Keywords

1 Protection of Information in the Information Security Management System

In terms of information technology development, characterized by on the one hand the intensification of modern information technology in all sectors of the national economy, and on the other hand, increasing the scale and frequency of cyber attacks, the emergence of new risks and security threats to businesses and the state as a whole, the issue of increasing the level of information security becomes particularly relevant.

Noting the role and importance of existing research on information security [1,2,3,4], it is obvious that in the context of intensification of informatization and progressive development of the IT sector, one of the most pressing issues is the problem of cyber attacks, which necessitates increased protection of information.

Information security of enterprises characterizes the state of their access to information, its security and storage, efficiency of use, business intelligence, information and analytical work with external and internal entities, the ability of information and analytical system of economic entities to develop.

Analysis of the internal and external environment of enterprises is the first and integral function of management [5]. Therefore, the quality of information and analytical support directly affects the effectiveness of management and further development of the enterprise. But for this, the system of information and analytical support of the process of economic entities economic security managing should include the following elements: information, a set of indicators, indicators, methods of assessment and analysis of information security [6].

Of course, the system of analytical information for management decisions is characterized by complexity. And there is a tendency to complicate the relationships in the information flow. At the same time there is a systematic increase in the amount of information, its redundancy in terms of lack of information to make optimal management decisions. Information on the business entities security is quite heterogeneous [7]. All this complicates its use in the management of security and viability of the entity. In most businesses, information that managers use to ensure their safety comes predominantly from internal sources. A specialized analytical group or security service is created, the functional responsibilities of which include all or part of the information support.

The key issue is the concept of essential information. Information is considered significant, the non-provision or distortion of which may influence the decisions of its users. The main objectives of information security management of economic entities are to ensure timely detection of information loss channels, threats and their level of importance, types of information theft, methods of their actions; ensure prompt response to threats; create conditions for the maximum possible compensation for damage; avoidance of economic and industrial espionage.

Thus, information security of enterprises is designed to protect their interests and their staff from the misuse of inside information and protection of trade secrets, which often constitute a significant part of the intellectual property of the business entity.

However, despite attempts to protect trade secrets and other sources of information, it is often the case that information is disseminated to persons who have no right to do so. Under modern business conditions, this phenomenon is quite common, because information about know-how, technology, methods of conducting business and management of individual business processes forms the competitiveness of many businesses [8]. And in conditions of constant competition, even a drop of the necessary information can dramatically change market conditions for an individual business entity, and for another—to turn into losses and damages. That is why, in Western Europe and the United States, 20% loss of confidential information can lead to bankruptcy [9].

Current dependence of enterprises on information systems and their services means that businesses are becoming increasingly vulnerable to information security threats. Interaction of public and private networks, as well as sharing of information resources increases the difficulties of access control and ensuring guarantees of services and security of information and communication systems and networks.

Intensification of the processes of economic activity digitalization creates preconditions for increase in cases of unauthorized use of computers, telecommunications systems, computer networks and telecommunications networks [10], i.e. cybercrime.

Back in the 1990s, computer fraud in the United States caused more than $10 billion in annual damage [11]. In the UK, where cybercrime had quadrupled at the time, the Confederation of British Industrialists estimated that the annual damage was £5 billion.

Today, financial losses from cybercrime are growing every year. According to a study conducted by experts from the Center for Strategic and International Studies (CSIS) and McAfee, a company that develops anti-virus software, the level of losses from cybercrime in the global economy is growing rapidly: if in 2014 they amounted to 345–445 billion dollars (0,6% of world GDP), then in 2016 it was already 445–600 billion dollars (0,8% of world GDP), in 2017—about 1.5 trillion dollars [12]. Global losses from the hacker attack using the NotPetya virus program alone amounted to $850 million, of which $300 million was the financial loss of the national economy of Ukraine (0,4% of GDP) [13].

