Preview

Bulletin of Kazakh National Women's Teacher Training University

Advanced search

The programming method of information protection

Abstract

In this article an encryption is examined by transposition with the use of enciphering table the being a matrix dimension of nm. For generating encryption, the compiled tabs are followed by tabulators in the table. If the text is blocked by the text, you will receive the encrypted message. The process of decrypting is executed in the reverse order. Most effective from the considered keys over is using of dimension of table.

About the Authors

Zh. A. Musiraliev
Kazakh State Women's Teacher Training University
Kazakhstan

Senior Lecturer

Almatу



Z. T. Suranchieva
Kazakh State Women's Teacher Training University
Kazakhstan

MSc, Senior Lecturer

Almatу



A. S. Makhanova
Kazakh State Women's Teacher Training University
Kazakhstan

MSc, teacher

Almatу



References

1. Молдовян А.А., Молдовян Н.А., Гуц Н.Д., Изотов Б.В. Криптография. Скоростные шифры. Петербург. 2012

2. Мҥсірҽлиев Ж., Суранчиева З., Маханова А.С. Электронды сызба қҧруда логикалық формулаларды қолдану. Қазақ мемлекеттік қыздар педагогикалық университетінің Хабаршысы, 2017. №1. 38-44 бб.

3. Мельников, В. П. Информационная безопасность и защита информации: моногр. / В.П. Мельников, С.А. Клейменов, А.М. Петраков. - М.: Academia, 2016. - 336 c.

4. Шнайер Б. Прикладная криптография. Издательство Триумф. Москва. 2012. (//http://www.ssl.stu.neva.ru/psw/crypto.html)

5. Бабенко Л.К., Ищукова Е.А. Современные алгоритмы блочного шифрования и методы их анализа. - М.: Гелиос АРВ, 2016. - 376 с., илл.

6. Turn R., Ware W. Privacy and security in computer systems, I-A1 Amer. Scientist, vol 63, 2015, pp. 196-203.

7. Ware W., Security and privacy in computer systems, in 2017 S,CC, AFIPS Cont. Proc., vol. 30, 2017, pp. 287-290.


Review

For citations:


Musiraliev Zh.A., Suranchieva Z.T., Makhanova A.S. The programming method of information protection. Bulletin of Kazakh National Women's Teacher Training University. 2018;(1):47-52. (In Kazakh)

Views: 370


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2306-5079 (Print)