Pub Date : 2022-06-24DOI: 10.30837/rt.2022.2.209.16
I. Svyd, Valerii V. Semenets, O. Maltsev, M. Tkach, S.V. Starokozhev, O.O. Datsenko, I. Shevtsov
The presented work considers the place and role of wide-area multi-position airspace surveillance in the information support of airspace control and air traffic control systems. Classification of methods for estimating the coordinates of air objects using various primary measurements of the parameters of received signals in multi-position observation is given. A quantitative assessment of the accuracy in determining the air objects’ coordinates by the considered methods is also given. The capabilities of wide-area multi-position surveillance systems increase significantly when using the principles of constructing a secondary surveillance radar as a non-synchronous network, and an aircraft responder as an open single-channel queuing system with servicing the first correctly received request signal. An unauthorized request from an aircraft responder makes it possible to switch from completely passive methods for detecting and determining the coordinates of an air object to active-passive ones, which provide an increase in the accuracy of solving a coordinate task by dozens of times while maintaining the energy secrecy of a wide-area multi-position observation system. It is shown that the use of active and passive methods for constructing wide-area multi-position observation systems makes it possible to implement goniometric, difference-range, goniometer-range, total-range and goniometer-total-range methods for determining the coordinates of an air object. This increases significantly the number of options for estimating the coordinates of an air object. As a result, it allows improving the quality of information support for users by choosing the optimal method for estimating the coordinates of the observed air objects using various primary measurements of the received signals parameters.
{"title":"Comparative analysis of methods for determining the air objects’ coordinates using wide-area multilateration systems","authors":"I. Svyd, Valerii V. Semenets, O. Maltsev, M. Tkach, S.V. Starokozhev, O.O. Datsenko, I. Shevtsov","doi":"10.30837/rt.2022.2.209.16","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.16","url":null,"abstract":"The presented work considers the place and role of wide-area multi-position airspace surveillance in the information support of airspace control and air traffic control systems. Classification of methods for estimating the coordinates of air objects using various primary measurements of the parameters of received signals in multi-position observation is given. A quantitative assessment of the accuracy in determining the air objects’ coordinates by the considered methods is also given. The capabilities of wide-area multi-position surveillance systems increase significantly when using the principles of constructing a secondary surveillance radar as a non-synchronous network, and an aircraft responder as an open single-channel queuing system with servicing the first correctly received request signal. An unauthorized request from an aircraft responder makes it possible to switch from completely passive methods for detecting and determining the coordinates of an air object to active-passive ones, which provide an increase in the accuracy of solving a coordinate task by dozens of times while maintaining the energy secrecy of a wide-area multi-position observation system. It is shown that the use of active and passive methods for constructing wide-area multi-position observation systems makes it possible to implement goniometric, difference-range, goniometer-range, total-range and goniometer-total-range methods for determining the coordinates of an air object. This increases significantly the number of options for estimating the coordinates of an air object. As a result, it allows improving the quality of information support for users by choosing the optimal method for estimating the coordinates of the observed air objects using various primary measurements of the received signals parameters.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79054949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-24DOI: 10.30837/rt.2021.4.207.06
V. Ruzhentsev, O. Fediushyn, S. Kokhan
Common ARX (Addition-Rotation-XOR) encryption algorithms are analyzed. These algorithms are Chacha, Speckey, Simon, Chaskey, Sparkle. These algorithms use three basic operations: modular addition, XOR addition, and rotation. 16-bit reduced models of these algorithms are developed, methods of analysis are selected and developed, and the analysis of the resistance of these algorithms to the most effective attacks (integral attack and attack of impossible differentials) for this class of algorithms is performed. According to the selected indicator – the number of elementary operations that is necessary to obtain parameters of random substitution and the absence of impossible differentials and integrals – the most effective ARX algorithms are determined. These are Speckey, which operates on two 8-bit subblocks and requires 36 elementary operations, and Chaskey, which operates on four 4-bit subblocks and requires 72 elementary operations. If we assume that one 8-bit operation is equivalent to two 4-bit operations, then these schemes are equal in terms of the chosen indicator. The worst performers were the 8-bit Simon scheme and the 4-bit ChaCha scheme, which require almost twice as many operations as the best schemes. A conclusion was also made about the importance of using not one, but several XOR operations of key addition for the overall cryptographic strength of ARX algorithms.
