RUS  ENG
Full version
JOURNALS // Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics // Archive

Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2015 Number 1, Pages 22–32 (Mi vagtu355)

COMPUTER SOFTWARE AND COMPUTING EQUIPMENT

Transmission and reception of data in computational devices using systems of residual classes

Sh. G. Magomedov

Dagestan State Technical University

Abstract: Traditional technology of information security restricted usually involves the use of encryption methods. However, the requirements for such systems are quite strict, and as a result, in the implementation of a bulky and expensive to operate, which often makes it barely acceptable and cumbersome to use. We propose a different approach to secure communications between the processor and memory, comprising the following two features. The first — the use of residual classes as the basis of the closing data. Second — the approach to the organization of the exchange, precludes the use of specific subsystems within the defense. More specifically, the proposed approach to the protection of the transmitted data leaves no need for a specified center, thus depriving potential intruders of possibility to choose a dispatch center as an object of attack, and thus improving the security of data exchange. It is offered while exchanging data between the processor and memory, to assign the procedure of formation of keys directly on the participants in the data exchange (CPU and memory), but at the same time to produce a change of residual classes, which are used in the encryption process, faster than the minimum opening time of the selected keys. Thus, even if an attacker reveals the current parameters of the system of residual classes, they are turned out to be replaced by the others and in this race for the keys an attacker will always keep up with the information protection system. With regard to the system of protection based on the use of residual classes, this problem becomes even more urgent, as the level of resistance of the closing data, based on the system of residual classes, is below the resistance of many modern encryption systems.

Keywords: residue number system, processor, memory, information security, computing devices, data security.

UDC: 681.3.04

Received: 27.11.2014



© Steklov Math. Inst. of RAS, 2026