.


:




:

































 

 

 

 


-




( ),

, e-mail: [email protected]

, , .

: , , , .

 

Ensuring the reliability of communication

Starikov Dmitriy Dmitrievich

Moscow Aviation Institute (State Technical University)

Student, e-mail: [email protected]

Abstract

We describe a program that allows users to maintain a database and send cryptographically Internet-messages using developed by the author of cryptographic algorithms and programs to implement them on a computer.

Key words: cryptography, cryptographic strength, communication channels, hashing.

. , : , , , .

, . , , .

, , , ,

1) (256 )

2) ( ASCII- 0..255)

1. ASCII

 

3) , .

, .

0, 1, 10, 11 ..

.

:

. 1000 , A, B, C D.

1.

A 0.5    
B 0.25      
C 0.125    
D 0.125  

 

, :

1000 * (0.5 * 1 + 2 * 0.25 + 3 * 2 * 0.125) = 1750

 

2.

A 0.5  
B 0.25  
C 0.125  
D 0.125  

 

, , , , .

, :

1000 * (0.5 * 1 + 1 * 0.25 + 2 * 2 * 0.125) = 1250

1,4 .

4) , :

(___ASCII)2.___.

5) :

Hash(A-key + . + + . + (i*i + 5*i - 6)), , , , ~ 100100 . ( ) .

, , , (i*i + 5*i - 6), . , 1111223, 2222774, » , . , , , - . , .

, ( FirstKey), :

1024.1,9409.10,9604.111,9801.1000,10000.1001,10201.11,10816.100,11025.101,11449.1010,11664.1011,12100.1100,12321.0,12544.1101,12769.1110,12996.1111,13225.110,13456.10000,13924.10001,14161.10010,14641.10011;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.

FirstKey1, :

1024.1,9409.10,9604.111,9801.1000,10000.1001,10201.11,10816.100,11025.101,11449.1010,11664.1011,12100.1100,12321.0,12544.1101,12769.1110,12996.1111,13225.110,13456.10000,13924.10001,14161.10010,14641.10011;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.

.

, , , .

test:test, . ( ), .

.

Edit . . , , . ( , ).

FirstKey. .

-> , , A-key,

, .

, -, .

 

2.

 

3.

 

4.

 

5.

 

TextCryptor Windows, . , , .

1. .. C++ Builder 6. . 1. C++. -:-, 2002.

References

1. Arhangelskiy A. C++ Builder 6. Handbook. Book 1. Language C++. -M: Binom-Press, 2002.

 

 

TCP/IP

,

, e-mail: [email protected]

, TCP/IP. , , OSI.

: , TCP/IP, , OSI, ARP-, DHCP, DNS-.

 

Analysis of network attacks models in TCP/IP networks

Lelekova Aleksandra Evgenevna

The Tax Academy of the Russian Federation,

Student, e-mail: [email protected]

Abstract

The possible attacks on corporate networks based on the most common TCP/IP protocol is considered. The task of identifying network attacks on the base of the active influence on the sniffer program is offered. Such influence is based on the known fact of independence the software modules running on different network layers of OSI model.

Key words: network attack, TCP/IP protocol, sniffer program, OSI model, ARP-server, service DHCP, DNS-service.

, , , , , .

, , , , [1]. , . , , .





:


: 2016-10-27; !; : 492 |


:

:

: , .
==> ...

2159 - | 1794 -


© 2015-2024 lektsii.org - -

: 0.025 .