首页 > 最新文献

Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia最新文献

英文 中文
Analysis of acoustic direction finding methods for unmanned aerial vehicles 无人机声测向方法分析
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-09-28 DOI: 10.30837/rt.2022.3.210.08
V. Kartashov, M. Rybnykov, A. Kartashov, V.A. Pososhenko
Currently, classical means of detecting objects do not provide the necessary efficiency for detecting small UAVs, and acoustic location among the known methods for their observation is the most cost-effective solution. The article analyzes the well-known methods of direction finding of acoustic signals in order to select algorithms for processing UAV signals. Obtaining qualitative indicators of the analyzed algorithms was carried out by the method of statistical computer modeling in the Matlab environment. Based on the simulation results, it is shown that classical methods are the most stable under conditions of low signal-to-noise ratios. The GCC-PHAT direction finding algorithm, based on determining the difference in the time of arrival of a signal at spaced points, is computationally economical and simple enough to determine the direction to the UAV, but it is not capable of distinguishing more than one radiation source within the diagram orientation. Beamforming methods are also relatively easy to implement and computationally efficient, and are more robust at low signal-to-noise ratios. The SRP-NAM algorithm has a greater accuracy in determining angles than SRP-PHAT, so it can be an adequate replacement for the SRP-PHAT algorithm. High-resolution methods provide better directional resolution than classical methods, which, in the case of a limited microphone array aperture, is a positive factor in the design of an UAV direction finding station. High resolution methods were considered: non-coherent MUSIC, non-coherent normalized MUSIC and TOPS method. It is shown that incoherent MUSIC gives poor results in distinguishing close UAV signals, since unequal estimates of the entire frequency range are concentrated during bearing formation. The incoherent normalized MUSIC algorithm is able to efficiently use the entire frequency range of the UAV acoustic signal. The TOPS algorithm is inferior to the incoherent normalized MUSIC algorithm, and on the other hand, it does not require a priori estimates of the number of radiation sources.
目前,传统的目标探测手段无法为小型无人机的探测提供必要的效率,在已知的观测方法中,声学定位是最具成本效益的解决方案。分析了常用的声信号测向方法,以选择适合无人机信号处理的算法。在Matlab环境下,通过统计计算机建模的方法获得所分析算法的定性指标。仿真结果表明,在低信噪比条件下,经典方法是最稳定的。GCC-PHAT测向算法基于确定间隔点上信号到达时间的差异,在计算上足够经济和简单,可以确定无人机的方向,但它不能在图方向内区分多个辐射源。波束形成方法也相对容易实现和计算效率高,并且在低信噪比下更具鲁棒性。与SRP-PHAT相比,SRP-NAM算法在确定角度方面具有更高的精度,因此可以作为SRP-PHAT算法的合适替代品。高分辨率方法提供了比传统方法更好的方向分辨率,在麦克风阵列孔径有限的情况下,这是无人机测向站设计的一个积极因素。考虑了高分辨率方法:非相干MUSIC、非相干归一化MUSIC和TOPS方法。结果表明,非相干MUSIC在识别近距离无人机信号方面效果不佳,因为在方位形成过程中,整个频率范围的不相等估计集中在一起。非相干归一化MUSIC算法能够有效地利用无人机声信号的整个频率范围。TOPS算法优于非相干归一化MUSIC算法,另一方面,它不需要对辐射源的数量进行先验估计。
{"title":"Analysis of acoustic direction finding methods for unmanned aerial vehicles","authors":"V. Kartashov, M. Rybnykov, A. Kartashov, V.A. Pososhenko","doi":"10.30837/rt.2022.3.210.08","DOIUrl":"https://doi.org/10.30837/rt.2022.3.210.08","url":null,"abstract":"Currently, classical means of detecting objects do not provide the necessary efficiency for detecting small UAVs, and acoustic location among the known methods for their observation is the most cost-effective solution. \u0000The article analyzes the well-known methods of direction finding of acoustic signals in order to select algorithms for processing UAV signals. Obtaining qualitative indicators of the analyzed algorithms was carried out by the method of statistical computer modeling in the Matlab environment. \u0000Based on the simulation results, it is shown that classical methods are the most stable under conditions of low signal-to-noise ratios. The GCC-PHAT direction finding algorithm, based on determining the difference in the time of arrival of a signal at spaced points, is computationally economical and simple enough to determine the direction to the UAV, but it is not capable of distinguishing more than one radiation source within the diagram orientation. Beamforming methods are also relatively easy to implement and computationally efficient, and are more robust at low signal-to-noise ratios. The SRP-NAM algorithm has a greater accuracy in determining angles than SRP-PHAT, so it can be an adequate replacement for the SRP-PHAT algorithm. \u0000High-resolution methods provide better directional resolution than classical methods, which, in the case of a limited microphone array aperture, is a positive factor in the design of an UAV direction finding station. High resolution methods were considered: non-coherent MUSIC, non-coherent normalized MUSIC and TOPS method. It is shown that incoherent MUSIC gives poor results in distinguishing close UAV signals, since unequal estimates of the entire frequency range are concentrated during bearing formation. The incoherent normalized MUSIC algorithm is able to efficiently use the entire frequency range of the UAV acoustic signal. The TOPS algorithm is inferior to the incoherent normalized MUSIC algorithm, and on the other hand, it does not require a priori estimates of the number of radiation sources.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"199 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76956878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-thermally conductive composite polyimide materials 高导热复合聚酰亚胺材料
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-09-28 DOI: 10.30837/rt.2022.3.210.12
V. Borshchov, O. Listratenko, M. Protsenko, I. Tymchuk, O. Kravchenko, O.V. Syddia, M. Slipchenko, B. Chichkov
This review is devoted to analysis of works in the field of creating electrically insulating heat-conducting polyimide composite films based on powders of micro-, submicro- or nano-sized fillers with high dielectric and heat-conducting properties for use as effective thermal interface materials in various electronic devices in instrument making. Particular attention is paid to studies on the influence of the size of nano- and microparticles of inorganic fillers on the heat-nducting, dielectric, and physical-mechanical properties of nanocomposite polyimide materials. The analysis of the results of work on the study of the dependence of thermal conductivity on the ratios of micron and nanosized particles in mixtures and their number in polyimides and on the conditions of their polymerization was carried out to confirm the possibility of increasing the thermal conductivity values of promising polyimide materials from 0.12 W/(m•K) up to 5¸10 W/ (m•K). It is noted that the highest thermal conductivity of industrially produced modern polyimide films on market does not exceed 0.75¸0.8 W/(m•K). The task of creating inexpensive, but high-quality heat-conductive polyimide composite materials with sufficiently high thermal conductivity without deteriorating their strength and ductility characteristics is currently relevant and technically in demand.
