{"id":2253,"date":"2021-01-18T19:37:56","date_gmt":"2021-01-18T17:37:56","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=2253"},"modified":"2021-02-16T14:11:49","modified_gmt":"2021-02-16T12:11:49","slug":"%d0%b7%d0%b0%d1%81%d1%82%d0%be%d1%81%d1%83%d0%b2%d0%b0%d0%bd%d0%bd%d1%8f-%d0%ba%d1%80%d0%b8%d0%bf%d1%82%d0%be%d0%b3%d1%80%d0%b0%d1%84%d1%96%d1%87%d0%bd%d0%b8%d1%85-%d0%b0%d0%bb%d0%b3%d0%be%d1%80%d0%b8","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=2253","title":{"rendered":"\u0417\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0456\u0447\u043d\u0438\u0445 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0456\u0432 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u043e\u0431\u043c\u0435\u0436\u0435\u043d\u043e\u0457 \u043f\u0440\u043e\u0446\u0435\u0441\u043e\u0440\u043d\u043e\u0457 \u043f\u043e\u0442\u0443\u0436\u043d\u043e\u0441\u0442\u0456"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u0417\u0410\u0421\u0422\u041e\u0421\u0423\u0412\u0410\u041d\u041d\u042f \u041a\u0420\u0418\u041f\u0422\u041e\u0413\u0420\u0410\u0424\u0406\u0427\u041d\u0418\u0425 \u0410\u041b\u0413\u041e\u0420\u0418\u0422\u041c\u0406\u0412 \u0412 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425 \u041e\u0411\u041c\u0415\u0416\u0415\u041d\u041e\u0407 \u041f\u0420\u041e\u0426\u0415\u0421\u041e\u0420\u041d\u041e\u0407 \u041f\u041e\u0422\u0423\u0416\u041d\u041e\u0421\u0422\u0406<\/p>\n<p style=\"text-align: center;\">APPLICATION OF CRYPTOGRAPHIC ALGORITHMS IN SYSTEMS WITH LIMITED PROCESSING POWER<\/p>\n<p>&nbsp;<br \/>\n<a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/26-12.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\"><\/a><br \/>\n<strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 143-148. \u041d\u043e\u043c\u0435\u0440: \u21164, 2020 (287)<\/strong><\/p>\n<p><strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u041a.\u041b. \u0413\u041e\u0420\u042f\u0429\u0415\u041d\u041a\u041e, \u0410.\u0410. \u0422\u0410\u0420\u0410\u041d\u0427\u0423\u041a, \u042f.\u0412. \u0421\u0423\u041f\u0420\u0423\u041d\u042e\u041a<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\n\u041e.\u0412. \u0426\u0418\u0420\u0410<br \/>\n\u041e\u0434\u0435\u0441\u044c\u043a\u0430 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0430 \u0430\u043a\u0430\u0434\u0435\u043c\u0456\u044f \u0437\u0432\u2019\u044f\u0437\u043a\u0443 \u0456\u043c. \u041e.\u0421. \u041f\u043e\u043f\u043e\u0432\u0430<\/p>\n<p>K.L. HORIASHCHENKO, A.A. TARANCHUK, Y.V. SUPRONYUK<br \/>\nKhmelnitsky national university, Ukraine<br \/>\nO. TSYRA<br \/>\nOdessa national academy of communication named by O. Popov<\/p>\n<p>&nbsp;<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2020-287-4-143-148\">https:\/\/www.doi.org\/10.31891\/2307-5732-2020-287-4-143-148<\/a><\/p>\n<p>&nbsp;<br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review : <\/strong>19.10.2020 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed : <\/strong>06.11.2020 \u0440.