Hacker attacks in 2020 cost the world economy more than a trillion dollars or 820 billion euros, which is 50% higher than in 2018 (see Fig. 1).

Fig. 1
figure 1

Estimated average cost of cybercrime

Establishing the real scale of financial losses from the actions of cybercriminals is extremely difficult and almost impossible. However, the lack of official statistics does not diminish the relevance and importance of information security. After all, information is one of the universal types of resources that are necessary both for the decision-making process and for the formulation of strategic, tactical and operational tasks of economic development at the macro-, meso- and micro-levels.

According to domestic and foreign experts, solving the problems of investigating this type of crime is a difficult task for law enforcement agencies both in our country and abroad. Domestic and foreign criminologists classify “computer” crime as hyper latent. According to various estimates, law enforcement officers become aware of only 10–20% of such crimes [14].

A key aspect of protection against cybercrime is preparation and identification of vulnerabilities, as well as resilience in terms of interoperability with common management systems.

Fundamental in the field of information security management are the International Standards ISO/IEC 27,001 and ISO/IEC 27,002 (it was called ISO/IEC 17,799 until 2007). They are a model of the management system, which determines the overall organization of processes, data classification, access systems, planning areas, employee responsibility, the use of risk assessment, etc. in the context of information security. Thus, due to the implementation of the ISO/IEC 27,001 standard, business entities have the opportunity to assess their risks, implement control measures to mitigate them, control risks, improving, if necessary, information protection. The ISO/IEC 27,002 standard is used to establish a system of effective information protection and to improve information protection methods.

To date, there are more than 40 international standards of the ISO/IEC 27,000 series, covering everything from creation of a common dictionary (ISO/IEC 27,000), risk management (ISO/IEC 27,005), security in cloud technologies (ISO/IEC 27,017 and ISO/IEC 27,018) to forensic methods used to analyze digital evidence and investigate incidents ISO/IEC 27,042 and ISO/IEC 27,043 respectively) [15]. They enable businesses to constantly update themselves in the fight against cybercrime.

Building an effective information security management system based on international ISO series standards in modern information and communication systems and networks is an important task for every business entity. To counter external attacks, it is necessary not only to have effective means of protection, but also to know their system of operation, settings and weaknesses of operating systems [16].

Thus, strengthening the information security of enterprises is based on ensuring reliability, confidentiality, integrity of information resources. Modern methods and means of information and communication and digital technologies cannot fully ensure productive and reliable processing of ever-growing arrays of information. The existing positional binary number system, which operates in modern information technology, has shortcomings, and existing methods of unauthorized access, hacker attacks, viruses and other types of hacking and violation of the integrity of information are built using binary position code. In this aspect, correction of errors in the system of residual classes can rightly be determined as the basis for improving the information security of economic entities.

2 Features of Error Correction in the SRC

It is possible to significantly increase the reliability and credibility of processing economic data only based on the use of new machine arithmetic. Because existing positional numeral system (PNS) has a number of disadvantages. Execution of an arithmetic operation involves a sequence of elementary operations on operands (digits) according to the rules defined by its content. These operations cannot be completed until the values of all the results of the operations have been obtained, taking into account all the interconnections between the operands (digits). As a result, modern computer systems that use binary code to represent and process all types of data, i.e. based on PNS, have a significant disadvantage—the presence of inter-bit connections between the operands being processed, which affects the architecture of computer systems and methods of arithmetic operations, complicates the equipment and limits the speed of arithmetic operations.. And most importantly, due to inter-bit connections, one error in the bit leads to a block of errors, and the existing methods of error correction in the PNS are very difficult to implement and strongly affect the redundancy of the machine code [17].

In the system of residual classes (SRC), each number is represented in the form of several small-digit positional numbers, which are remainders from dividing the initial number into mutually simple bases. In the usual positional binary system, operations (for example, the addition of two numbers) were performed sequentially by bit, starting from the youngest. This creates a transfer to the next most significant digit, which determines the bitwise processing sequence. The possibility of paralleling this process appeared in the SRC: all operations on the remainders on each basis are performed separately and independently (in parallel), therefore, due to their low bitness, easily and quickly [18].

Also the SRC has a valuable property of the independence of the residuals from each other on the basis of the adopted system [19]. The independence of the residuals makes it possible to build computer system for processing enterprise data (CSPED) in the form of a set of information—independent, parallel computing paths (separate “small” computing paths of information processing, operating on a specific module \(m_{i}\) in the SRC, independently). Thus, CSPED have a modular design that enables maintenance and troubleshooting without interrupting the solution of the computational problem. Errors that occur due to failures of binary circuits in an arbitrary computational path on the basis \(m_{i}\) do not spread to neighboring paths (remain within one residual), which makes it possible to increase the reliability of calculations in the CSPED. It does not matter whether there was a single or multiple error, or even a package of errors with a length of not more than \(m_{i}\)−1 binary digits. Thus, the error that occurred in an arbitrary path \(m_{i}\) of the CSPED in the SRC, or will remain in this path until the end of the calculations, or in the process of further calculations will be eliminated (for example, if after a failure in the residual \(a_{i}\) the intermediate result is multiplied by a number zero having a zero digit based on \(m_{i}\)). In this case, with the help of SRC you can build a system of error correction with the introduction of minimal redundancy, which uses the dynamics of the computational process, introducing the concept of an alternative set of numbers. The set of bases of SRC \(m_{i1} ,m_{i2} ...m_{ik}\) by which numbers \(A_{1} ,A_{2} ...A_{k}\) differ from the incorrect operand \({\tilde{\text{A}}}\), is called an alternate set of numbers, and is denoted \({\overline{\text{W}}}\left( {{\tilde{\text{A}}}} \right)\). The basic idea of determining the erroneous residual (basis) \(a_{i} = a_{i} + \Delta \, a_{i}\) is that for the resulting sequence of incorrect operands \({\tilde{\text{A}}}_{i} = {(}i = \overline{1,p} {)}\) in the dynamics of the computational process, without interrupting the solution of the problem, sequentially in time are determined by conditional alternative sets (CAS):

$$ \overline{W}(\tilde{A}) = \overline{W}_{i - 1} (\tilde{A}) \wedge \overline{W}_{i} (\tilde{A}). $$
(1)

For some time, CAS is charged to the erroneous basis (or to two bases \(m_{i}\) and \(m_{n}\)). After that, the known methods are used to correct the distorted residual \(a_{i}\). A feature of this method of error correction is the ability to correct errors without stopping calculations, which is important for CSPED that operate in real time. A detailed study of the features of the SRC allows us to conclude that the devices that operate in the SRC, are easily controlled and easily diagnosable objects. The noted feature of CSPED functioning in SRC promotes development of effective methods of control and diagnostics [20].

This independence offers wide opportunities for constructing not only new machine arithmetic, but also a fundamentally new scheme for the implementation of CSPED, which in turn significantly expands the use of machine arithmetic.

Thus, this property of the SRC makes it possible to implement a unique system of control and correction of errors in the dynamics of the computational process with the introduction of minimal code redundancy without stopping calculations, which is very important for economic structures operating in real time [21].

3 Implementation of L-codes in the SRC

Currently, possibilities of R-codes for error correction in the SRC are being intensively investigated. This is due to the clear and simple structure of R-codes without deep interconnections, and really effective corrective properties, with a relatively simple procedure for their construction for any required minimum code distance.

Also for comprehensiveness it is necessary to consider other types of codes in non-positional systems, namely in the SRC, which are found in the literature under the name—linear codes (L-codes). When considering these L-codes in various scientific sources, it's described not by quantitative characteristics, but by qualitative ones.