本文综述了以微、亚微或纳米级粉末填料为基础,制备具有高介电性和导热性的导电聚酰亚胺复合薄膜的研究进展,该复合薄膜可作为仪器制造中各种电子器件的有效热界面材料。重点研究了无机填料的纳米和微粒尺寸对纳米复合聚酰亚胺材料的导热性能、介电性能和物理力学性能的影响。通过对导热系数与聚酰亚胺中微米级和纳米级颗粒的比例、数量以及聚合条件的关系的研究结果进行分析,确定了将有前途的聚酰亚胺材料的导热系数从0.12 W/(m•K)提高到5 μ 10 W/(m•K)的可能性。值得注意的是,市场上工业生产的现代聚酰亚胺薄膜的最高导热系数不超过0.75和0.8 W/(m•K)。在不降低其强度和延展性的情况下,制造具有足够高导热性的廉价、高质量导热聚酰亚胺复合材料是当前的相关任务,也是技术上的需求。
{"title":"High-thermally conductive composite polyimide materials","authors":"V. Borshchov, O. Listratenko, M. Protsenko, I. Tymchuk, O. Kravchenko, O.V. Syddia, M. Slipchenko, B. Chichkov","doi":"10.30837/rt.2022.3.210.12","DOIUrl":"https://doi.org/10.30837/rt.2022.3.210.12","url":null,"abstract":"This review is devoted to analysis of works in the field of creating electrically insulating heat-conducting polyimide composite films based on powders of micro-, submicro- or nano-sized fillers with high dielectric and heat-conducting properties for use as effective thermal interface materials in various electronic devices in instrument making. Particular attention is paid to studies on the influence of the size of nano- and microparticles of inorganic fillers on the heat-nducting, dielectric, and physical-mechanical properties of nanocomposite polyimide materials. The analysis of the results of work on the study of the dependence of thermal conductivity on the ratios of micron and nanosized particles in mixtures and their number in polyimides and on the conditions of their polymerization was carried out to confirm the possibility of increasing the thermal conductivity values of promising polyimide materials from 0.12 W/(m•K) up to 5¸10 W/ (m•K). It is noted that the highest thermal conductivity of industrially produced modern polyimide films on market does not exceed 0.75¸0.8 W/(m•K). The task of creating inexpensive, but high-quality heat-conductive polyimide composite materials with sufficiently high thermal conductivity without deteriorating their strength and ductility characteristics is currently relevant and technically in demand.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"53 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91150566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Directional diagrams of acoustic radiation from unmanned aerial vehicles 无人机声辐射方向图
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-09-28 DOI: 10.30837/rt.2022.3.210.10
V. Kartashov, V.M. Oleynikov, I.S. Seleznyov, O.V. Kartashov
When solving the urgent task of detecting small unmanned aerial vehicles (UAVs) by their acoustic radiation (AR), there is a need to study the AR characteristics of UAVs. Therefore, considerable attention is paid in the literature to theoretical and experimental studies of the structure and parameters of the sound field created by UAVs. This article is devoted to the experimental study of the directional diagrams of the acoustic radiation from the DJI Phantom 3 unmanned aerial vehicle. The UAV AR recording experiment was conducted in a "silenced" chamber, the walls of which are covered with sound-absorbing panels with a surface of a special geometric shape. The experimental setup includes the UAV mounted on a boom, a microphone for sound recording, and a boom for the microphone. Studies of the structure and parameters of the sound field of the quadcopter have shown that the spectra of the emitted signal have pronounced harmonic components with frequencies multiples of the propeller rotation frequency. The spectral components have the greatest power in the frequency range up to 500 Hz, where the first harmonic has the largest amplitude, and then the spectrum components decrease to the ambient noise level. Obtained two-dimensional and three-dimensional directional diagrams of the UAV AR with and without propellers when only the aircraft engine is operating. It is shown that in the absence of screws, the acoustic radiation is much weaker in level. The experimental data was also presented in the form of three-dimensional AR diagrams for the four harmonics of the acoustic signal, and it was analyzed what changes in the spatial orientation of the UAV AR are observed based on changes in the three-dimensional figure for each of the radiation harmonics. It is shown that the spatial distribution of both the total energy (over the entire frequency range) of the acoustic signal and the energy of its individual spectral (harmonic) components is significantly anisotropic. It follows from this conclusion that the range of UAV detection and observation in real conditions is a statistical value that depends on the angle of its observation.
