Advertisement

Automatic Control and Computer Sciences

, Volume 51, Issue 8, pp 965–971 | Cite as

A method of providing the integrity of information in the group of robotic engineering complexes based on crypt-code constructions

  • D. V. SamoylenkoEmail author
  • M. A. Eremeev
  • O. A. Finko
Article
  • 13 Downloads

Abstract

The system of cryptographic code transformation of information based on the aggregated application of block encryption algorithms and polynomial codes of the residual class system has been considered. The complexation of information processing methods ensures the restoration of the integrity of information stored in a group of robotic complexes (RCs) that is subjected to the actions (algebraic manipulations) of the violator, while the physical loss of some predetermined limit number of RCs does not lead to the partial or complete loss of it.

Keywords

robotic complexes cryptography modular arithmetic noise-immune coding in residual classes integrity 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Unmanned Aircraft Systems (UAS) Roadmap, 2005–2030. https://fas.org/irp/program/collect/uav_roadmap2005.pdf.Google Scholar
  2. 2.
    Harshan, J. and Oggier, F., On algebraic manipulation detection codes from linear codes and their application to storage systems, IEEE Information Theory Workshop, 2015.Google Scholar
  3. 3.
    Samoylenko, D.V. and Finko, O.A., Simulation of data transmission in secure unidirectional communication systems based on polynomial classes of residues, Nelineinyi Mir, 2013, no. 9.Google Scholar
  4. 4.
    Samoylenko, D.V. and Finko, O.A., Interference-free data transmission in radio channels of robotic complexes based on polynomial classes of residues, Naukoemkie Tekhnol. Kosm. Issled. Zemli, 2016, no. 3.Google Scholar
  5. 5.
    Rekomendatsii po standartizatsii R 50.1.053-2005. Osnovnye terminy i opredeleniya v oblasti tekhnicheskoi zashchity informatsii (Recommendations on Standardization R 50.1.053-2005: Basic Terms and Definitions in the Field of Technical Protection of Information), Moscow: Standartinform, 2006.Google Scholar
  6. 6.
    Van Tilborg, H.C.A., Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial, Springer, 1999.zbMATHGoogle Scholar
  7. 7.
    Weatherspoon, H. and Kubiatowicz, J., Erasure coding vs. replication: A quantitative comparison, IPTPS'01, 2002.Google Scholar
  8. 8.
    Gabidulin, E.M. and Afanas’ev, V.B., Kodirovanie v radioelektronike (Coding in Radio Electronics), Moscow: Radio i Svyaz’, 1986.Google Scholar

Copyright information

© Allerton Press, Inc. 2017

Authors and Affiliations

  • D. V. Samoylenko
    • 1
    Email author
  • M. A. Eremeev
    • 1
    • 2
  • O. A. Finko
    • 3
  1. 1.Mozhaiskii Military Space AcademySt. PetersburgRussia
  2. 2.Institute of Comprehensive Safety and Special Instrumentation of “Moscow Technological University”MoscowRussia
  3. 3.Shtemenko Krasnodar Higher Military SchoolKrasnodarRussia

Personalised recommendations