Персона: Чугунков, Илья Владимирович
Загружается...
Email Address
Birth Date
Научные группы
Организационные подразделения
Организационная единица
Институт интеллектуальных кибернетических систем
Цель ИИКС и стратегия развития - это подготовка кадров, способных противостоять современным угрозам и вызовам, обладающих знаниями и компетенциями в области кибернетики, информационной и финансовой безопасности для решения задач разработки базового программного обеспечения, повышения защищенности критически важных информационных систем и противодействия отмыванию денег, полученных преступным путем, и финансированию терроризма.
Статус
Фамилия
Чугунков
Имя
Илья Владимирович
Имя
7 results
Результаты поиска
Теперь показываю 1 - 7 из 7
- ПубликацияТолько метаданныеCritical view at quality evaluation systems of stochastic algorithms for information security(2019) Chugunkov, V. I.; Chuzunkov, I. V.; Dyumin, A. A.; Maksutov, A. A.; Liman, D. A.; Чугунков, Илья Владимирович; Дюмин, Александр Александрович; Максутов, Артем Артурович© 2017 IEEE. This paper is devoted to pseudo-random number (PRN) generator testing. The main evaluation systems of statistical properties of pseudo-random sequences formed by PRN generator are considered in the scope of this work. Weaknesses of such systems and ways of tests bypassing were revealed. The example of improving statistical properties of generator through adding statistical randomizer is given. We also propose approach to increasing efficiency of evaluation systems of statistical security of stochastic algorithms based on the usage of artificial neural networks.
- ПубликацияТолько метаданныеThe log data collection service for cloud robotics(2019) Liman, D. A.; Shustova, L. I.; Chugunkov, I. V.; Dyumin, A. A.; Чугунков, Илья Владимирович; Дюмин, Александр Александрович© 2017 IEEE. Mobile robotic systems became essential part of our daily life. They can interact with humans as valued helpers, sometimes in relatively sophisticated tasks, which makes it necessary to record as much information as possible about robotic device activities. But if common approaches are used for data fixation in storage system, some portions of the data can be lost due to network constraints and/or robotic device failures. The paper discusses the log service architecture that provides reliable log delivery to the central storage from distributed heterogeneous mobile robotic nodes. Proposed log system consists of logical entities performing log buffering at robotic nodes, log transfer and centralized log data storage. Variety of log data types, generated by robotic nodes, are discussed, as well as the peculiarities of data storage. The necessity of data transmission between nodes is emphasized and the log data transmission algorithm is described.
- ПубликацияТолько метаданныеConstruction of Multidimensional Stochastic Transformation Blocks(2019) Chugunkov, V. I.; Chugunkov, I. V.; Kliuchnikova, B. V.; Yadykin, I. M.; Gulyaev, V. A.; Чугунков, Илья Владимирович; Ядыкин, Игорь Михайлович© 2019 IEEE.The article is devoted to the improvement of stochastic transformation blocks (R-blocks). The principles of R- blocks construction are considered. We review the examples of R- blocks using in the cryptographic algorithms. The structure of two-dimensional stochastic transformation block is proposed, as well as the method for construction of multidimensional R- blocks. The using of improved R-blocks for construction of multidimensional algorithms is proposed. The results of evaluation of statistical properties of the multidimensional stochastic transformation blocks are given.
- ПубликацияТолько метаданныеIssues of Replacement Blocks Quality Assessment for Stochastic Information Security(2019) Chugunkov, V. I.; Chugunkov, I. V.; Kliuchnikova, B. V.; Ivanov, M. I.; Riakhovskaia, I. S.; Tsyganov, V. S.; Чугунков, Илья Владимирович© 2019 IEEE.The article is devoted to the issues of building and quality assessment of replacement block or S-box, which is one of the main blocks of cryptographic transformation. The principles of S-box designing are considered, examples of their using in modern block ciphers are given. The issues of assessing the statistical safety of S-boxes, in particular, the criteria used for the analysis of S-blocks are investigated. The structure of the program system for the study of the statistical properties of S-boxes is proposed. The results of the S-boxes analysis for the main modern cryptographic algorithms are given. Assumptions about the possibility of mathematical apparatus using for the statistical properties of S-boxes analyzing are made.
- ПубликацияТолько метаданныеMethod for improving the statistical properties of pseudo-random number generators(2019) Chugunkov, V. I.; Chugunkov, I. V.; Gulyaev, V. A.; Baranova, E. A.; Чугунков, Илья Владимирович© 2019 IEEE The article is devoted to the issues of increasing the statistical safety of pseudo-random number generators by equalizing the properties of the generated sequences. The traditional generator structure assumes two stages: the first provides good statistical properties and a long period of the formed sequence, the second is responsible for unpredictability and cryptographic resistance. In this case, the second stage can lead to deterioration in the statistical properties of the sequence formed by the generator. An approach based on adding to the traditional two-stage generators architecture of third-stage is considered. A variant of the third stage construction is proposed. The possibilities of applying the proposed approach to improve the statistical properties of modern ciphers are described. The results of statistical properties researches of the generators with implemented third stage are given.
- ПубликацияТолько метаданныеHash functions are based on three-dimensional stochastic transformations(2019) Chugunkov, I. V.; Ivanov, M. A.; Kliuchnikova, B. V.; Чугунков, Илья Владимирович; Иванов, Михаил Александрович© 2019 IEEE The methods are based on injecting unpredictability into means and objects of protection are called stochastic methods of information security. The effective protection can be done only by using stochastic methods against an active opponent. The effectiveness of stochastic protection methods is defined by the quality of the used pseudo-random number generators and hash functions. The proposed hashing algorithm DOZENHASH is based on the using of 3D stochastic transformations of DOZEN family. The principal feature of the algorithm is that all input and output data blocks as well as intermediate results of calculations are represented as three-dimensional array of bytes with 4 bytes in each dimension. Thus, the resulting transformation has a high degree of parallelism at the level of elementary operations, in other words, it is focused on the implementation using heterogeneous supercomputer technologies.
- ПубликацияТолько метаданныеGenerators with the given distribution law(2019) Chugunkov, V. I.; Chugunkov, I. V.; Riakhovskaia, I. S.; Matriukhina, E. A.; Ivanov, M. A.; Чугунков, Илья Владимирович; Иванов, Михаил Александрович© 2019 IEEE Pseudo-random number generators (PRNG) play an important role in the tasks of information security. Reliability and safety of information collection, processing, storage and transfer in computer systems and networks depend on PRNG's properties. As a rule, the distribution of symbols in the sequences created by generators submits to the uniform distribution law. But in some cases it is necessary that the generator created the sequences with the distribution law other than uniform. This article proposes an approach to the construction of such generators based on PRNG's. The schemes for constructing generators with a distribution law that is non-uniform are provided. At last, recommendations for estimating the properties of generators with a given distribution law are produced.