Персона:
Чугунков, Илья Владимирович

Загружается...
Profile Picture
Email Address
Birth Date
Научные группы
Организационные подразделения
Организационная единица
Институт интеллектуальных кибернетических систем
Цель ИИКС и стратегия развития - это подготовка кадров, способных противостоять современным угрозам и вызовам, обладающих знаниями и компетенциями в области кибернетики, информационной и финансовой безопасности для решения задач разработки базового программного обеспечения, повышения защищенности критически важных информационных систем и противодействия отмыванию денег, полученных преступным путем, и финансированию терроризма.
Статус
Фамилия
Чугунков
Имя
Илья Владимирович
Имя

Результаты поиска

Теперь показываю 1 - 10 из 12
  • Публикация
    Только метаданные
    Construction of Multidimensional Stochastic Transformation Blocks
    (2019) Chugunkov, V. I.; Chugunkov, I. V.; Kliuchnikova, B. V.; Yadykin, I. M.; Gulyaev, V. A.; Чугунков, Илья Владимирович; Ядыкин, Игорь Михайлович
    © 2019 IEEE.The article is devoted to the improvement of stochastic transformation blocks (R-blocks). The principles of R- blocks construction are considered. We review the examples of R- blocks using in the cryptographic algorithms. The structure of two-dimensional stochastic transformation block is proposed, as well as the method for construction of multidimensional R- blocks. The using of improved R-blocks for construction of multidimensional algorithms is proposed. The results of evaluation of statistical properties of the multidimensional stochastic transformation blocks are given.
  • Публикация
    Только метаданные
    Issues of Replacement Blocks Quality Assessment for Stochastic Information Security
    (2019) Chugunkov, V. I.; Chugunkov, I. V.; Kliuchnikova, B. V.; Ivanov, M. I.; Riakhovskaia, I. S.; Tsyganov, V. S.; Чугунков, Илья Владимирович
    © 2019 IEEE.The article is devoted to the issues of building and quality assessment of replacement block or S-box, which is one of the main blocks of cryptographic transformation. The principles of S-box designing are considered, examples of their using in modern block ciphers are given. The issues of assessing the statistical safety of S-boxes, in particular, the criteria used for the analysis of S-blocks are investigated. The structure of the program system for the study of the statistical properties of S-boxes is proposed. The results of the S-boxes analysis for the main modern cryptographic algorithms are given. Assumptions about the possibility of mathematical apparatus using for the statistical properties of S-boxes analyzing are made.
  • Публикация
    Только метаданные
    Computing in Finite Fields
    (2022) Kozlov, A. A.; Chugunkov, I. V.; Gatilova, L. D.; Ivanov, M. A.; Kliuchnikova, B. V.; Salikov, E. A.; Чугунков, Илья Владимирович; Иванов, Михаил Александрович
    © 2022 IEEE.The mathematical apparatus of Galois field theory is used in coding theory, cryptography, stochastic informatics. The paper considers algorithms for multiplying field elements, while paying attention to both table multiplication and multiplication on the fly; algorithms for calculating multiplicative inversion. The solution to the problem of finding primitive elements of the field GF (pn) is discussed. The questions of extension of finite fields are considered. Numerical examples of the operation of all considered algorithms are given.
  • Публикация
    Только метаданные
    The Construction of Contolled S-box
    (2022) Chugunkov, V. I.; Chugunkov, I. V.; Kliuchnikova, B. V.; Lebedev, P.; Komarov, T. I.; Kiamov, A. A.; Чугунков, Илья Владимирович; Комаров, Тимофей Ильич
    © 2022 IEEE.The development of block cryptoalgorithms does not stand still. There are new architectures and increase of key information. But there is one primitive that will always be present in block cryptoalgorithms. This is a substitution table or S-box. At the same time, the development of cryptography also requires the improvement of S-box. The article discusses approaches to improve the S-box efficiency. The structure of the substitution table with a controlled operation logic is proposed. The effectiveness of the proposed approaches is assessed.
