Method of generation of casual numbers on the basis of the use of apparatus of the computer plugged in the Internet
DOI:
https://doi.org/10.18372/2410-7840.18.11085Keywords:
cryptographic priv, perfect priv, generation of random numbers, priv in a network the Internet, self-similar processAbstract
In systems or voting poll on the Internet, with a view to ensuring the conditions for the free expression of respondents thought necessary secrecy of the vote. For this purpose cryptographic protection of information that needs to generate random numbers. It is known that the standard computer functions to generate random numbers, which are based on mathematical transformations, give a pseudorandom generator that resemble random, but random really. Knowing the methods of obtaining such numbers, hackers can crack the security system. In this paper makes recommendations on the principles of construction of computer programs generating real (not pseudo) casual numbers in the terminal nodes of the Internet, provided the exclusive use of standard software and hardware (without any additional physical devices). The experimental results of the proposed principles of random number generation. In theory, proved the impossibility of foreseeing the numbers received, indicating that the futility of trying to use cryptanalysis funds to disclose themReferences
Schneier B. What's Wrong With Electronic Voting Ma-chines? https://www.schneier.com/essays/ archives/2004/11/whats_wrong_with_ele.html
Вишняков В.М., Пригара М.П., Воронін О.В. Відк-рита система таємного голосування // Управління розвитком складних систем. Збірник наукових праць. – 2014. – Вип. 20. – С. 110 -115. http://urss.knuba.edu.ua/files/zbirnyk-20/ 22.pdf
Сушко С.О., Кузнєцов Г.В., Корабльов А.В. Мате-матичні основи крипто аналізу. Дніпропетровськ: Національний гірничий університет, 2010. - 465 с.
Intel Digital Random Number Generator (DRNG): Software Implementation Guide, Revision 1.1. Intel Corporation. http://www. webcitation.org/6GhG1P7iR
Ghaderi M. On the Relevance of Self-Similarity in Network Traffic Prediction, 2003. http://www.cs.uwaterloo.ca/cs-archive/CS-2003/28/ TR-CS-2003-28.pdf
Муранов О.С. Дослідження можливостей прогно-зування самоподібного трафіка у пакетних мережах // Моделювання та інформаційні технології: Збір-ник наукових праць Інституту проблем моделю-вання в енергетиці ім. Г.Є.Пухова. – Київ: ІПМЕ ім. Г.Є.Пухова НАН України, 2007. - № 44. – С. 98-106.
Alomar Mhamad. Influence of traffic prognostic mechanism on quality of adaptive control of switchboard / Alomar Mhamad, Saleh Alomar, Atef Obeidat // International Journal of Engineering Science (IJES). Bethesda (USA), 2014. – Vol. 7, no. 33. – Pp. 1763-1776. (http://www.scirp.org/journal/eng) http://dx.doi.org/10.12988/ces.2014.4797.
Городецкий А. Я. Информатика. Фрактальные процессы в компьютерных сетях / А. Городецкий, В. Забровский. – Санкт-Петербург : Изд-во СПб ГТУ, 2000. – 96 с.
Мячин М.Л. Миф о значимости коэффициента корреляции https://sites.google.com/site/ltwood/ projects/stataddons/corrmyth
Downloads
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).