Tag: data protection

Chaotic signal generation device for information security systems

Purpose. To create chaotic signals for information security systems. Application area. Computer technologies, information security, electronics, telecommunications. Advantages. High generation…

Technology for creating an optical quantum logic element for controlling qubits with polarization coding in information security and cyber defense systems

Purpose. For the construction of optical quantum computers, the creation of optical quantum cryptography systems, and will also improve the…

Technology for creating optical vector-vortex beams for quantum communication and information systems

Purpose. Improving the method of generating vector-vortex beams using topological defects in the orientation of the optical indicatrix in liquid…

Technology of non-separated factorial coding of speech signals

Purpose. To ensure the exchange of confidential voice information in real time, providing its integrated protection against unauthorized eavesdropping and…

Three-stage permutation-based cryptographic protocol

Purpose. To increase the security of information exchange based on a three-stage cryptographic protocol. Specifications. The three-stage cryptographic protocol can…

INTERFERENCE RADIO CHANNELS OF INFORMATION TRANSMISSION

PURPOSE: Provision of information security and noise immunity of information transmission and processing systems. DESCRIPTION: The content of the project…

HARDWARE AND SOFTWARE COMPLEX FOR IDENTIFICATION AND AUTHENTICATION OF USERS WITH CHANNEL PROTECTION – BIK RIDER (BIK MOUSE)

PURPOSE: The complex is intended for use in any computer systems. It solves the problem of secure secure input of…