Currently, no one is deeply researching the corrective capabilities of linear codes in combination with the properties of SRC. Developments in this direction would reveal broad and effective corrective properties, which necessitates the improvement of SRC-based data processing systems and the use of these systems to increase the reliability of CSPED.

The sum, difference, and product of any vectors of a linear code are code words. In this case, non-code words cannot be associated with any natural numbers. We show that error correction in the SRC with the help of L-codes leads to hardware redundancy equivalent to reservation. To this end, we consider two known theorems [22].

Theorem 1.

To correct an error in the residual at an arbitrary base \(m_{i}\) of the number \(A = (a_{1} ,\;a_{2} ,\;...,a_{n} )\), specified in the system of residual classes with bases \(m_{1} ,m_{2} ,\;...,\;m_{n}\), it is necessary that:

$$ (d_{ik} - 1)(d_{ij} - 1) \ge m_{i} - 1 - (K_{{d_{{i{\kern 1pt} k}} }} + K_{{d_{ij} }} - K_{{[d_{{i{\kern 1pt} k}} ,d_{ij} ]}} ), $$
(2)

where \(d_{ik} = (m_{i} ,\;m_{k} )\), \(d_{ij} = (m_{i} ,\;m_{j} )\), \(K_{{d_{{i{\kern 1pt} k}} }}\) id the number of divisors, multiples of \(d_{ik}\);

\(K_{{d_{{i{\kern 1pt} j}} }}\) is the number of divisors, multiples of \(d_{ij}\);

\(K_{{[d_{{i{\kern 1pt} k}} ,d_{ij} ]}}\) is the number of divisors, multiples of the lowest common multiple (LCM) \([d_{{i{\kern 1pt} k}} ,d_{ij} ]\) of the divisors \(d_{ik}\) and \(d_{ij}\), \(i \ne j\).

Proof. Calculate the values \(a_{ij}\), \(a_{ik}\), \(a_{jk}\). If the error occurred at the base \(m_{i}\), then \(a_{ik} = 0\), \(a_{ij} \ne 0\) and \(a_{ik} \ne 0\). The number of different combinations of \(a_{ij}\), \(a_{ik}\) is \((d_{ij} - 1) \cdot (d_{ik} - 1)\), where \((d_{ij} - 1)\) is the number of possible values of \(a_{ij}\) (\(a_{ij} \ne 0\)), \((d_{ik} - 1)\) is the number of possible values of \(a_{ik}\) (\(a_{ik} = 0\)), and the number of possible values of base errors \(a_{ik}\) is \(m_{i} - 1\) (\(\Delta a_{i} \ne 0\)) minus the number of undetected errors [22]. The number of undetected errors consists of the number of errors, multiples of the divisor \(d_{ik} - K_{{d_{ik} }}\) and multiples of the divisor \(d_{ik} - K_{{d_{ik} }}\). Thus, the number of possible values of detectable errors is:

$$ m_{i} - 1 - (K_{{d_{{i{\kern 1pt} k}} }} + K_{{d_{ij} }} - K_{{[d_{{i{\kern 1pt} k}} ,d_{ij} ]}} ). $$
(3)

To ensure compliance with the possible values of the errors on the basis \(m_{i}\) it is necessary to fulfill inequality (2).

Q.E.D. The necessary condition of Theorem 1 is sufficient if different values of the error values \(\Delta a_{i}\) correspond to different product values \(a_{ik} \cdot a_{ij}\), and vice versa. Indeed, in this case there is a one-to-one correspondence between the possible values \(\Delta a_{i}\) and the values of the product \(a_{ik} \cdot a_{ij}\), which determines the possibility of uniquely determining the magnitude of the error [23].