  • Публикация
    Только метаданные
    Develompent and Study of Stochastic Algorithms for Lightweight Devices Architecture
    (2023) Chugunkov, I. V.; Kliuchnikova, B. V.; Boronin, R. V.; Dmitrieva, N. Yu.; Polovneva, Yu. A.; Komarov, T. I.; Чугунков, Илья Владимирович; Половнева, Юлия Андреевна; Комаров, Тимофей Ильич
  • Публикация
    Только метаданные
    Study of Pseudo-Random Number Generators with Feedback Shift Register
    (2023) Chugunkov, I. V.; Kliuchnikova, B. V.; Soboleva, A. A.; Belyakovskaya, A. N.; Semenova, O. A.; Markova, D. A.; Чугунков, Илья Владимирович; Соболева, Ания Анверовна; Беляковская, Анна Николаевна; Семёнова, Ольга Александровна; Маркова, Дарья Александровна
  • Публикация
    Только метаданные
    Hash functions are based on three-dimensional stochastic transformations
    (2019) Chugunkov, I. V.; Ivanov, M. A.; Kliuchnikova, B. V.; Чугунков, Илья Владимирович; Иванов, Михаил Александрович
    © 2019 IEEE The methods are based on injecting unpredictability into means and objects of protection are called stochastic methods of information security. The effective protection can be done only by using stochastic methods against an active opponent. The effectiveness of stochastic protection methods is defined by the quality of the used pseudo-random number generators and hash functions. The proposed hashing algorithm DOZENHASH is based on the using of 3D stochastic transformations of DOZEN family. The principal feature of the algorithm is that all input and output data blocks as well as intermediate results of calculations are represented as three-dimensional array of bytes with 4 bytes in each dimension. Thus, the resulting transformation has a high degree of parallelism at the level of elementary operations, in other words, it is focused on the implementation using heterogeneous supercomputer technologies.
  • Публикация
    Только метаданные
    Phishing Attacks and Protection against Them
    (2021) Plaksina, A. M.; Ivanov, M. A.; Kliuchnikova, B. V.; Chugunkov, I. V.; Иванов, Михаил Александрович; Чугунков, Илья Владимирович
    © 2021 IEEE.Phishing, ransomware and cryptojacking are the main threats to cyber security in recent years. We consider the stages of phishing attacks, examples of such attacks, specifically, attacks using ransomware, malicious PDF files, and banking trojans. The article describes the specifics of phishing emails. Advices on phishing protection are given.
  • Публикация
    Только метаданные
    Statistical Tests for Replacement Blocks Assessment
    (2021) Chugunkov, I. V.; Kliuchnikova, B. V.; Riakhovskaia, I. S.; Chugunkov, V. I.; Чугунков, Илья Владимирович
    © 2021 IEEE.The basic operations of the round function of any block cipher are substitution and permutation. The article discusses approaches to the implementation of the replacement operation. The main cryptographic primitive, namely the block of substitutions or S-block, and its variations, such as, the R-block, are considered. Requirements for a high-quality substitution block are formulated. The approaches to the assessment of replacement blocks are analyzed. Methods to improve their efficiency are proposed. Forecasts for the development of replacement blocks are made.
  • Публикация
    Только метаданные
    New Class of Pseudorandom Number Generators for Logic Encryption Realization
    (2020) Chugunkov, I. V.; Kliuchnikova, B. V.; Ivanov, M. A.; Salikov, E. A.; Zubtsov, A. O.; Чугунков, Илья Владимирович; Иванов, Михаил Александрович
    © 2020 IEEE.Pseudorandom number generators (PRNG) are essential elements of any security system. In the tusks of information security PRNG provide unpredictable operation of protection means and methods. There is considered new class of sequences in the paper, which are formed by non-linear feedback shift registers, whose structures are determined by characteristical polynomials in the N-th order over GF(2n) field in the form of (x - 1)(x), where (x) is the (N - 1)-th degree polynomial is primitive over GF(2n) field. Proposed devices are assumed for hardware obfuscation concept realization.