在解决利用声辐射探测小型无人机的迫切任务时,需要对无人机的声辐射特性进行研究。因此,文献对无人机声场结构和参数的理论和实验研究给予了相当的重视。本文对大疆幻影3无人机的声辐射方向图进行了实验研究。无人机AR记录实验在“静音”室中进行,其墙壁覆盖有特殊几何形状表面的吸声板。实验装置包括UAV安装在吊杆上,一个用于录音的麦克风,和一个用于麦克风的吊杆。对四轴飞行器声场结构和参数的研究表明,发射信号的频谱具有明显的谐波成分,其频率是螺旋桨旋转频率的几倍。在500 Hz以内的频率范围内,频谱分量的功率最大,在该频率范围内,一次谐波的幅值最大,然后频谱分量减小到环境噪声水平。获得了仅飞机发动机工作时无人机AR带螺旋桨和不带螺旋桨的二维和三维方向图。结果表明,在没有螺钉的情况下,声辐射在水平上要弱得多。实验数据以声信号四次谐波的三维AR图的形式呈现,分析了基于各次辐射谐波三维图的变化观察到无人机AR的空间方向变化。结果表明,声信号的总能量(在整个频率范围内)及其各个频谱(谐波)分量的能量的空间分布都具有显著的各向异性。由此得出,无人机在真实条件下的探测观测距离是一个统计值,它取决于其观测角度。
{"title":"Directional diagrams of acoustic radiation from unmanned aerial vehicles","authors":"V. Kartashov, V.M. Oleynikov, I.S. Seleznyov, O.V. Kartashov","doi":"10.30837/rt.2022.3.210.10","DOIUrl":"https://doi.org/10.30837/rt.2022.3.210.10","url":null,"abstract":"When solving the urgent task of detecting small unmanned aerial vehicles (UAVs) by their acoustic radiation (AR), there is a need to study the AR characteristics of UAVs. Therefore, considerable attention is paid in the literature to theoretical and experimental studies of the structure and parameters of the sound field created by UAVs. \u0000This article is devoted to the experimental study of the directional diagrams of the acoustic radiation from the DJI Phantom 3 unmanned aerial vehicle. The UAV AR recording experiment was conducted in a \"silenced\" chamber, the walls of which are covered with sound-absorbing panels with a surface of a special geometric shape. The experimental setup includes the UAV mounted on a boom, a microphone for sound recording, and a boom for the microphone. \u0000Studies of the structure and parameters of the sound field of the quadcopter have shown that the spectra of the emitted signal have pronounced harmonic components with frequencies multiples of the propeller rotation frequency. The spectral components have the greatest power in the frequency range up to 500 Hz, where the first harmonic has the largest amplitude, and then the spectrum components decrease to the ambient noise level. \u0000Obtained two-dimensional and three-dimensional directional diagrams of the UAV AR with and without propellers when only the aircraft engine is operating. It is shown that in the absence of screws, the acoustic radiation is much weaker in level. The experimental data was also presented in the form of three-dimensional AR diagrams for the four harmonics of the acoustic signal, and it was analyzed what changes in the spatial orientation of the UAV AR are observed based on changes in the three-dimensional figure for each of the radiation harmonics. \u0000It is shown that the spatial distribution of both the total energy (over the entire frequency range) of the acoustic signal and the energy of its individual spectral (harmonic) components is significantly anisotropic. It follows from this conclusion that the range of UAV detection and observation in real conditions is a statistical value that depends on the angle of its observation.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"37 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80180302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative characteristics of Crystals-Kyber and Skelya key encapsulation algorithms (DSTU 8961-2019) Crystals-Kyber和Skelya密钥封装算法的比较特性(DSTU 8961-2019)
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-09-28 DOI: 10.30837/rt.2022.3.210.01
I. Gorbenko, Ye.G. Kachko, M. Yesina, V. Ponomar
In recent years, there has been a significant amount of research related to the development of quantum computers. If such a computer were to be built, it would be able to break existing public-key cryptosystems that are currently used for many purposes. This will seriously affect the privacy and integrity of digital communications, etc. That is why special attention is currently being paid to post-quantum cryptography, the main goal of which is the development of cryptographic systems that are protected from both quantum and classical attacks, and will also be able to interact with existing communication protocols and networks. In view of the significant importance of the practical application of directional encryption algorithms, at the international and state level, special attention was paid to the implementation of the proposed requirements for key encapsulation protocols. Key-establishment algorithms (KEA) form a common secret – the key for a symmetric encryption algorithm. The paper considers two KEA algorithms that use algebraic lattices: one of the finalists of the 3rd round Crystals-Kyber and the Skelya algorithm (DSTU 8961-2019). The Kyber algorithm first performs asymmetric encryption of a 32-byte message, and then generates a shared secret. The Skelya algorithm performs the same actions, but for asymmetric encryption, it uses messages of any length that do not exceed the maximum possible. That is why the last algorithm can be used not only as a KEA algorithm, but also as an asymmetric encryption algorithm. According to the NIST Security level, the Kyber algorithm provides cryptographic 1, 3, and 5 security levels, and the Rock algorithm provides cryptographic 3, 5, and 7 security levels. The cryptographic stability that is ensured for both algorithms is determined by a set of parameters. Thus, the purpose of this work is to review the details of the implementation of each of the mentioned algorithms, to compare the speed of the key generation, encapsulation and decapsulation algorithms for the Kyber and Skelya algorithms in terms of key data lengths, and the encapsulation result and computational complexity of both algorithms.
