Skip to main content

Study of the Influence of the Unauthorized Blocks Number on the Collision Probability

  • Conference paper
  • First Online:
Advances in Automation II (RusAutoCon 2020)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 729))

Included in the following conference series:

  • 477 Accesses

Abstract

In order to increase the reliability of legal data and for the proper operation of the hardware and software systems, it is necessary that the hardware component receives data only from the corresponding software. Otherwise, the data received from extraneous programs can lead to errors in the operation of the device or even a complete loss of its functionality or data. In order to identify the challenges of the transfer of blocks, this study focuses on a comprehensive study of the problems arising from the transmission of information in the form of separate data blocks and of the influence of the number of unauthorized blocks on the probability of collisions. In this study, we describe a method for distinguishing legal software data from data sent by unauthorized software sources. The analysis of the methods of reducing the probability of errors occurring at the receiver is done through the use of a buffer to store and a set of mathematical equations. The same way the analysis of the methods of possibility of reducing the reception of the unauthorized blocks when receiving individual blocks of information is done as well. Finally, we measure the extent of the effect of intensity of receiving unauthorized blocks and hash field length.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Babich, N.P., Zhukov, I.A.: Osnovy cifrovoj skhemotekhniki (The basics of Digital Circuit), p. 480. DMK Press (2007)

    Google Scholar 

  2. Sumathi, R.: A Secure data transfer mechanism using single-handed re-encryption technique. In: International Conference on Emerging Trends in Science, Engineering and Technology, pp. 1–9 (2012)

    Google Scholar 

  3. Hao, P., Shi, Q.: Matrix factorizations for reversible integer mapping. IEEE Trans. Signal Process. 49, 2314–2324 (2001)

    Google Scholar 

  4. Group PCI special interest PCI express base specification revision 3.0 (2019). https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.694.7081&rep=rep1&type=pdf. Accessed 5 Sept 2019

  5. Ivanov, M.A.: Krptograficheskie metody zashchity informacii v komp'yuternyh sistemah i setyah (Cryptographic Methods of Security Information in Computer Systems and Networks), p. 400. MEPhI, Moscow (2012)

    Google Scholar 

  6. Bellare, M., Kiliany, J., Rogawayz, P.: The security of the cipher block chaining message authentication code. J. Comput. Syst. Sci. 61, 362–399 (2000)

    Article  MathSciNet  Google Scholar 

  7. Tanygin, M.O., Tipikin, A.P.: Aphitektupa sistemy apparatnogo ogranicheniya dostupa k informacii na zhestkom diske EVM (System architecture for hardware restriction of access to information on a computer hard disk). Telecommunications 3, 44–46 (2006)

    Google Scholar 

  8. Tanygin, M.O., Alshaeaa, H.Y., Altukhova, V.A.: Establishing trusted channel for data exchange between source and receiver by modified one-time password method. In: International Russian Automation Conference, Sochi, Russian Federation, p. 8867590 (2019)

    Google Scholar 

  9. Black, J.: Authenticated Encryption. Encyclopedia of Cryptography and Security. Springer, Tilborg (2005)

    Google Scholar 

  10. Marukhlenko, A.L., Plugatarev, A.V., Bobyntsev, D.O.: Complex evaluation of information security of an object with the application of a mathematical model for calculation of risk indicators. In: Lecture Notes in Electrical Engineering, pp. 641–778 (2020). https://doi.org/10.1007/978-3-030-39225-3_84

  11. Tanygin, M.O., Tipikin, A.P.: Methods of authentication of information protection systems and controlling software. Telecommun. Radio Eng. 66, 453–463 (2007)

    Article  Google Scholar 

  12. Tanygin, M.O.: Method of control of data transmitted between software and hardware. Computer science and engineering. In: Materials of the IV International Conference of Young Scientists, CSE-2010, pp. 344–345. Publishing House of Polytechnics, Lviv (2010)

    Google Scholar 

  13. Tanygin, M.O., Alshaeaa, H.Y., Altukhova, V.A.: Ob odnom metode kontrolya celostnosti peredavaemoj poblokovo informacii (A Method of control the Integrity of transmitted blocks information). Telecommunications 3, 12–21 (2019)

    Google Scholar 

  14. Tanygin, M.O., Alshaeaa, H.Y., Efremov, M.A.: Analysis of the secure data transmission system parameters. Lect. Notes Electr. Eng. 641, 675–683 (2019). https://doi.org/10.1007/978-3-030-39225-3_74

  15. Tanygin, M.O., Alshaeaa, H.Y., Berlizeva, A.V.: Algoritm obratimyh preobrazovaniya dlya kontrolya autentichnosti paketov v setyah s nizkoj propusknoj sposobnost'yu (Reversible transformation algorithm for the control of the authenticity of packets in networks in low-bandwidth networks). In: Information and Space Technologies: State, Problems and Solutions, Collection of Scientific Articles Based on the Materials of the III all-Russian Scientific and Practical Conference, Kursk, pp. 169–173 (2019)

    Google Scholar 

  16. Spevakov, A.G., Tanygin, M.O., Panishev, V.S.: Informacionnaya bezopasnost' (Information security). Southwest State University, Kursk, p. 196 (2017)

    Google Scholar 

  17. Tanygin, M.O.: Obnaruzhenie pri programmnom upravlenii rabotoj ustrojstva komand, vydannyh postoronnimi programmami (Detection of commands issued by extraneous programs in software control of the device). Optoelectronic devices and devices in image recognition, image processing and character information systems. In: Proceedings of the 7th International conference, pp. 202–203 (2005)

    Google Scholar 

  18. Tanygin, M.O.: Raschyot veroyatnosti vozniknoveniya kollizij pri ispol'zovanii algoritma kontrolya podlinnosti soobshchenij (Calculation of the probability of collisions when using the algorithm for controlling the authenticity of messages). News Southwest State Univ. Ser. Manage. Comput. Eng. Inform. 2, 179–182 (2012)

    Google Scholar 

  19. Tanygin, M.O., Alshaeaa, H.Y., Kuleshova, E.A.: A method of the transmitted blocks information integrity control. Radio Electron. Comput. Sci. Control 1, 181–189 (2010)

    Google Scholar 

  20. Tanygin, M.O., Kuleshova, E., Marukhlenko, A.: Formation of unique characteristics of hiding and encoding of data blocks based on the fragmented identifier of information processed by cellular automata computers 9(2), 51 (2020). https://doi.org/10.3390/computers9020051

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. O. Tanygin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tanygin, M.O., Dobritsa, V.P., Alshaeaa, H.Y. (2021). Study of the Influence of the Unauthorized Blocks Number on the Collision Probability. In: Radionov, A.A., Gasiyarov, V.R. (eds) Advances in Automation II. RusAutoCon 2020. Lecture Notes in Electrical Engineering, vol 729. Springer, Cham. https://doi.org/10.1007/978-3-030-71119-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-71119-1_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-71118-4

  • Online ISBN: 978-3-030-71119-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics