JAVA EMBODIMENT OF CONJUGATED DISCRETE CRYPTOGRAPHY

I.A. Gromyko, K.O. Shvager
Annotations languages:

The article considers an embodiment of the information protection elements in the cryptography of a new generation using mathematical tools for continuous analysis of the discrete transfer (within the communications line) in the form of broadband quasi-random signals similar to those explored by Professor Ken Umeno (Japan). Even today such communications can be applied in the development of systems for the purposes of confidential radio and electric communications in large financial institutions, submarines and other subsurface facilities (mines, tunnels, development of underground and underwater mines and oil fields, governmental and command centers, etc.).In the long term it is necessary to consider the connection of the presented developments with the sequential analysis of H. Hartmut allowing to master the processes of aviation radio detection and location of minefields, pipeline routes etc even at present. The level of the proposed research determines the expediency of its financial support from the point of view of both private and state investors.
Keywords: cryptography, cryptographic signal, cryptostenography, random signals, transformation of continuous analysis in cryptography