近年来,人们对量子计算机的发展进行了大量的研究。如果建造这样一台计算机,它将能够破解目前用于许多目的的现有公钥密码系统。这将严重影响数字通信的隐私性和完整性等。这就是为什么目前特别关注后量子密码学,其主要目标是开发加密系统,使其免受量子和经典攻击,并能够与现有的通信协议和网络进行交互。鉴于定向加密算法的实际应用具有重要意义,在国际和国家一级,特别注意了对密钥封装协议提出的要求的实现。密钥建立算法(KEA)形成一个公共秘密——对称加密算法的密钥。本文考虑了两种使用代数格的KEA算法:第三轮决赛入围者之一Crystals-Kyber和Skelya算法(DSTU 8961-2019)。Kyber算法首先对32字节的消息进行非对称加密,然后生成共享密钥。Skelya算法执行相同的操作,但对于非对称加密,它使用不超过最大可能长度的任何消息。这就是为什么最后一种算法不仅可以用作KEA算法,还可以用作非对称加密算法的原因。根据NIST的安全级别,Kyber算法提供了cryptographic 1、3和5安全级别,Rock算法提供了cryptographic 3、5和7安全级别。确保这两种算法的密码稳定性是由一组参数决定的。因此,本研究的目的是回顾上述每种算法的实现细节,比较Kyber和Skelya算法在密钥数据长度方面的密钥生成、封装和解封装算法的速度,以及两种算法的封装结果和计算复杂度。
{"title":"Comparative characteristics of Crystals-Kyber and Skelya key encapsulation algorithms (DSTU 8961-2019)","authors":"I. Gorbenko, Ye.G. Kachko, M. Yesina, V. Ponomar","doi":"10.30837/rt.2022.3.210.01","DOIUrl":"https://doi.org/10.30837/rt.2022.3.210.01","url":null,"abstract":"In recent years, there has been a significant amount of research related to the development of quantum computers. If such a computer were to be built, it would be able to break existing public-key cryptosystems that are currently used for many purposes. This will seriously affect the privacy and integrity of digital communications, etc. That is why special attention is currently being paid to post-quantum cryptography, the main goal of which is the development of cryptographic systems that are protected from both quantum and classical attacks, and will also be able to interact with existing communication protocols and networks. In view of the significant importance of the practical application of directional encryption algorithms, at the international and state level, special attention was paid to the implementation of the proposed requirements for key encapsulation protocols. Key-establishment algorithms (KEA) form a common secret – the key for a symmetric encryption algorithm. The paper considers two KEA algorithms that use algebraic lattices: one of the finalists of the 3rd round Crystals-Kyber and the Skelya algorithm (DSTU 8961-2019). The Kyber algorithm first performs asymmetric encryption of a 32-byte message, and then generates a shared secret. The Skelya algorithm performs the same actions, but for asymmetric encryption, it uses messages of any length that do not exceed the maximum possible. That is why the last algorithm can be used not only as a KEA algorithm, but also as an asymmetric encryption algorithm. According to the NIST Security level, the Kyber algorithm provides cryptographic 1, 3, and 5 security levels, and the Rock algorithm provides cryptographic 3, 5, and 7 security levels. The cryptographic stability that is ensured for both algorithms is determined by a set of parameters. Thus, the purpose of this work is to review the details of the implementation of each of the mentioned algorithms, to compare the speed of the key generation, encapsulation and decapsulation algorithms for the Kyber and Skelya algorithms in terms of key data lengths, and the encapsulation result and computational complexity of both algorithms.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"55 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84228970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Processing of information from networks of airspace surveillance radar systems 处理来自空域监视雷达系统网络的信息
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-09-28 DOI: 10.30837/rt.2022.3.210.11
I. Svyd, M. Tkach, A. Sierikov, O.V. Korotich, S. Datsko, D.O. Sukhorukov, T.S. Machonis
The presented paper examines the principles and methods for processing of information from airspace surveillance radar networks. Information technologies allow implementing automatic collection, processing, storage, transmission and issuance of radar information to users. In this work, the synthesis and analysis of the optimal structure of the interstage processing of signal data and radar information of primary processing in the network of airspace surveillance radar systems is carried out. The quality of information from radar networks of airspace surveillance systems affects almost all indicators of the quality of the radar systems network functioning. The stages of radar information processing in radar systems networks are analyzed. The importance of specifying the above stages for creating a complete picture of the air situation in the area of responsibility is shown. To improve the quality of information support for consumers, a network of radar systems requires information processing at all stages. At each stage of information processing, information processing quality indicators were analyzed. This made it possible to show that the staged implementation of information processing, on the one hand, simplified the optimization of processing within each processing stage, but on the other hand, it made it difficult to carry out compatible optimization of both the detection of an aerial object and the measurement of the coordinates of an aerial object. The synthesized structure of processing radar information of the network of radar systems of airspace surveillance, which in its turn made it possible to carry out interstage optimization of processing of both signal data and primary processing information. Calculations have shown that the method of information processing, in which the combination of information is carried out at the level of decision-making on the detection of airborne objects in each signal data processing channel, has some advantages in the quality of information processing of the network of radar systems compared to the one currently used. time option combination information at the stage of signal processing. At the same time, for the method of combining information at the level of decision-making about the detection of aerial objects, the flow of transmitted information to the joint processing point is significantly reduced. All this allows improving the quality of information processing in the airspace control system.