分析了常用的ARX (Addition-Rotation-XOR)加密算法。这些算法是Chacha Speckey Simon Chaskey Sparkle。这些算法使用三种基本运算:模加法、异或加法和旋转。开发了这些算法的16位简化模型,选择和开发了分析方法,并分析了这些算法对这类算法最有效的攻击(积分攻击和不可能微分攻击)的抵抗力。根据所选择的指标-获得随机替换参数所需的初等运算次数和不存在不可能的微分和积分-确定最有效的ARX算法。Speckey在两个8位子块上运行,需要36个基本运算;Chaskey在四个4位子块上运行,需要72个基本运算。如果我们假设一个8位操作相当于两个4位操作,那么这些方案在选择的指标方面是相等的。性能最差的是8位的Simon方案和4位的ChaCha方案,它们需要的操作几乎是最佳方案的两倍。还得出结论,对于ARX算法的整体加密强度,使用不是一个,而是多个密钥相加的异或操作的重要性。
{"title":"Analysis of ARX encryption schemes resistance to the integral attack and impracticable differentials attack","authors":"V. Ruzhentsev, O. Fediushyn, S. Kokhan","doi":"10.30837/rt.2021.4.207.06","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.06","url":null,"abstract":"Common ARX (Addition-Rotation-XOR) encryption algorithms are analyzed. These algorithms are Chacha, Speckey, Simon, Chaskey, Sparkle. These algorithms use three basic operations: modular addition, XOR addition, and rotation. 16-bit reduced models of these algorithms are developed, methods of analysis are selected and developed, and the analysis of the resistance of these algorithms to the most effective attacks (integral attack and attack of impossible differentials) for this class of algorithms is performed. According to the selected indicator – the number of elementary operations that is necessary to obtain parameters of random substitution and the absence of impossible differentials and integrals – the most effective ARX algorithms are determined. These are Speckey, which operates on two 8-bit subblocks and requires 36 elementary operations, and Chaskey, which operates on four 4-bit subblocks and requires 72 elementary operations. If we assume that one 8-bit operation is equivalent to two 4-bit operations, then these schemes are equal in terms of the chosen indicator. The worst performers were the 8-bit Simon scheme and the 4-bit ChaCha scheme, which require almost twice as many operations as the best schemes. A conclusion was also made about the importance of using not one, but several XOR operations of key addition for the overall cryptographic strength of ARX algorithms.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72411196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-24DOI: 10.30837/rt.2021.4.207.11
V. Kartashov, V.O. Pososhenko, V.I. Kolisnyk, A. Kapusta, M. Rybnykov, Y.V. Pershyn, V. Kizka
Currently, unmanned aerial vehicles (UAVs) provide a wide range of useful tasks for humanity, but, on the other hand, they pose a serious threat in economic, military and other areas of human activity. Difficulties in observing UAVs using modern technical means, as well as their relatively low cost, lead to an expansion of the scope of UAVs based illegal actions. Therefore, the protection of various objects against UAVs is a serious scientific and technical task of today. Since the possibilities of the known methods of UAV detection are different, the joint use of systems of different types is realized in practice nowadays, in order to increase the informativeness of the obtained data by their joint (complex) processing. The number of publications in this field is constantly increasing, and considerable attention is paid to integrated systems built on the basis of various physical sensors. However, the efficiency of multi-sensor systems with integrated processing of the output signals of the channels in practice remains insufficient. This article is devoted to the study of methods for the synthesis of new, more efficient algorithms for complexing radar, acoustic, optical and infrared information channels of integrated UAV detection and recognition systems, which are performed from the standpoint of statistical theory of radio system optimization. This approach allows synthesizing the optimal (according to the selected quality criterion) complex information processing system, which ensures obtaining the maximum amount of information from the vector process observed at the inputs of information channels. There shown the possibility of constructing an optimal UAV detector with the use of the late strategy of combining information at the level of decisions made in individual channels of the system.
