The programming method of information protection
Abstract
In this article an encryption is examined by transposition with the use of enciphering table the being a matrix dimension of nm. For generating encryption, the compiled tabs are followed by tabulators in the table. If the text is blocked by the text, you will receive the encrypted message. The process of decrypting is executed in the reverse order. Most effective from the considered keys over is using of dimension of table.
Keywords
About the Authors
Zh. A. MusiralievKazakhstan
Senior Lecturer
Almatу
Z. T. Suranchieva
Kazakhstan
MSc, Senior Lecturer
Almatу
A. S. Makhanova
Kazakhstan
MSc, teacher
Almatу
References
1. Молдовян А.А., Молдовян Н.А., Гуц Н.Д., Изотов Б.В. Криптография. Скоростные шифры. Петербург. 2012
2. Мҥсірҽлиев Ж., Суранчиева З., Маханова А.С. Электронды сызба қҧруда логикалық формулаларды қолдану. Қазақ мемлекеттік қыздар педагогикалық университетінің Хабаршысы, 2017. №1. 38-44 бб.
3. Мельников, В. П. Информационная безопасность и защита информации: моногр. / В.П. Мельников, С.А. Клейменов, А.М. Петраков. - М.: Academia, 2016. - 336 c.
4. Шнайер Б. Прикладная криптография. Издательство Триумф. Москва. 2012. (//http://www.ssl.stu.neva.ru/psw/crypto.html)
5. Бабенко Л.К., Ищукова Е.А. Современные алгоритмы блочного шифрования и методы их анализа. - М.: Гелиос АРВ, 2016. - 376 с., илл.
6. Turn R., Ware W. Privacy and security in computer systems, I-A1 Amer. Scientist, vol 63, 2015, pp. 196-203.
7. Ware W., Security and privacy in computer systems, in 2017 S,CC, AFIPS Cont. Proc., vol. 30, 2017, pp. 287-290.
Review
For citations:
Musiraliev Zh.A., Suranchieva Z.T., Makhanova A.S. The programming method of information protection. Bulletin of Kazakh National Women's Teacher Training University. 2018;(1):47-52. (In Kazakh)