本文研究了空域监视雷达网络信息处理的原理和方法。信息技术允许实现自动收集、处理、存储、传输和向用户发布雷达信息。本文对空域监视雷达系统网络中信号数据级间处理和雷达信息一级处理的优化结构进行了综合分析。来自空域监视系统雷达网络的信息质量影响到雷达系统网络功能质量的几乎所有指标。分析了雷达系统网络中雷达信息处理的各个阶段。说明上述各阶段的重要性,以便全面了解责任地区的空气情况。为了提高为消费者提供信息支持的质量,雷达系统网络需要在所有阶段进行信息处理。在信息处理的各个阶段,分析了信息处理质量指标。这就可以表明,分阶段实施信息处理,一方面简化了各处理阶段内的处理优化,但另一方面,也使得航拍目标的探测和航拍目标坐标的测量难以同时进行兼容优化。空域监视雷达系统网络处理雷达信息的综合结构,使信号数据处理和初级处理信息处理的级间优化成为可能。计算表明,该信息处理方法在各个信号数据处理通道对机载目标的探测进行决策层面的信息组合处理,与目前使用的雷达系统网络信息处理质量相比,具有一定的优势。时间选项组合信息阶段的信号处理。同时,对于空中目标探测决策层面的信息组合方法,传输到联合处理点的信息流显著减少。所有这些都可以提高空域控制系统中信息处理的质量。
{"title":"Processing of information from networks of airspace surveillance radar systems","authors":"I. Svyd, M. Tkach, A. Sierikov, O.V. Korotich, S. Datsko, D.O. Sukhorukov, T.S. Machonis","doi":"10.30837/rt.2022.3.210.11","DOIUrl":"https://doi.org/10.30837/rt.2022.3.210.11","url":null,"abstract":"The presented paper examines the principles and methods for processing of information from airspace surveillance radar networks. Information technologies allow implementing automatic collection, processing, storage, transmission and issuance of radar information to users. In this work, the synthesis and analysis of the optimal structure of the interstage processing of signal data and radar information of primary processing in the network of airspace surveillance radar systems is carried out. The quality of information from radar networks of airspace surveillance systems affects almost all indicators of the quality of the radar systems network functioning. The stages of radar information processing in radar systems networks are analyzed. The importance of specifying the above stages for creating a complete picture of the air situation in the area of responsibility is shown. To improve the quality of information support for consumers, a network of radar systems requires information processing at all stages. At each stage of information processing, information processing quality indicators were analyzed. This made it possible to show that the staged implementation of information processing, on the one hand, simplified the optimization of processing within each processing stage, but on the other hand, it made it difficult to carry out compatible optimization of both the detection of an aerial object and the measurement of the coordinates of an aerial object. The synthesized structure of processing radar information of the network of radar systems of airspace surveillance, which in its turn made it possible to carry out interstage optimization of processing of both signal data and primary processing information. Calculations have shown that the method of information processing, in which the combination of information is carried out at the level of decision-making on the detection of airborne objects in each signal data processing channel, has some advantages in the quality of information processing of the network of radar systems compared to the one currently used. time option combination information at the stage of signal processing. At the same time, for the method of combining information at the level of decision-making about the detection of aerial objects, the flow of transmitted information to the joint processing point is significantly reduced. All this allows improving the quality of information processing in the airspace control system.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"12 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74306919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematical models of non-stationary random processes in the SVVP representation SVVP表示中非平稳随机过程的数学模型
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-09-28 DOI: 10.30837/rt.2022.3.210.14
V. Tikhonov, V. Kartashov, O.V. Kartashov, V.A. Pososhenko
The work examines methods and mathematical models that provide the possibility of researching the statistical characteristics of complex and non-stationary random processes describing a wide class of physical phenomena. The proposed models can be used to study the processes observed in various fields of human activity, namely, to analyze the trajectories of unmanned aerial vehicles, their acoustic signals, meteorological processes reflecting the state of the atmosphere. Real and simulated non-stationary random processes considered in the work are represented by the complex vector random process (CVRP) model. In this case, the length of the subvector is equal to the period of the seasonal component. In fact, in such a representation, the time series readings are replaced by their aggregate, i.e. subvectors. Statistical relationships are analyzed for subvectors, and not, as usual, for process counts. If the length of the subvector is equal to one, all operations in the SVVP representation are equivalent to the usual operations for time series. The mathematical apparatus developed in the article was used to analyze changes in time series of atmospheric temperature observed over a long period of time; average annual temperatures were estimated with subsequent smoothing with a low-pass filter. The results obtained can be used to analyze medium-term and long-term changes in atmospheric conditions, refine the results obtained by traditional methods of mathematical statistics, analyze and predict data flows in mobile communication networks, as well as in other areas of human activity.