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u00a0 \u00a0 \u00a0\u041e\u0434\u0438\u043d \u0437 \u043d\u0430\u043f\u0440\u044f\u043c\u043a\u0456\u0432 \u0440\u043e\u0437\u0432\u0438\u0442\u043a\u0443 \u0431\u0435\u0437\u043f\u0440\u043e\u0432\u043e\u0434\u043e\u0432\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0456 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0491\u0440\u0443\u043d\u0442\u0443\u0454\u0442\u044c\u0441\u044f \u043d\u0430 \u0432\u043f\u0440\u043e\u0432\u0430\u0434\u0436\u0435\u043d\u043d\u0456 \u043c\u0435\u0440\u0435\u0436 \u043d\u0430 \u0431\u0430\u0437\u0456 \u043f\u0440\u043e\u0441\u0442\u0438\u0445 \u0432\u0443\u0437\u043b\u0456\u0432, \u0449\u043e \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u044e\u0442\u044c\u0441\u044f \u0432 \u0442\u0430\u043a\u0438\u0445 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u0430\u0445, \u044f\u043a ZigBee, Bluetooth, Wibree. \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u044f, \u0449\u043e \u043f\u0435\u0440\u0435\u0434\u0430\u0454\u0442\u044c\u0441\u044f \u043c\u0435\u0440\u0435\u0436\u0435\u044e, \u043c\u043e\u0436\u0435 \u0431\u0443\u0442\u0438 \u043f\u0435\u0440\u0435\u0445\u043e\u043f\u043b\u0435\u043d\u0430 \u0442\u0430 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u0430 \u0442\u0440\u0435\u0442\u044c\u043e\u044e \u0441\u0442\u043e\u0440\u043e\u043d\u043e\u044e. \u041f\u0440\u043e\u0441\u0442\u043e\u0442\u0430 \u043a\u043e\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0456\u0457, \u043c\u0456\u043d\u0456\u043c\u0430\u043b\u044c\u043d\u0435 \u0435\u043d\u0435\u0440\u0433\u043e\u0441\u043f\u043e\u0436\u0438\u0432\u0430\u043d\u043d\u044f \u0442\u0430 \u043c\u0456\u043d\u0456\u043c\u0430\u043b\u044c\u043d\u0438\u0439 \u043e\u0431\u0441\u044f\u0433 \u043f\u0430\u043c\u2019\u044f\u0442\u0456 \u043d\u0435 \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442\u044c \u0432\u043f\u0440\u043e\u0432\u0430\u0434\u0438\u0442\u0438 \u0441\u043a\u043b\u0430\u0434\u043d\u0456 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0438 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0456\u0447\u043d\u043e\u0433\u043e \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457. \u0421\u043a\u043b\u0430\u0434\u043d\u0456\u0441\u0442\u044c \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0443 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u043e\u0431\u0443\u043c\u043e\u0432\u043b\u0435\u043d\u0430 \u0440\u043e\u0437\u0440\u044f\u0434\u043d\u0456\u0441\u0442\u044e \u043f\u0440\u043e\u0446\u0435\u0441\u043e\u0440\u0430 (8, 16 \u0430\u0431\u043e 32 \u0431\u0456\u0442\u0438), \u043d\u0430\u044f\u0432\u043d\u0438\u043c \u043e\u0431\u0441\u044f\u0433\u043e\u043c \u043f\u0430\u043c\u2019\u044f\u0442\u0456 \u041f\u0417\u041f \u0442\u0430 \u041e\u0417\u041f, \u0430 \u0442\u0430\u043a\u043e\u0436 \u0435\u043d\u0435\u0440\u0433\u043e\u0441\u043f\u043e\u0436\u0438\u0432\u0430\u043d\u043d\u044f\u043c \u0432 \u043f\u0440\u043e\u0446\u0435\u0441\u0456 \u0432\u0438\u043a\u043e\u043d\u0430\u043d\u043d\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0456\u0447\u043d\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u044f. \u041e\u0431\u0441\u044f\u0433 \u043f\u0430\u043c\u2019\u044f\u0442\u0456 \u0442\u0430\u043a\u043e\u0436 \u0454 \u0432\u0430\u0436\u043b\u0438\u0432\u0438\u043c \u0434\u043b\u044f \u043f\u0440\u0438\u0439\u043d\u044f\u0442\u0442\u044f, \u043e\u0431\u0440\u043e\u0431\u043a\u0438 \u0442\u0430 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0456 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u043c\u0456\u0436 \u0432\u0443\u0437\u043b\u0430\u043c\u0438 \u043c\u0435\u0440\u0435\u0436\u0456.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0431\u0435\u0437\u043f\u0440\u043e\u0432\u043e\u0434\u043e\u0432\u0430 \u043c\u0435\u0440\u0435\u0436\u0430, \u0432\u0443\u0437\u043e\u043b, \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0456\u044f.