Abstract
This paper demonstrates the application of module arithmetic for controlling the level of information security by a new technique referred as integer splitting. The basic definitions and concepts of the method are provided. The mathematical function of arising transformation is described in detail; its properties were studied and the basic theorems were proven that justify the use of splitting in practical applications. An active system was designed and characteristic cases of its operation are considered.
Similar content being viewed by others
References
Chervyakov, N.I., Lyakhov, P.A., Babenko, M.G., Lavrinenko, I.N., and Lavrinenko, A.V., Komp’yuternye vychisleniya na osnove modulyarnoi algebry (Computer Calculations Based on Modular Algebra), Izd.-inf. tsentr Fabula, 2015.
Stefanyuk, V.L. and Alhussain, A.H., Symmetric encryption on the base of splitting method, Bull. PFUR, Ser. Math. Inf. Sci. Phys., 2016, no. 2, pp. 53–61.
Stefanyuk, V.L. and Alkhussain, A.Kh., Cryptography and coding as methods of information protection, Informatsionno-Telekommunikatsionnye Tekhnologii i Matematicheskoe modelirovanie vysokotekhnologichnykh sistem (Information-Telecommunication Technologies and Mathematical Modeling of High-Tech Systems), 2016, Moscow: RUDN, pp. 181–182.
Stefanyuk, V.L. and Alkhussain, A.Kh., Symmetric encryption based on the method of splitting, Estestv. Tekh. Nauki, 2016, no. 3, pp. 130–133.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © V.L. Stefanuk, A.H. Alhussain, 2016, published in Iskusstvennyi Intellekt i Prinyatie Reshenii, 2016, No. 4, pp. 86–92.
About this article
Cite this article
Stefanuk, V.L., Alhussain, A.H. Symbolic Management of the Degree of Information Security by Integer Splitting. Sci. Tech. Inf. Proc. 44, 450–454 (2017). https://doi.org/10.3103/S0147688217060107
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0147688217060107