Method of generation of casual numbers on the basis of the use of apparatus of the computer plugged in the Internet

Authors

  • Володимир Михайлович Чуприн National Aviation University
  • Володимир Михайлович Вишняков National Aviation University
  • Михайло Петрович Пригара Kyiv National University of Construction and Architecture

DOI:

https://doi.org/10.18372/2410-7840.18.11085

Keywords:

cryptographic priv, perfect priv, generation of random numbers, priv in a network the Internet, self-similar process

Abstract

In systems or voting poll on the Internet, with a view to ensuring the conditions for the free expression of respondents thought necessary secrecy of the vote. For this purpose cryptographic protection of information that needs to generate random numbers. It is known that the standard computer functions to generate random numbers, which are based on mathematical transformations, give a pseudorandom generator that resemble random, but random really. Knowing the methods of obtaining such numbers, hackers can crack the security system. In this paper makes recommendations on the principles of construction of computer programs generating real (not pseudo) casual numbers in the terminal nodes of the Internet, provided the exclusive use of standard software and hardware (without any additional physical devices). The experimental results of the proposed principles of random number generation. In theory, proved the impossibility of foreseeing the numbers received, indicating that the futility of trying to use cryptanalysis funds to disclose them

Author Biographies

Володимир Михайлович Чуприн, National Aviation University

PhD in engineering, professor, Department of Telecommunication Systems, National Aviation University

Володимир Михайлович Вишняков, National Aviation University

PhD in engineering, associate professor, Department of Telecommunication Systems, National Aviation University

Михайло Петрович Пригара, Kyiv National University of Construction and Architecture

graduate student of Department of Information Technologies, Kyiv National University of Construction and Architecture

References

Schneier B. What's Wrong With Electronic Voting Ma-chines? https://www.schneier.com/essays/ archives/2004/11/whats_wrong_with_ele.html

Вишняков В.М., Пригара М.П., Воронін О.В. Відк-рита система таємного голосування // Управління розвитком складних систем. Збірник наукових праць. – 2014. – Вип. 20. – С. 110 -115. http://urss.knuba.edu.ua/files/zbirnyk-20/ 22.pdf

Сушко С.О., Кузнєцов Г.В., Корабльов А.В. Мате-матичні основи крипто аналізу. Дніпропетровськ: Національний гірничий університет, 2010. - 465 с.

Intel Digital Random Number Generator (DRNG): Software Implementation Guide, Revision 1.1. Intel Corporation. http://www. webcitation.org/6GhG1P7iR

Ghaderi M. On the Relevance of Self-Similarity in Network Traffic Prediction, 2003. http://www.cs.uwaterloo.ca/cs-archive/CS-2003/28/ TR-CS-2003-28.pdf

Муранов О.С. Дослідження можливостей прогно-зування самоподібного трафіка у пакетних мережах // Моделювання та інформаційні технології: Збір-ник наукових праць Інституту проблем моделю-вання в енергетиці ім. Г.Є.Пухова. – Київ: ІПМЕ ім. Г.Є.Пухова НАН України, 2007. - № 44. – С. 98-106.

Alomar Mhamad. Influence of traffic prognostic mechanism on quality of adaptive control of switchboard / Alomar Mhamad, Saleh Alomar, Atef Obeidat // International Journal of Engineering Science (IJES). Bethesda (USA), 2014. – Vol. 7, no. 33. – Pp. 1763-1776. (http://www.scirp.org/journal/eng) http://dx.doi.org/10.12988/ces.2014.4797.

Городецкий А. Я. Информатика. Фрактальные процессы в компьютерных сетях / А. Городецкий, В. Забровский. – Санкт-Петербург : Изд-во СПб ГТУ, 2000. – 96 с.

Мячин М.Л. Миф о значимости коэффициента корреляции https://sites.google.com/site/ltwood/ projects/stataddons/corrmyth

Issue

Section

Articles