{"title":"Complexing of information channels of UAV detection and observation systems from the statistic solutions theory standpoint","authors":"V. Kartashov, V.O. Pososhenko, V.I. Kolisnyk, A. Kapusta, M. Rybnykov, Y.V. Pershyn, V. Kizka","doi":"10.30837/rt.2021.4.207.11","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.11","url":null,"abstract":"Currently, unmanned aerial vehicles (UAVs) provide a wide range of useful tasks for humanity, but, on the other hand, they pose a serious threat in economic, military and other areas of human activity. Difficulties in observing UAVs using modern technical means, as well as their relatively low cost, lead to an expansion of the scope of UAVs based illegal actions. Therefore, the protection of various objects against UAVs is a serious scientific and technical task of today. \u0000Since the possibilities of the known methods of UAV detection are different, the joint use of systems of different types is realized in practice nowadays, in order to increase the informativeness of the obtained data by their joint (complex) processing. \u0000The number of publications in this field is constantly increasing, and considerable attention is paid to integrated systems built on the basis of various physical sensors. However, the efficiency of multi-sensor systems with integrated processing of the output signals of the channels in practice remains insufficient. \u0000This article is devoted to the study of methods for the synthesis of new, more efficient algorithms for complexing radar, acoustic, optical and infrared information channels of integrated UAV detection and recognition systems, which are performed from the standpoint of statistical theory of radio system optimization. \u0000This approach allows synthesizing the optimal (according to the selected quality criterion) complex information processing system, which ensures obtaining the maximum amount of information from the vector process observed at the inputs of information channels. There shown the possibility of constructing an optimal UAV detector with the use of the late strategy of combining information at the level of decisions made in individual channels of the system.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78055613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-24DOI: 10.30837/rt.2021.4.207.01
I. Gorbenko, O. Kachko, O. Potii, Y. Gorbenko, V. Ponomar, M. Yesina, I. V. Stelnik, S.O. Kandiy, К.O. Kuznetsova
At present and in the future, mathematical methods, mechanisms and algorithms of standardized asymmetric cryptotransformations such as electronic signature (ES) are and will be used for information cryptographic protection. Electronic signature is the main and essential component of cybersecurity, in terms of providing quality information security services such as integrity, irresistibility and authenticity of information and data processed. However, there are well-founded suspicions that in the post-quantum period the existing ES standards will be broken and compromised using classical and quantum cryptanalytic systems with appropriate mathematical, software and hardware-software. An analysis was performed, which confirms that quantum computers have already been developed, manufactured and used. It is believed that the actual state of development and use of powerful quantum computers and their mathematical and software is obviously strictly confidential and secure, and only publicly known data on quantum computers and their applications in cryptology are disclosed. A preliminary analysis has been carried out showing that in Ukraine there is an understanding of the existence of threats to cybersecurity and information security in the case of using available standardized ES in the transition and post-quantum periods. Currently, development and adoption of post-quantum ES standards is also one of the main issues in ensuring the necessary levels of security in the transition and post-quantum periods. The objective of this article is to substantiate, compare alternatives and develop proposals for the selection and standardization of post-quantum ES standards at the international and national levels, taking into account the results of the 2nd and 3rd rounds of the NIST US competition and national researches.
{"title":"Substantiation and proposals for the selection, improvement and standardization of the post-quantum electronic signature mechanism at the national and international levels","authors":"I. Gorbenko, O. Kachko, O. Potii, Y. Gorbenko, V. Ponomar, M. Yesina, I. V. Stelnik, S.O. Kandiy, К.O. Kuznetsova","doi":"10.30837/rt.2021.4.207.01","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.01","url":null,"abstract":"At present and in the future, mathematical methods, mechanisms and algorithms of standardized asymmetric cryptotransformations such as electronic signature (ES) are and will be used for information cryptographic protection. Electronic signature is the main and essential component of cybersecurity, in terms of providing quality information security services such as integrity, irresistibility and authenticity of information and data processed. However, there are well-founded suspicions that in the post-quantum period the existing ES standards will be broken and compromised using classical and quantum cryptanalytic systems with appropriate mathematical, software and hardware-software. An analysis was performed, which confirms that quantum computers have already been developed, manufactured and used. It is believed that the actual state of development and use of powerful quantum computers and their mathematical and software is obviously strictly confidential and secure, and only publicly known data on quantum computers and their applications in cryptology are disclosed. A preliminary analysis has been carried out showing that in Ukraine there is an understanding of the existence of threats to cybersecurity and information security in the case of using available standardized ES in the transition and post-quantum periods. Currently, development and adoption of post-quantum ES standards is also one of the main issues in ensuring the necessary levels of security in the transition and post-quantum periods. The objective of this article is to substantiate, compare alternatives and develop proposals for the selection and standardization of post-quantum ES standards at the international and national levels, taking into account the results of the 2nd and 3rd rounds of the NIST US competition and national researches.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75318333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-24DOI: 10.30837/rt.2021.4.207.07
D. Harmash
The paper considers the analysis of the essence and possibilities to protect the Rainbow post-quantum cryptographic algorithm. The main properties of algorithms based on multidimensional quadratic transformations are considered. Mathematical schemes and operations used by the Rainbow algorithm are given. The perspective of using algorithms based on multidimensional quadratic transformations in post-quantum time is estimated. An estimate of what resources and computing energy are required for the successful use of algorithms based on multidimensional quadratic transformations is given. The main positive aspects of the algorithm and its weaknesses are outlined. Analyzes are given regarding the ability of the algorithm to protect against attack by third-party channels.
