Real-Time Application of the Formant Analysis Algorithms for Cryptoprotection of IT Systems

α
Vyacheslav Kunev
Vyacheslav Kunev
α Technical University of Moldova Technical University of Moldova

Send Message

To: Author

Real-Time Application of the Formant Analysis Algorithms for Cryptoprotection of IT Systems

Article Fingerprint

ReserarchID

NE9NN

Real-Time Application of the Formant Analysis Algorithms for Cryptoprotection of IT Systems Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

We examine applications of expanded algorithms of formant analysis of modern number theory for protection of binary information from hacking and intentional distortion in various IT-systems. These include real-time confidential conversations and information exchange between server and client through local or external networks, as well as phone and mobile communications based on a modified RSA-m cryptosystem, which realizes quick change of keys and guarantees the degree of secrecy in short or medium term.

References

8 Cites in Article
  1. A Balabanov,A Agafonov (2016). Bernoulli Numbers.
  2. A Balabanov,V Kunev (2016). Çàùèù¼ííûå IT-ñèñòåìû íà îñíîâå àëãîðèòìîâ ôîðìàíòíîãî àíàëèçà.
  3. A Balabanov,V Kunev A method of binary information encryption and application for its implementation.
  4. A Balabanov,A Agafonov,V Riku (2018). RSA Algorithm key generation Extension.
  5. A Balabanov,A Agafonov,I Kojuhari Âîçìîaeíîñòè ñîçäàíèÿ íîâûõ è ìîäåðíèçèðîâàííûõ àëãîðèòìîâ äëÿ ñèñòåìû RSA.
  6. I Romantev,P Timofeev,B Shanighin Çàùèòà èíôîðìàöèè â êîìïüþòåðíûõ ñèñòåìàõ è.
  7. V Shanighina (2001). 5. Substrates And Pretreatment.
  8. V Bikov,L Babenko,O Spiridonov (2002). Íîâûå òåõíîëîãèè ýëåêòðîííîãî áèçíåñà è áåçîïàñíîñòè.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Vyacheslav Kunev. 2026. \u201cReal-Time Application of the Formant Analysis Algorithms for Cryptoprotection of IT Systems\u201d. Global Journal of Research in Engineering - F: Electrical & Electronic GJRE-F Volume 22 (GJRE Volume 22 Issue F1): .

Download Citation

Enhanced security algorithms for IT systems.
Journal Specifications

Crossref Journal DOI 10.17406/gjre

Print ISSN 0975-5861

e-ISSN 2249-4596

Keywords
Classification
GJRE-F Classification: FOR Code: 090699
Version of record

v1.2

Issue date

February 9, 2022

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 1868
Total Downloads: 50
2026 Trends
Related Research

Published Article

We examine applications of expanded algorithms of formant analysis of modern number theory for protection of binary information from hacking and intentional distortion in various IT-systems. These include real-time confidential conversations and information exchange between server and client through local or external networks, as well as phone and mobile communications based on a modified RSA-m cryptosystem, which realizes quick change of keys and guarantees the degree of secrecy in short or medium term.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Real-Time Application of the Formant Analysis Algorithms for Cryptoprotection of IT Systems

Vyacheslav Kunev
Vyacheslav Kunev Technical University of Moldova

Research Journals