( ),
, e-mail: [email protected]
, , .
: , , , .
Ensuring the reliability of communication
Starikov Dmitriy Dmitrievich
Moscow Aviation Institute (State Technical University)
Student, e-mail: [email protected]
Abstract
We describe a program that allows users to maintain a database and send cryptographically Internet-messages using developed by the author of cryptographic algorithms and programs to implement them on a computer.
Key words: cryptography, cryptographic strength, communication channels, hashing.
. , : , , , .
, . , , .
, , , ,
1) (256 )
2) ( ASCII- 0..255)
1. ASCII
3) , .
, .
0, 1, 10, 11 ..
.
:
. 1000 , A, B, C D.
1.
A | 0.5 | |||
B | 0.25 | |||
C | 0.125 | |||
D | 0.125 |
, :
1000 * (0.5 * 1 + 2 * 0.25 + 3 * 2 * 0.125) = 1750
2.
A | 0.5 | |
B | 0.25 | |
C | 0.125 | |
D | 0.125 |
|
|
, , , , .
, :
1000 * (0.5 * 1 + 1 * 0.25 + 2 * 2 * 0.125) = 1250
1,4 .
4) , :
(___ASCII)2.___.
5) :
Hash(A-key + . + + . + (i*i + 5*i - 6)), , , , ~ 100100 . ( ) .
, , , (i*i + 5*i - 6), . , 1111223, 2222774, » , . , , , - . , .
, ( FirstKey), :
1024.1,9409.10,9604.111,9801.1000,10000.1001,10201.11,10816.100,11025.101,11449.1010,11664.1011,12100.1100,12321.0,12544.1101,12769.1110,12996.1111,13225.110,13456.10000,13924.10001,14161.10010,14641.10011;4602c8fbbc9a6ba7306ee41b9570cb3b+b731462a2d21eb3233dda549e7a6b40d+44f132868f3264da8515eef852315d1b+0607dbbd98b1626c8a9b048e12daa5d9+d76f4b949fabd579af32bc00eb7e45f1+1408f6b2044302c4c25e8a4bd07fa552+76ef5b8fd868aa0d78c3081928484c7f+eae55e7f2c79a91c2391596ece1a35e3+97e4c32ad3a38a701327403f9db84b55+e6b4807350d7f55ff83a9c37e012bf6e+a32e14d1e2999741e3c5f415806cbaa2+0c6819b40aa9c183dfeb62628369bddc+dec76e09c388aa08c3d74530903c4d73+4c4b81ef6b3c758241e628e3ade276ca+d355e791791f9d0edd5b2a9de3acf787+a03e343df3047b677203603983aecf4a+04285ec68b76bd28c692878156b5408d+9187a7ca3da66df34025488978be57f2+fbdee4c5a565a5d5f7d2e1241779cb80+0b6706c7c9f71189bc9c19cde8326572+4988142e042551c262445153d4a813be+610f86fcf47270b0cf54d33bd8aa0bc8+91baa45a7f6eda2c5ceb5c688e294bf3+b4e269f1a706663de6297c8d8148171c+2eab33c599405224c27d43988096ba08+d9c949b63a6083016e1ae8ff69b98309+2c7cbf68f1b744ee7911067ea200bc03+15cc485fc60cb303a048dbccca656ee7.
FirstKey1, :
1024.1,9409.10,9604.111,9801.1000,10000.1001,10201.11,10816.100,11025.101,11449.1010,11664.1011,12100.1100,12321.0,12544.1101,12769.1110,12996.1111,13225.110,13456.10000,13924.10001,14161.10010,14641.10011;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.
|
|
.
, , , .
test:test, . ( ), .
.
Edit . . , , . ( , ).
FirstKey. .
-> , , A-key,
, .
, -, .
2.
3.
4.
5.
TextCryptor Windows, . , , .
1. .. C++ Builder 6. . 1. C++. -:-, 2002.
References
1. Arhangelskiy A. C++ Builder 6. Handbook. Book 1. Language C++. -M: Binom-Press, 2002.
TCP/IP
,
, e-mail: [email protected]
, TCP/IP. , , OSI.
: , TCP/IP, , OSI, ARP-, DHCP, DNS-.
Analysis of network attacks models in TCP/IP networks
Lelekova Aleksandra Evgenevna
The Tax Academy of the Russian Federation,
Student, e-mail: [email protected]
Abstract
The possible attacks on corporate networks based on the most common TCP/IP protocol is considered. The task of identifying network attacks on the base of the active influence on the sniffer program is offered. Such influence is based on the known fact of independence the software modules running on different network layers of OSI model.
Key words: network attack, TCP/IP protocol, sniffer program, OSI model, ARP-server, service DHCP, DNS-service.
|
|
, , , , , .
, , , , [1]. , . , , .