{"title":"Strengths and weaknesses of the algorithm based on multidimensional rainbow transformations and its ability to block attacks by third party channel","authors":"D. Harmash","doi":"10.30837/rt.2021.4.207.07","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.07","url":null,"abstract":"The paper considers the analysis of the essence and possibilities to protect the Rainbow post-quantum cryptographic algorithm. The main properties of algorithms based on multidimensional quadratic transformations are considered. Mathematical schemes and operations used by the Rainbow algorithm are given. The perspective of using algorithms based on multidimensional quadratic transformations in post-quantum time is estimated. An estimate of what resources and computing energy are required for the successful use of algorithms based on multidimensional quadratic transformations is given. The main positive aspects of the algorithm and its weaknesses are outlined. Analyzes are given regarding the ability of the algorithm to protect against attack by third-party channels.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72551262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-24DOI: 10.30837/rt.2021.4.207.02
A. Kobozeva, A. Sokolov
Steganography is an important component of modern information security systems. At the same time, in the conditions of modern cyberspace, it is relevant to develop high-performance steganographic methods that would have a high level of resistance to possible attacks by compression, noise, and blur. One of such methods is the steganographic method with code-controlled information embedding, based on the idea of preliminary coding of the information being embedded using binary codewords, for which the transformants of the Walsh-Hadamard transform have the specified properties. A specific localization of disturbances in the Walsh-Hadamard transform domain of the container takes place because of the information embedding. In this paper, a theoretical basis has been formed for further improvement of the codewords used in the code-controlled information embedding steganographic method. It is shown that despite the fact that these codewords have an ideal effect only on a given transformant of the Walsh-Hadamard transform, they affect several transformants at once in the domain of the discrete cosine transform (DCT). The concept of the selectivity coefficient is introduced to estimate the level of selectivity of the impact on a given DCT transformant. It has been established that with an increase in the size of the blocks used, a tendency is observed to a decrease in the selectivity coefficient due to the presence of the “close neighbor” effect. This trend is conditioned by the involvement of the DCT transformants with similar frequencies that have similar resistance to possible attacks on the embedded message. In this case, the ratio of the sum of absolute values of low-frequency DCT transformants to the sum of absolute values of all other DCT transformants increases with the size of the codeword. In this paper it has been proven and practically confirmed that an increase in the size of a codeword leads to an increase in the resistance of the code-controlled information embedding steganographic method. Possible ways of further practical improvement of codewords used in the code-controlled information embedding steganographic method are theoretically substantiated.