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>\u00a0 \u00a0 \u00a0One of the directions of development of wireless information transmission systems is based on the introduction of networks based on simple nodes used in such standards as ZigBee, Bluetooth, Wibree. Information transmitted over the network may be intercepted and used by a third party. Simplicity of design, minimum power consumption and minimum amount of memory do not allow to implement complex algorithms of cryptographic protection of information. The complexity of the protection algorithm is due to the bit size of the processor (8, 16 or 32 bits), the available amount of RAM and RAM, as well as power consumption during cryptographic conversion. The amount of memory is also important for receiving, processing and transmitting information between network nodes.<br \/>\nOne of the possible ways to increase the efficiency of cryptographic operations in hardware is to build them on the principle of &#8220;master &#8211; slave&#8221;. The method involves the use of a general-purpose processor as the central head of the device module (&#8220;master&#8221;), and a specialized arithmetic coprocessor (&#8220;master&#8221;), which performs all time-consuming operations under the control of the master.<br \/>\n<strong>Keywords:<\/strong> wireless network, node, cryptography.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Horiashchenko K.L. Format Adobe PDF kak sredstvo rasprostranenija zashhishhennoj informacii \/ K.L. Horiashchenko, \u0406.V. Trocishin \/\/ Vim\u0456rjuvalna ta obchisljuvalna tehn\u0456ka v tehnolog\u0456chnih procesah. \u2013 Hmelnickij. \u2013 2006. \u2013 \u2116 1. \u2013 S. 132-136.<\/li>\n<li>Panasenko S. P., Rakitin V.V. Apparatnye shifratory \/\/ Zhurnal \u00abMir PK\u00bb. 2002. \u2116 8.<\/li>\n<li>Babash A. V., Shankin G. P. Kriptografija (aspekty zashhity). \u2014 M.: SOLON-PRESS, 2007. \u2013 512 s.<\/li>\n<li>Shokalo V.M. Koncepcija sozdanija otechestvennyh special&#8217;nyh cifrovyh sistem peredachi informacii \/ V.M. Shokalo, A.I. Copa \/\/ Naukovo-tehn\u0456chnij zhurnal \u00abZahist \u0456nformac\u0456\u0457\u00bb. \u2013 Ki\u0457v: DU\u0406KT, 2006. \u2013 Vip. \u21163. \u2013 S. 51-57.<\/li>\n<li>Horiashchenko K.L. Riski c\u0456l\u0456snost\u0456 \u0456nformac\u0456\u0457 na perenosnih nos\u0456jah \u0456nformac\u0456\u0457 \/ K.L. Horiashchenko, O.\u0406. Pol\u0456karovskih, V.\u0415. Gavronskij, Ju.\u0406. Sn\u0456zhko \/\/ V\u0456snik Hmelnickogo nac\u0456onalnogo un\u0456versitetu. \u2013 2008. \u2013 \u21164. \u2013 S. 66-70.<\/li>\n<li>Horiashchenko K.L. Aspekti zahistu programnogo kodu u v\u0456dkritomu aparatnomu seredovishh\u0456 \/ K.L. Horiashchenko \/\/ V\u0456snik Hmelnickogo nac\u0456onalnogo un\u0456versitetu. \u2013 2009. \u2013 \u21162. \u2013 S. 208-212<\/li>\n<li>Strelnickij A.E., Copa A.I., Shokalo V.M. Variant povyshenija pomehozashhishhennosti radiokanala fiksirovannoj svjazi WiMAX \/ \/\/ Trudy 8-j Mezhdunarodnoj nauchno-prakticheskoj konferencii \u00abSovremennye informacionnye tehnologii\u00bb \/SIJeT\u20192007\/. \u2013 Odessa, 2007. \u2013 S. 173.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/2253"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2253"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/2253\/revisions"}],"predecessor-version":[{"id":3783,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/2253\/revisions\/3783"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}