Отрывок: ‘Figure 3’ represents an example of the described MFs. Figure 3. Configurations of MFs for (f0, |f1-f2|). Also, in [3], we investigated the relationship between the degree of used polynomial and the settings of related three MFs of every linguistic variable. Practically, we predefine the value of ( ), that deter...
Полная запись метаданных
Поле DC Значение Язык
dc.contributor.authorAlnajjar, K.-
dc.contributor.authorAnikin, I.V.-
dc.date.accessioned2020-07-30 10:42:21-
dc.date.available2020-07-30 10:42:21-
dc.date.issued2020-
dc.identifierDspace\SGAU\20200729\84813ru
dc.identifier.citationAlnajjar K. Secure gamma generation for stream cipher based on fuzzy logic/ K. Alnajjar, I.V. Anikin// Информационные технологии и нанотехнологии (ИТНТ-2020). Сборник трудов по материалам VI Международной конференции и молодежной школы (г. Самара, 26-29 мая): в 4 т. / Самар. нац.-исслед. ун-т им. С. П. Королева (Самар. ун-т), Ин-т систем. обраб. изобр. РАН-фил. ФНИЦ "Кристаллография и фотоника" РАН; [под ред. В. А. Фурсова]. – Самара: Изд-во Самар. ун-та, 2020. – Том 4. Науки о данных. – 2020. – С. 99-105.ru
dc.identifier.urihttp://repo.ssau.ru/handle/Informacionnye-tehnologii-i-nanotehnologii/Secure-gamma-generation-for-stream-cipher-based-on-fuzzy-logic-84813-
dc.description.abstractIn this paper, we propose a new approach for secure bit stream gamma generation based on the concept of fuzzy logic and linear feedback shift registers (LFSRs), combined in pseudorandom number generator based on fuzzy logic (FPRNG). The original idea for ensuring security for gamma generation is based on the initial states (the seeds) of LFSRs used in the generator. In this paper, we suggested the updated version of FPRNG. We also improve gamma security by accompaniment seed some valuable secure information. We found that configurations of membership functions (MFs) in FPRNG can significantly affect the randomness of the output stream of the developed generator. We can increase the gamma security as well as stream cipher security by keeping these configurations in secret additionally to seeds.ru
dc.language.isoen_USru
dc.titleSecure gamma generation for stream cipher based on fuzzy logicru
dc.typeArticleru
dc.textpart‘Figure 3’ represents an example of the described MFs. Figure 3. Configurations of MFs for (f0, |f1-f2|). Also, in [3], we investigated the relationship between the degree of used polynomial and the settings of related three MFs of every linguistic variable. Practically, we predefine the value of ( ), that deter...-
Располагается в коллекциях: Информационные технологии и нанотехнологии

Файлы этого ресурса:
Файл Описание Размер Формат  
ИТНТ-2020_том 4-99-105.pdf450.49 kBAdobe PDFПросмотреть/Открыть



Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.