{"title":"Theoretical foundations for constructing effective codewords for the code-controlled information embedding steganographic method","authors":"A. Kobozeva, A. Sokolov","doi":"10.30837/rt.2021.4.207.02","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.02","url":null,"abstract":"Steganography is an important component of modern information security systems. At the same time, in the conditions of modern cyberspace, it is relevant to develop high-performance steganographic methods that would have a high level of resistance to possible attacks by compression, noise, and blur. One of such methods is the steganographic method with code-controlled information embedding, based on the idea of preliminary coding of the information being embedded using binary codewords, for which the transformants of the Walsh-Hadamard transform have the specified properties. A specific localization of disturbances in the Walsh-Hadamard transform domain of the container takes place because of the information embedding. In this paper, a theoretical basis has been formed for further improvement of the codewords used in the code-controlled information embedding steganographic method. It is shown that despite the fact that these codewords have an ideal effect only on a given transformant of the Walsh-Hadamard transform, they affect several transformants at once in the domain of the discrete cosine transform (DCT). The concept of the selectivity coefficient is introduced to estimate the level of selectivity of the impact on a given DCT transformant. It has been established that with an increase in the size of the blocks used, a tendency is observed to a decrease in the selectivity coefficient due to the presence of the “close neighbor” effect. This trend is conditioned by the involvement of the DCT transformants with similar frequencies that have similar resistance to possible attacks on the embedded message. In this case, the ratio of the sum of absolute values of low-frequency DCT transformants to the sum of absolute values of all other DCT transformants increases with the size of the codeword. In this paper it has been proven and practically confirmed that an increase in the size of a codeword leads to an increase in the resistance of the code-controlled information embedding steganographic method. Possible ways of further practical improvement of codewords used in the code-controlled information embedding steganographic method are theoretically substantiated.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84050343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-24DOI: 10.30837/rt.2021.4.207.17
N. Shtefan, O. Zaporozhets
Quality is one of the factors that ensure the commercial success and safety of using the software. Quality is understood as conformity the explicit and implicit requirements of various stakeholders. It is necessary to ensure a joint understanding between developers and users, engineers need to understand the meaning of the concept of quality, characteristics and importance of quality for the developed or maintained software. Measurements are the basis for quality assurance. They are the main tool for managing the life cycle of software products, assessing the implementation of plans and monitoring. To quantify quality, it is necessary to measure the characteristics of the software. Standardization provides unification of requirements for quality, its measurement and assessment. The use of standards has many potential benefits for any organization, especially in key areas such as measuring the quality of software products, information and measurement systems. Recognized international standards organizations have published the ISO/IEC 25000 series of standards for systems and software quality requirements and evaluation SQuaRE, which is gaining widespread practical application. The paper discusses a series of international standards SQuaRE, analyzes the relationship between the quality model, quality characteristics, quality measures and a new concept – a quality measure element of the software, presents the measurement of quality based on these standards.
{"title":"Software quality model based on SQuaRE standards","authors":"N. Shtefan, O. Zaporozhets","doi":"10.30837/rt.2021.4.207.17","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.17","url":null,"abstract":"Quality is one of the factors that ensure the commercial success and safety of using the software. Quality is understood as conformity the explicit and implicit requirements of various stakeholders. It is necessary to ensure a joint understanding between developers and users, engineers need to understand the meaning of the concept of quality, characteristics and importance of quality for the developed or maintained software. Measurements are the basis for quality assurance. They are the main tool for managing the life cycle of software products, assessing the implementation of plans and monitoring. To quantify quality, it is necessary to measure the characteristics of the software. Standardization provides unification of requirements for quality, its measurement and assessment. The use of standards has many potential benefits for any organization, especially in key areas such as measuring the quality of software products, information and measurement systems. Recognized international standards organizations have published the ISO/IEC 25000 series of standards for systems and software quality requirements and evaluation SQuaRE, which is gaining widespread practical application. The paper discusses a series of international standards SQuaRE, analyzes the relationship between the quality model, quality characteristics, quality measures and a new concept – a quality measure element of the software, presents the measurement of quality based on these standards.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80023955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-24DOI: 10.30837/rt.2021.4.207.18
B.V. Zhukov, S.I. Borbulev, A. Odnovol
The possibilities of operational control of the parameters of liquid fuels and lubricants with impurities using the resonator method of microwave dielectrometry are considered. Preliminary studies of liquid fuels and lubricants (gasolines, diesel fuels, kerosene, oils) showed that the values of the real and imaginary components of the complex dielectric constant of the listed fuels and lubricants are in the operating range of the resonator microwave dielectrometer. The high resolution of the microwave resonator method determines the prospects of using this method for analyzing the complex dielectric constant of mixtures of fuels and lubricants with various impurities, including water, alcohols, benzene, etc. For a mixture of gasoline with benzene, it was experimentally established that with a small addition of benzene (no more than 15%), an increase in the real component of the complex dielectric constant of the mixture is observed, and with a benzene content exceeding 15%, an increase in both components of the complex dielectric constant of the mixture takes place. The process has also been installed, but the NHF dielectrometer has made it possible to identify the transformer in real time due to the presence of water in the amount of 14, 28 and 56 grams per ton of oil. The research results indicate that the microwave dielectrometry method can be considered promising for monitoring the quality of transformer oil both during the filling process and for monitoring its quality during the operation of high-voltage transformers. The results of the initial stage of research on alcohol gasolines have not yet revealed the predominant effect of the alcohol additive on the location of the experimental points on the complex plane. This circumstance is most likely due to the fact that alcohol gasolines with a close octane number can have a significantly different chemical composition.