这项工作考察了方法和数学模型,这些方法和数学模型提供了研究描述广泛物理现象的复杂和非平稳随机过程的统计特征的可能性。所提出的模型可用于研究在人类活动的各个领域中观测到的过程,即分析无人飞行器的轨迹、它们的声信号、反映大气状态的气象过程。研究中考虑的真实和模拟的非平稳随机过程用复向量随机过程(CVRP)模型表示。在这种情况下,子向量的长度等于季节分量的周期。事实上,在这种表示中,时间序列读数被它们的集合,即子向量所取代。分析子向量的统计关系,而不是像通常那样分析进程计数。如果子向量的长度等于1,则SVVP表示中的所有操作都等同于时间序列的通常操作。本文所研制的数学装置用于分析长时间观测到的大气温度时间序列的变化;年平均气温估计,随后平滑与低通滤波器。所获得的结果可用于分析大气条件的中期和长期变化,改进传统数理统计方法所获得的结果,分析和预测移动通信网络以及其他人类活动领域的数据流。
{"title":"Mathematical models of non-stationary random processes in the SVVP representation","authors":"V. Tikhonov, V. Kartashov, O.V. Kartashov, V.A. Pososhenko","doi":"10.30837/rt.2022.3.210.14","DOIUrl":"https://doi.org/10.30837/rt.2022.3.210.14","url":null,"abstract":"The work examines methods and mathematical models that provide the possibility of researching the statistical characteristics of complex and non-stationary random processes describing a wide class of physical phenomena. The proposed models can be used to study the processes observed in various fields of human activity, namely, to analyze the trajectories of unmanned aerial vehicles, their acoustic signals, meteorological processes reflecting the state of the atmosphere. \u0000Real and simulated non-stationary random processes considered in the work are represented by the complex vector random process (CVRP) model. In this case, the length of the subvector is equal to the period of the seasonal component. In fact, in such a representation, the time series readings are replaced by their aggregate, i.e. subvectors. Statistical relationships are analyzed for subvectors, and not, as usual, for process counts. If the length of the subvector is equal to one, all operations in the SVVP representation are equivalent to the usual operations for time series. \u0000The mathematical apparatus developed in the article was used to analyze changes in time series of atmospheric temperature observed over a long period of time; average annual temperatures were estimated with subsequent smoothing with a low-pass filter. The results obtained can be used to analyze medium-term and long-term changes in atmospheric conditions, refine the results obtained by traditional methods of mathematical statistics, analyze and predict data flows in mobile communication networks, as well as in other areas of human activity.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"20 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91220084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determining the location of small unmanned aerial vehicles by acoustic radiation 利用声辐射确定小型无人机的位置
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-09-28 DOI: 10.30837/rt.2022.3.210.09
V. Oleynikov, V. Kartashov, S. Sheiko, O. Zubkov, E.I. Oleynikova
The features of the acoustic method for determining the location of the UAV using microphone arrays are considered: classical methods, super-resolution methods and the method of the difference in the arrival time of acoustic oscillations. A description of a sodar with a minimum number of microphones is given. The factors influencing the magnitude of the error in determining the coordinates of the UAV are analyzed. Estimates of the instrumental location error and errors caused by the Doppler effect were obtained by simulation modeling for a given configuration of the sodar microphone array. Using the considered sodar, the coordinates of a moving UAV were measured in open areas. Processing of field measurement results shows that the absolute values of errors in determining the coordinates of the UAV obtained using sodar at a distance of up to 100 m in 95% of cases do not exceed 3 m and in determining the height of no more than 1 m. Measurements of the azimuth and elevation angle are quite accurate at the same time high resolution.
考虑了利用传声器阵列确定无人机位置的声学方法的特点:经典方法、超分辨率方法和声学振荡到达时间差法。给出了一种具有最小麦克风数量的雷达的描述。分析了影响无人机坐标确定误差大小的因素。对给定的雷达传声器阵列配置进行了仿真建模,得到了仪器定位误差和多普勒效应引起的误差估计。利用所考虑的雷达,在开放区域测量移动无人机的坐标。对实测结果的处理表明,在95%的情况下,在100 m范围内用雷达确定无人机坐标的误差绝对值不超过3 m,确定高度的误差绝对值不超过1 m。方位角和仰角的测量非常精确,同时分辨率高。
{"title":"Determining the location of small unmanned aerial vehicles by acoustic radiation","authors":"V. Oleynikov, V. Kartashov, S. Sheiko, O. Zubkov, E.I. Oleynikova","doi":"10.30837/rt.2022.3.210.09","DOIUrl":"https://doi.org/10.30837/rt.2022.3.210.09","url":null,"abstract":"The features of the acoustic method for determining the location of the UAV using microphone arrays are considered: classical methods, super-resolution methods and the method of the difference in the arrival time of acoustic oscillations. A description of a sodar with a minimum number of microphones is given. The factors influencing the magnitude of the error in determining the coordinates of the UAV are analyzed. Estimates of the instrumental location error and errors caused by the Doppler effect were obtained by simulation modeling for a given configuration of the sodar microphone array. Using the considered sodar, the coordinates of a moving UAV were measured in open areas. Processing of field measurement results shows that the absolute values of errors in determining the coordinates of the UAV obtained using sodar at a distance of up to 100 m in 95% of cases do not exceed 3 m and in determining the height of no more than 1 m. Measurements of the azimuth and elevation angle are quite accurate at the same time high resolution.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"25 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77222929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Factorial number system for nonlinear substitutions generation 阶乘数制的非线性代换生成
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-06-24 DOI: 10.30837/rt.2022.2.209.04
Yaroslav Derevianko, Y. Gorbenko, О.О. Kuznetsov
Modern cryptographic applications use cryptographic algorithms with a symmetric key. They provide high conversion rates and resistance to crypto-graphic attacks. To complicate the plaintext – cipher-text ratio, symmetric ciphers usually use nonlinear substitutions (S-boxes). S-boxes cryptographic metrics play a crucial role in ensuring resilience to most known attacks (differential, linear, algebraic, and other cryptanalysis methods). However, generating efficient s-boxes is a challenge. Even for small input/output sizes, there are an extremely large number of possible solutions. Usually, the substitution is represented as a set of Boolean functions. This allows you to apply discrete transformations, for example, Walsh-Hadamard, to evaluate cryptographic indicators. However, methods for generating s-boxes by selecting suitable Boolean functions are extremely complex. Therefore, it is necessary to study new mathematical methods for representing nonlinear substitutions, studying their cryptographic properties, and developing generation algorithms. In this paper, we propose applying factorial number systems to represent nonlinear substitutions. Each substitution can be represented in a unique way through a set of inversions, which, in turn, can be transformed into a factorial number. That is, we can naturally arrange all substitutions by numbering them in the factorial number system. We give examples of such numbering and investigate the cryptographic characteristics of S-boxes with their initial numbers. In particular, we show how the variable functions used in heuristic algorithms for generating non-linear substitutions change. The results obtained can be used to simplify heuristic methods in order to speed up the generation of non-linear substitutions.
