{"title":"Development of a related key function in ARX stochastic data transformation algorithms","authors":"Alexander A. Kozlov","doi":"10.26583/bit.2021.4.05","DOIUrl":"https://doi.org/10.26583/bit.2021.4.05","url":null,"abstract":". In this paper an analysis of ARX stochastic algorithms based on related keys is considered. Analysis based on this approach is carried out using the selected open text and the keys linked by some function. A special case of using related keys is the analysis of an algorithm consisting only of the operations of modular addition modulo 2 n , modulo 2, and cyclic shift. Such algorithms are so-called ARX stochastic algorithms. The common method of analysing the algorithms based on related keys is the rotation analysis method. This method allows formulating requirements only for the number of addition operations modulo 2 n . The considered properties of the rotation analysis method demonstrated the need to develop requirements for ARX algorithms in terms of the number of cyclic shift operations. Based on the properties of the mathematical operations used in the ARX stochastic algorithms, a non-cyclic related key function was proposed. Among ARX operations, only the cyclic shift function affects the probability of such relation. The complexity of the analysis based on non-cyclic related key function has been estimated. It is proved that the complexity of relation key analysis of ARX algorithms is determined by the","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130886329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network covert channels capacity limitation by adding random delays before packet sending","authors":"A. Belozubova, K. Kogos, Philipp V. Lebedev","doi":"10.26583/bit.2021.4.06","DOIUrl":"https://doi.org/10.26583/bit.2021.4.06","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114142292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method for analysis of the stability of nuclear power plant systems to the impact of computer attacks","authors":"Vitaliy G. Vanenko, N. D. Ivanova","doi":"10.26583/bit.2021.4.04","DOIUrl":"https://doi.org/10.26583/bit.2021.4.04","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129871540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Y. Borovikov, Oleg A. Maslov, Stepan A. Mordvinov, Andrey A. Esafiev
{"title":"The Method for creating a trusted hardware-software platform for its application in special purpose information systems","authors":"A. Y. Borovikov, Oleg A. Maslov, Stepan A. Mordvinov, Andrey A. Esafiev","doi":"10.26583/bit.2021.4.08","DOIUrl":"https://doi.org/10.26583/bit.2021.4.08","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123962288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Dvoryankin, A. E. Zenov, Roman A. Ustinov, Nikita S. Dvoryankin
{"title":"Spectrogram image encoding to provide variable audio data rates and preserve its sound quality","authors":"S. Dvoryankin, A. E. Zenov, Roman A. Ustinov, Nikita S. Dvoryankin","doi":"10.26583/bit.2021.4.02","DOIUrl":"https://doi.org/10.26583/bit.2021.4.02","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130117918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The use of polar harmonic transformations in the development of methods for robust image watermarking","authors":"A. N. Shniperov, Valeriy A. Melnikov","doi":"10.26583/bit.2021.4.07","DOIUrl":"https://doi.org/10.26583/bit.2021.4.07","url":null,"abstract":". The need for developing a robust image watermarking method remains relevant. This is caused by the fact that existing watermarking methods are either not robust enough to various types of attacks on images, or computationally complex, or they are subject to the so-called numerical instability, i.e., accumulation of errors. This paper proposes the use of polar harmonic transformations as the basis of the method for image watermarking, including algorithms for embedding and extracting a watermark, and methods for multiple marking are proposed: multiple embedding and extracting by majority rule, multiple embedding and extracting according to the rule of greater similarity, embedding and extracting fragments of a watermark. The performance characteristics, such as robustness to various attacks, embedding and extraction time for a fixed area size, and maximum size of watermark, are measured using attacks implemented in StirMark BenchMark 4. The proposed method has been proven to be robust to many types of geometric attacks, JPEG-compression and other attacks, to have a high embedding and extraction rate, and to be numerically stable. The proposed method can be used to watermark JPEG images for copyright protection.","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127097637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-preserving machine learning based on secure two-party computations","authors":"S. Zapechnikov, A. Shcherbakov","doi":"10.26583/bit.2021.4.03","DOIUrl":"https://doi.org/10.26583/bit.2021.4.03","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127590581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. G. Nikitaev, A. Pronichev, O. Tamrazova, V. Sergeev, Y. Sergeev, Dmitry V. Gurov, S. M. Zaitsev, M. Solomatin, T. P. Zanegina, Vladimir S. Vladimir S. Kozlov
{"title":"Сonvolutional neural networks in the diagnosis of skin neoplasms","authors":"V. G. Nikitaev, A. Pronichev, O. Tamrazova, V. Sergeev, Y. Sergeev, Dmitry V. Gurov, S. M. Zaitsev, M. Solomatin, T. P. Zanegina, Vladimir S. Vladimir S. Kozlov","doi":"10.26583/bit.2021.4.09","DOIUrl":"https://doi.org/10.26583/bit.2021.4.09","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125894775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topical issues of creating a mass education system for information security culture","authors":"A. Malyuk, Zoya P. Malyuk","doi":"10.26583/bit.2021.4.01","DOIUrl":"https://doi.org/10.26583/bit.2021.4.01","url":null,"abstract":". The rapidly developing processes of the information society formation in Russia put on the agenda the problem of improving the information culture of society and, above all, such a part of it as the culture of information security. The practice demonstrates a need in organising an effective \"universal education\" in the field of information protection for modern technical means of its collection, processing, transmission and storage. The Information Security Doctrine of the Russian Federation, approved by the President of the country in December 2016, repeatedly notes the importance of the problem of forming a culture of personal information security of citizens who are, in particular, active users of the Internet and other modern information and communication systems. In this regard, the article deals with topical issues of the formation of a system of continuous training of members of the information society in the field of the basics of information security, starting from the earliest years (from school or even from kindergarten). The paper describes the policy of forming a culture of information security, formulates approaches to the organisation of mass education systems, and suggests specific measures for their implementation. As an example of the progress in this direction, an innovative educational cluster created by a joint decision of the Ministry of Digital Development, Communications and Mass Media of the Russian Federation and the Department of Education and Science of Moscow is described.","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128644076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical model of the formation of a unified information space of the radio-electronic industry","authors":"Anatoliy A. Chuprinov","doi":"10.26583/bit.2021.4.10","DOIUrl":"https://doi.org/10.26583/bit.2021.4.10","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128505785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}