{"title":"Operational control of the parameters of liquid fuels and lubricants with impurities","authors":"B.V. Zhukov, S.I. Borbulev, A. Odnovol","doi":"10.30837/rt.2021.4.207.18","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.18","url":null,"abstract":"The possibilities of operational control of the parameters of liquid fuels and lubricants with impurities using the resonator method of microwave dielectrometry are considered. Preliminary studies of liquid fuels and lubricants (gasolines, diesel fuels, kerosene, oils) showed that the values of the real and imaginary components of the complex dielectric constant of the listed fuels and lubricants are in the operating range of the resonator microwave dielectrometer. \u0000The high resolution of the microwave resonator method determines the prospects of using this method for analyzing the complex dielectric constant of mixtures of fuels and lubricants with various impurities, including water, alcohols, benzene, etc. \u0000For a mixture of gasoline with benzene, it was experimentally established that with a small addition of benzene (no more than 15%), an increase in the real component of the complex dielectric constant of the mixture is observed, and with a benzene content exceeding 15%, an increase in both components of the complex dielectric constant of the mixture takes place. \u0000The process has also been installed, but the NHF dielectrometer has made it possible to identify the transformer in real time due to the presence of water in the amount of 14, 28 and 56 grams per ton of oil. The research results indicate that the microwave dielectrometry method can be considered promising for monitoring the quality of transformer oil both during the filling process and for monitoring its quality during the operation of high-voltage transformers. \u0000The results of the initial stage of research on alcohol gasolines have not yet revealed the predominant effect of the alcohol additive on the location of the experimental points on the complex plane. This circumstance is most likely due to the fact that alcohol gasolines with a close octane number can have a significantly different chemical composition.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90620478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-24DOI: 10.30837/rt.2021.4.207.10
V. Kantsedal, А.A. Mogyla
The features of goal-setting control while ensuring the information stability of the sounding modes of a surveillance radar when it is suppressed by active interference and interfering information influences are considered. Overcoming the complexity of goal-setting processes, the validity and efficiency of decision-making with a shortage of time for its adoption is associated with insuring the consistency of goal-setting processes, increasing the levels of their intellectualization and formalization. This will contribute to imparting the desired properties, synthesized during the conflict, to the multipurpose strategies and the situational law of the control of the REP processes and the coordination of actions. An increase in the level of intellectualization of goal-setting processes is ensured by: - decomposition of the general goal-setting problem into separate, simpler subtasks with effective solutions, implemented in the corresponding subsystems of the ACSstab (or basic associations of its functional elements) at stages of information support, preparation, adoption and implementation of the decision at the stages of hierarchical levels of management; - cognitive analysis of goals and reflexive synthesis of goal-setting processes using the capabilities of a specialized intelligent decision support system to enhance the creative-reflexive abilities of the subject of management and increase the level of his professional competencies; - combining the universality of the stages of rational management of the synthesis of the strategy for managing the REP processes with the specifics of conflict situations, subjectivity, cognition and reflexivity nature of intellectual control. Methods and means for partial formalization of goal-setting processes are presented, when the structuring of the main goal is carried out taking into account belonging to the strategies of internal and external control of the REP, the decomposition of the two-sided dynamic model of the conflict between the systems of the RES complex and the radar, the hierarchy of management levels, various approaches applied to goal-setting in a crisis management, as well as methods of justifying goals, resource costs and control of achieving the goals. These features can significantly reduce the degree of subjectivity of management for goal-setting and achieve their validity, completeness, consistency.