现代密码学应用程序使用具有对称密钥的密码学算法。它们提供高转换率和抗加密攻击。为了使明文-密文比复杂化,对称密码通常使用非线性替换(s -box)。s盒密码度量在确保对大多数已知攻击(微分、线性、代数和其他密码分析方法)的弹性方面起着至关重要的作用。然而,生成高效的s-box是一个挑战。即使对于较小的输入/输出规模,也存在非常多的可能解决方案。通常,替换被表示为一组布尔函数。这允许您应用离散转换(例如Walsh-Hadamard)来评估加密指示符。然而,通过选择合适的布尔函数来生成s-box的方法是非常复杂的。因此,有必要研究新的数学方法来表示非线性替换,研究其密码学性质,并开发生成算法。本文提出用阶乘数系统来表示非线性替换。每个替换都可以通过一组反转以一种独特的方式表示,而这些反转又可以转换为一个阶乘数。也就是说,我们可以通过在阶乘数制中编号来自然地排列所有的替换。我们给出了这种编号的例子,并研究了具有初始编号的s盒的密码学特性。特别是,我们展示了在启发式算法中用于生成非线性替换的变量函数是如何变化的。所得结果可用于简化启发式方法,以加快非线性替换的生成。
{"title":"Factorial number system for nonlinear substitutions generation","authors":"Yaroslav Derevianko, Y. Gorbenko, О.О. Kuznetsov","doi":"10.30837/rt.2022.2.209.04","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.04","url":null,"abstract":"Modern cryptographic applications use cryptographic algorithms with a symmetric key. They provide high conversion rates and resistance to crypto-graphic attacks. To complicate the plaintext – cipher-text ratio, symmetric ciphers usually use nonlinear substitutions (S-boxes). S-boxes cryptographic metrics play a crucial role in ensuring resilience to most known attacks (differential, linear, algebraic, and other cryptanalysis methods). However, generating efficient s-boxes is a challenge. Even for small input/output sizes, there are an extremely large number of possible solutions. Usually, the substitution is represented as a set of Boolean functions. This allows you to apply discrete transformations, for example, Walsh-Hadamard, to evaluate cryptographic indicators. However, methods for generating s-boxes by selecting suitable Boolean functions are extremely complex. Therefore, it is necessary to study new mathematical methods for representing nonlinear substitutions, studying their cryptographic properties, and developing generation algorithms. In this paper, we propose applying factorial number systems to represent nonlinear substitutions. Each substitution can be represented in a unique way through a set of inversions, which, in turn, can be transformed into a factorial number. That is, we can naturally arrange all substitutions by numbering them in the factorial number system. We give examples of such numbering and investigate the cryptographic characteristics of S-boxes with their initial numbers. In particular, we show how the variable functions used in heuristic algorithms for generating non-linear substitutions change. The results obtained can be used to simplify heuristic methods in order to speed up the generation of non-linear substitutions.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89241452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Properties of the cost function in the iterative algorithm for generating nonlinear substitution 非线性代换迭代算法中代价函数的性质
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-06-24 DOI: 10.30837/rt.2022.2.209.02
О.О. Kuznetsov, Yu.I. Горбенко, М.О. Poluyanenko, S. Kandiy, E.D. Matveeva
To ensure the security of information technology, cryptographic information protection tools are used, in particular block and stream encryption algorithms with a symmetric key. Reliability and cryptographic strength of cryptoalgorithms is provided by the properties of the applied primitives. For example, non-linear substitutions (S-boxes) are used as the main component of modern symmetric ciphers. Therefore, generation of substitutions is an important scientific task directly related to the security of information technology and improvement of modern symmetric ciphers. The paper investigates the properties of iterative algorithms for generating non-linear substitutions and special cost functions, which play a decisive role in the heuristic search for S-boxes with the required properties. We consider the cost function of the WCF (Cost Function of the content of the Walsh-Hadamard spectrum) and optimize its parameters. The obtained optimization results in combination with the Hill Climbing iterative search algorithm can reduce significantly the number of iterations. In particular, we show that for a substitution search with a non-linearity of 104, on average, we reduce the computational complexity of generation by more than 20%. In addition, it is possible to increase the success rate of the heuristic search. In particular, for the selected settings, in 100% of cases, a beaktive S-box with a non-linearity of 104 was found.
