin, M.O., Tipikin, A.P.: Aphitektupa sistemy apparatnogo ogranicheniya dostupa k informacii na zhestkom diske EVM (System architecture for hardware restriction of access to information on a computer hard disk). Telecommunications 3, 44–46 (2006)
Tanygin, M.O., Alshaeaa, H.Y., Altukhova, V.A.: Establishing trusted channel for data exchange between source and receiver by modified one-time password method. In: International Russian Automation Conference, Sochi, Russian Federation, p. 8867590 (2019)
Black, J.: Authenticated Encryption. Encyclopedia of Cryptography and Security. Springer, Tilborg (2005)
Marukhlenko, A.L., Plugatarev, A.V., Bobyntsev, D.O.: Complex evaluation of information security of an object with the application of a mathematical model for calculation of risk indicators. In: Lecture Notes in Electrical Engineering, pp. 641–778 (2020). https://doi.org/10.1007/978-3-030-39225-3_84
Tanygin, M.O., Tipikin, A.P.: Methods of authentication of information protection systems and controlling software. Telecommun. Radio Eng. 66, 453–463 (2007)
Tanygin, M.O.: Method of control of data transmitted between software and hardware. Computer science and engineering. In: Materials of the IV International Conference of Young Scientists, CSE-2010, pp. 344–345. Publishing House of Polytechnics, Lviv (2010)
Tanygin, M.O., Alshaeaa, H.Y., Altukhova, V.A.: Ob odnom metode kontrolya celostnosti peredavaemoj poblokovo informacii (A Method of control the Integrity of transmitted blocks information). Telecommunications 3, 12–21 (2019)
Tanygin, M.O., Alshaeaa, H.Y., Efremov, M.A.: Analysis of the secure data transmission system parameters. Lect. Notes Electr. Eng. 641, 675–683 (2019). https://doi.org/10.1007/978-3-030-39225-3_74
Tanygin, M.O., Alshaeaa, H.Y., Berlizeva, A.V.: Algoritm obratimyh preobrazovaniya dlya kontrolya autentichnosti paketov v setyah s nizkoj propusknoj sposobnost'yu (Reversible transformation algorithm for the control of the authenticity of packets in networks in low-bandwidth networks). In: Information and Space Technologies: State, Problems and Solutions, Collection of Scientific Articles Based on the Materials of the III all-Russian Scientific and Practical Conference, Kursk, pp. 169–173 (2019)
Spevakov, A.G., Tanygin, M.O., Panishev, V.S.: Informacionnaya bezopasnost' (Information security). Southwest State University, Kursk, p. 196 (2017)
Tanygin, M.O.: Obnaruzhenie pri programmnom upravlenii rabotoj ustrojstva komand, vydannyh postoronnimi programmami (Detection of commands issued by extraneous programs in software control of the device). Optoelectronic devices and devices in image recognition, image processing and character information systems. In: Proceedings of the 7th International conference, pp. 202–203 (2005)
Tanygin, M.O.: Raschyot veroyatnosti vozniknoveniya kollizij pri ispol'zovanii algoritma kontrolya podlinnosti soobshchenij (Calculation of the probability of collisions when using the algorithm for controlling the authenticity of messages). News Southwest State Univ. Ser. Manage. Comput. Eng. Inform. 2, 179–182 (2012)
Tanygin, M.O., Alshaeaa, H.Y., Kuleshova, E.A.: A method of the transmitted blocks information integrity control. Radio Electron. Comput. Sci. Control 1, 181–189 (2010)
Tanygin, M.O., Kuleshova, E., Marukhlenko, A.: Formation of unique characteristics of hiding and encoding of data blocks based on the fragmented identifier of information processed by cellular automata computers 9(2), 51 (2020). https://doi.org/10.3390/computers9020051
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Tanygin, M.O., Dobritsa, V.P., Alshaeaa, H.Y. (2021). Study of the Influence of the Unauthorized Blocks Number on the Collision Probability. In: Radionov, A.A., Gasiyarov, V.R. (eds) Advances in Automation II. RusAutoCon 2020. Lecture Notes in Electrical Engineering, vol 729. Springer, Cham. https://doi.org/10.1007/978-3-030-71119-1_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-71119-1_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-71118-4
Online ISBN: 978-3-030-71119-1
eBook Packages: EngineeringEngineering (R0)