The transfer of information by telecommunication channels is accompanied by message hashing to control the integrity of the data and confirm the authenticity of the data. When using a reliable hash function, it is computationally difficult to create a fake message with a pre-existing hash code, however, due to the weaknesses of specific hashing algorithms, this threat can be feasible. To increase the level of cryptographic strength of transmitted messages over telecommunication channels, there are ways to create hash codes, which, according to practical research, are imperfect in terms of the speed of their formation and the degree of cryptographic strength. The collisional properties of hashing functions formed using the modified UMAC algorithm using the methodology for assessing the universality and strict universality of hash codes are investigated. Based on the results of the research, an assessment of the impact of the proposed modifications at the last stage of the generation of authentication codes on the provision of universal hashing properties was presented. The analysis of the advantages and disadvantages that accompany the formation of the hash code by the previously known methods is carried out. The scheme of cascading generation of data integrity and authenticity control codes using the UMAC algorithm on crypto-code constructions has been improved. Schemes of algorithms for checking hash codes were developed to meet the requirements of universality and strict universality. The calculation and analysis of collision search in the set of generated hash codes was carried out according to the requirements of a universal and strictly universal class for creating hash codes
The subject of the article is the models of protection of official, commercial, confidential and other information, which is used by the officials of enterprises when making managerial decisions in terms of destabilizing informative influences. The aim of the study is to obtain an integral index, which characterizes the protection of necessary information, which is used by the officials of the enterprise when making managerial decisions in the presence of destabilizing information influences from the social networks, open sources and insiders. The task of this work are determinations of basic parameters, that characterize the system of defense of information of enterprise at the acceptance of administrative decisions a public servant in the conditions of destabilizing informative influences. The methods of researches are a probability theory and quality theory of differential equalizations. Results: on the basis of the observation and research of the activity of officials in the enterprises of different forms of ownership it was established that making managerial decisions by an official of the enterprise under conditions of destabilizing information influence is a relaxation fluctuation in the non-autonomous model of psychological arousal. An analysis of the dynamics of the sequence of influencing impulses on an official from existing information sources was conducted. An integral index, that determines a thresholding at that the system of informative defense of enterprise answers politicians of informative defense of enterprise at the acceptance of administrative decisions, is got. Conclusions: it was found that the threat of successful destabilizing information influence on management decision making by an official of the enterprise is determined by three parameters: the parameter, which determines the leakage of confidential information, the parameter, which determines the violation of the integrity of information and the parameter, which determines the blocking of access to information. It is noticed that the beginning of the emergence of a sequence of influencing destabilizing information influences on the enterprise determined by the content of the information at the initial moment of time (the effect of suggestion) and occurs over a period of time (lag effect).
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.