message authenticity

Analysis of the Features of Using Cryptographic Algorithms and Protocols for Uav Protection

This paper investigates the features of constructing and applying cryptographic protocols to protect unmanned aerial vehicles (UAVs) from cyberattacks.
Today, we witness a uniquely rapid development of military-purpose UAVs. This unprecedented growth is driven by the decisive influence of combat UAV characteristics on the outcomes of real military operations. Additionally, this development is based on the analyzed, documented, and recognized results of UAV usage in combat conditions.

Research and Improvement of Computing Algorithms for Calculating the Trigonometrical Coefficients of the Hashing Algorithm MD5

The paper examines the problems of ensuring the authenticity of messages, as well as analyzes the modern requirements for hash functions and the problems of designing algorithms for calculating hash functions.