[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2523514.2523574acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
poster

Building of mathematical model of flow data processing system based on given selection of elements of the set

Published: 26 November 2013 Publication History

Abstract

The problem of building of ordered strings' set on known alphabet, which allows to create a bijection between its subsets and alphabet's letters is formulated and solved. The algorithm for forming the set is worked off and bounds of the set capacity are shown. Based on gotten results mathematical model of symmetric cryptosystem with keys' amount with exponential depend on initial parameters is worked off as practical application.

References

[1]
Hall M. Combinatorics. -- M.: Mir, 1970. -- 419 p.
[2]
Osipyan V. O. Simulation of security systems containing Diophantine problems: Development of methods for making multistage systems of Diophantine equations. The development of non-standard knapsack cryptosystems: monography, LAP, 2012. -- 344 p.

Cited By

View all
  • (2017)The duality principle in the theory of development generalized A-M knapsack cryptosystemsProceedings of the 10th International Conference on Security of Information and Networks10.1145/3136825.3136898(200-205)Online publication date: 13-Oct-2017

Index Terms

  1. Building of mathematical model of flow data processing system based on given selection of elements of the set

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
      November 2013
      483 pages
      ISBN:9781450324984
      DOI:10.1145/2523514
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      • Macquarie U., Austarlia
      • MNIT: Malaviya National Institute of Technology
      • Aksaray Univ.: Aksaray University
      • SFedU: Southern Federal University

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 26 November 2013

      Check for updates

      Author Tags

      1. cyphertext
      2. literal alphabet
      3. numerical
      4. plaintext
      5. set
      6. set capacity
      7. symmetric cryptosystem
      8. the original message
      9. the problem of building the set with specified conditions
      10. the problem of the letter's choice depending of the known set

      Qualifiers

      • Poster

      Conference

      SIN '13
      Sponsor:
      • MNIT
      • Aksaray Univ.
      • SFedU

      Acceptance Rates

      Overall Acceptance Rate 102 of 289 submissions, 35%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 04 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2017)The duality principle in the theory of development generalized A-M knapsack cryptosystemsProceedings of the 10th International Conference on Security of Information and Networks10.1145/3136825.3136898(200-205)Online publication date: 13-Oct-2017

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media