The basic steps in which the proposed method is implemented processing and transmission of protected data. The above analysis of the existing networks, a mathematical model of the proposed method and proved the basic requirement of choice pseudo-random sequence generator to change the time values. It makes the main conclusions that reflect the characteristics of the proposed method and used in the software implementation of the proposed method.
generator, security, method, protocol, Sid, time delay, proxy, network stack, data package
"Metod obrobky ta peredachi zakhyshchenykh danykh z vykorystanniam standartnykh protokoliv TCP/UDP" [Method for processing and transfer of protected data using standard protocols TCP/UDP],
Science and Technology of the Air Force of Ukraine,