Fuzzy System of Access Distribution Within a Computer Network

Continuous growth of volumes of information resources causes strict requirements to crypto protection on the processing speed of entrance data by the computer system. It is natural that for the solution of this task it is necessary to use hardware realization of known algorithms of cryptographic information protection. The method of the information protection transferred in computer networks by the choice of information encryption algorithm on the basis of fuzzy logic is offered in the paper.

Resource Details

Provided by:
Journal of Theoretical and Applied Information Technology
Topic:
Security
Format:
PDF