为了保证信息技术的安全,使用了加密信息保护工具,特别是具有对称密钥的块和流加密算法。密码算法的可靠性和密码强度由所应用原语的属性提供。例如,非线性替换(s -box)被用作现代对称密码的主要组成部分。因此,替换生成是一项重要的科学任务,直接关系到信息技术的安全和现代对称密码的改进。本文研究了产生非线性替换和特殊代价函数的迭代算法的性质,它们在启发式搜索具有所需性质的s -box中起着决定性的作用。我们考虑了WCF的代价函数(沃尔什-哈达玛德谱内容的代价函数),并对其参数进行了优化。将得到的优化结果与爬山迭代搜索算法相结合,可以显著减少迭代次数。特别是,我们表明,对于非线性为104的替代搜索,平均而言,我们将生成的计算复杂度降低了20%以上。此外,还可以提高启发式搜索的成功率。特别是,在所选的设置中,在100%的情况下,发现了非线性为104的被动s盒。
{"title":"Properties of the cost function in the iterative algorithm for generating nonlinear substitution","authors":"О.О. Kuznetsov, Yu.I. Горбенко, М.О. Poluyanenko, S. Kandiy, E.D. Matveeva","doi":"10.30837/rt.2022.2.209.02","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.02","url":null,"abstract":"To ensure the security of information technology, cryptographic information protection tools are used, in particular block and stream encryption algorithms with a symmetric key. Reliability and cryptographic strength of cryptoalgorithms is provided by the properties of the applied primitives. For example, non-linear substitutions (S-boxes) are used as the main component of modern symmetric ciphers. Therefore, generation of substitutions is an important scientific task directly related to the security of information technology and improvement of modern symmetric ciphers. The paper investigates the properties of iterative algorithms for generating non-linear substitutions and special cost functions, which play a decisive role in the heuristic search for S-boxes with the required properties. We consider the cost function of the WCF (Cost Function of the content of the Walsh-Hadamard spectrum) and optimize its parameters. The obtained optimization results in combination with the Hill Climbing iterative search algorithm can reduce significantly the number of iterations. In particular, we show that for a substitution search with a non-linearity of 104, on average, we reduce the computational complexity of generation by more than 20%. In addition, it is possible to increase the success rate of the heuristic search. In particular, for the selected settings, in 100% of cases, a beaktive S-box with a non-linearity of 104 was found.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"3 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90186333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RAINBOW algorithm and its ability to resist RBS attacks and third party channels RAINBOW算法及其抵抗RBS攻击和第三方通道的能力
IF 0.3 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2022-06-24 DOI: 10.30837/rt.2022.2.209.05
D. Harmash
The essence and possibilities of protecting the Rainbow post-quantum cryptographic algorithm are considered. The main properties of algorithms based on multidimensional quadratic transformations are studied. An assessment is given of what resources and computational energy are needed for the successful use of algorithms based on multidimensional quadratic transformations. The ability to protect the algorithm against attacks by third-party channels is analyzed. It is studied how successfully a cryptographic algorithm based on Rainbow multivariate quadratic transformations can withstand RBS attacks. A detailed description of the steps used to build an attack on a cryptographic algorithm based on Rainbow multivariate quadratic transforms is given. A structural analysis of the Rainbow algorithm is performed. Detailed conclusions are made regarding the performed analyzes. An assessment of the stability and complexity of the cryptographic encryption algorithm and electronic signature based on multivariate quadratic transformations is given.
分析了彩虹后量子加密算法的本质和保护的可能性。研究了基于多维二次变换的算法的主要性质。评估了成功使用基于多维二次变换的算法所需要的资源和计算能量。分析了该算法抵御第三方通道攻击的能力。研究了基于彩虹多元二次变换的密码算法如何成功抵御RBS攻击。详细描述了对基于彩虹多元二次变换的密码算法进行攻击的步骤。对彩虹算法进行了结构分析。对所进行的分析进行了详细的总结。对基于多元二次变换的密码加密算法和电子签名的稳定性和复杂性进行了评价。
{"title":"RAINBOW algorithm and its ability to resist RBS attacks and third party channels","authors":"D. Harmash","doi":"10.30837/rt.2022.2.209.05","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.05","url":null,"abstract":"The essence and possibilities of protecting the Rainbow post-quantum cryptographic algorithm are considered. The main properties of algorithms based on multidimensional quadratic transformations are studied. An assessment is given of what resources and computational energy are needed for the successful use of algorithms based on multidimensional quadratic transformations. The ability to protect the algorithm against attacks by third-party channels is analyzed. It is studied how successfully a cryptographic algorithm based on Rainbow multivariate quadratic transformations can withstand RBS attacks. A detailed description of the steps used to build an attack on a cryptographic algorithm based on Rainbow multivariate quadratic transforms is given. A structural analysis of the Rainbow algorithm is performed. Detailed conclusions are made regarding the performed analyzes. An assessment of the stability and complexity of the cryptographic encryption algorithm and electronic signature based on multivariate quadratic transformations is given.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"33 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83032756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1