{"title":"Specific features of immunity control of survey radar under its suppression by active interference and interfering information effects","authors":"V. Kantsedal, А.A. Mogyla","doi":"10.30837/rt.2021.4.207.10","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.10","url":null,"abstract":"The features of goal-setting control while ensuring the information stability of the sounding modes of a surveillance radar when it is suppressed by active interference and interfering information influences are considered. Overcoming the complexity of goal-setting processes, the validity and efficiency of decision-making with a shortage of time for its adoption is associated with insuring the consistency of goal-setting processes, increasing the levels of their intellectualization and formalization. This will contribute to imparting the desired properties, synthesized during the conflict, to the multipurpose strategies and the situational law of the control of the REP processes and the coordination of actions. \u0000An increase in the level of intellectualization of goal-setting processes is ensured by: \u0000- decomposition of the general goal-setting problem into separate, simpler subtasks with effective solutions, implemented in the corresponding subsystems of the ACSstab (or basic associations of its functional elements) at stages of information support, preparation, adoption and implementation of the decision at the stages of hierarchical levels of management; \u0000- cognitive analysis of goals and reflexive synthesis of goal-setting processes using the capabilities of a specialized intelligent decision support system to enhance the creative-reflexive abilities of the subject of management and increase the level of his professional competencies; \u0000- combining the universality of the stages of rational management of the synthesis of the strategy for managing the REP processes with the specifics of conflict situations, subjectivity, cognition and reflexivity nature of intellectual control. \u0000Methods and means for partial formalization of goal-setting processes are presented, when the structuring of the main goal is carried out taking into account belonging to the strategies of internal and external control of the REP, the decomposition of the two-sided dynamic model of the conflict between the systems of the RES complex and the radar, the hierarchy of management levels, various approaches applied to goal-setting in a crisis management, as well as methods of justifying goals, resource costs and control of achieving the goals. \u0000These features can significantly reduce the degree of subjectivity of management for goal-setting and achieve their validity, completeness, consistency.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89481479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The aim of this work is to study the algorithms, the stability of which is based on the search for a short lattice vector, as well as to obtain time-resistant parameters of these algorithms. Existing methods for generating keys and choosing parameters for cryptographic transformations on algebraic lattices resistant to time attacks are considered. It is shown that the uniform distribution of coefficients for generating the NTRU algorithm keys has certain shortages, namely, a limited number of parameters suitable for use in cryptographical transformations. This is due to the vulnerability of this algorithm to time attacks. The possibility of using a discrete normal (Gaussian) distribution to form a key pair, which will prevent the sensitivity of the algorithm to time attacks, is considered. This method of generation requires checking the obtained sample for compliance with the properties of the normal distribution. The usage of SAGA tests has been proposed. They make it possible to check the Gaussian samples obtained using the discrete normal distribution. The verification result shows whether or not the sample has properties that are inherent in the normal distribution. The application of the SAGA statistical tests to the NTRU cryptographic transformation polynomials allowed us to conclude that the discrete Gaussian sample makes it possible to generate time-resistant parameters using the norm or the length of the short basis (vector) of the lattice as the mean-square deviation.
{"title":"Analysis of ways to increase stability of cryptographic algorithms on algebraic lattices against time attacks","authors":"О.E. Petrenko, О.S. Petrenko, Оleksand Sievierinov, О.І. Fiediushyn, А.V. Zubrych, D.V. Shcherbina","doi":"10.30837/rt.2021.4.207.05","DOIUrl":"https://doi.org/10.30837/rt.2021.4.207.05","url":null,"abstract":"The aim of this work is to study the algorithms, the stability of which is based on the search for a short lattice vector, as well as to obtain time-resistant parameters of these algorithms. Existing methods for generating keys and choosing parameters for cryptographic transformations on algebraic lattices resistant to time attacks are considered. It is shown that the uniform distribution of coefficients for generating the NTRU algorithm keys has certain shortages, namely, a limited number of parameters suitable for use in cryptographical transformations. This is due to the vulnerability of this algorithm to time attacks. The possibility of using a discrete normal (Gaussian) distribution to form a key pair, which will prevent the sensitivity of the algorithm to time attacks, is considered. This method of generation requires checking the obtained sample for compliance with the properties of the normal distribution. The usage of SAGA tests has been proposed. They make it possible to check the Gaussian samples obtained using the discrete normal distribution. The verification result shows whether or not the sample has properties that are inherent in the normal distribution. The application of the SAGA statistical tests to the NTRU cryptographic transformation polynomials allowed us to conclude that the discrete Gaussian sample makes it possible to generate time-resistant parameters using the norm or the length of the short basis (vector) of the lattice as the mean-square deviation.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80938753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}