Based on Theorem 1, we compose an error correction algorithm for an arbitrary base \(m_{i}\):

1. Determine the number of distorted residual. To do this, we calculate the values:

$$ \begin{array}{*{20}l} {a_{1} - a_{2} = a_{12} (\bmod d_{12} )} \hfill \\ {a_{2} - a_{3} = a_{23} (\bmod d_{23} )} \hfill \\ {\;\;\;\;\;\;\;\;\;\;\;\;\;...} \hfill \\ {a_{n - 1} - a_{n} = a_{n - 1n} (\bmod d_{n - 1n} )} \hfill \\ {a_{n} - a_{1} = a_{n2} (\bmod d_{n1} )} \hfill \\ \end{array} $$
(4)

If all residuals are \(a_{ij} = 0\left( {\bmod d_{ij} } \right)\), then the number \(A\) is correct. If the error occurred at the base \(m_{i}\), then \(a_{ij} \ne 0\) and \(a_{ik} \ne 0\), thus, the number being tested \(\widetilde{A} = (a_{1} ,\;a_{2} ,\;...,\widetilde{{a_{i} }},\;...,\;a_{n} )\) is incorrect.

2. By the values of \(a_{ij}\) and \(a_{ik}\) appeal to the block of error constants, where we select the appropriate value of \(\Delta a_{i}\).

3. We perform the correction of the number \(\widetilde{A}\) in and we get the correct number \(A = \widetilde{A} - \Delta A\), i.e.

$$ A = (a_{1} ,\;a_{2} ,\;...,a_{i} ,\;...,\;a_{n} ). $$
(5)

If in the abbreviated SRC due to the exclusion of the base on which the error occurred, it is possible to unambiguously represent a number \(A\), then instead of determining by the values of \(a_{ij}\) and \(a_{ik}\) the value of the error \(\Delta a_{i}\), we will directly calculate the values of the correct remainder \(a_{i}\).

Consider this error correction algorithm:

1. Calculate the value of residuals \(a_{12} ,\;a_{23} ,\;...,\;a_{n1}\).

2. Determine the number of distorted balance. Let the error occurred at the base \(m_{i}\). In this case, this basis is excluded, and the number \(A\) is presented on the bases \(m_{1} ,\;m_{2} ,\;...,m_{n}\), i.e.

$$ A = (a_{1} ,\;a_{2} ,\;...,\;a_{i - 1} ,a_{i + 1} ,\;...,\;a_{n} ). $$
(6)

3. Perform a convolution of the number \(A\) into positional code.

4. Determine the true value of the distorted residual:

$$ a_{i} = A - \left[ {A/m_{i} } \right]m_{i} , $$
(7)

where \([x]\) is the whole part \(x\), not exceeding \(x\). Corrected number \(A_{cor} = (a_{1} ,\;a_{2} ,\;...,\;a_{i} ,\;...,\;a_{n} )\).

Let us determine the conditions under which it is possible to exclude some bases from the SRC. To do this, we present the bases of the original SRC in the canonical form:

$$ \begin{gathered} m_{1} = \beta_{11}^{{a_{11} }} \beta_{12}^{{a_{12} }} \ldots \beta_{{1l_{1} }}^{{a_{{1l_{1} }} }} \hfill \\ m_{2} = \beta_{21}^{{a_{21} }} \beta_{22}^{{a_{22} }} \ldots \beta_{{2l_{2} }}^{{a_{{2l_{2} }} }} \hfill \\ \;\;\;\;\;... \hfill \\ m_{n} = \beta_{n1}^{{a_{n1} }} \beta_{n2}^{{a_{n2} }} \ldots \beta_{{nl_{n} }}^{{a_{{nl_{n} }} }} \hfill \\ M = \beta_{1}^{{a_{1} }} \beta_{2}^{{a_{2} }} \ldots \beta_{k}^{{a_{k} }} \hfill \\ \end{gathered} $$
(8)

To uniquely determine the number \(A\), specified in the SRC with bases \(m_{1} ,\;m_{2} ,\;...,m_{n}\), and lying in the range \([0,M)\) it is possible to exclude only those bases for which \(\beta_{m} = \beta_{{il_{i} }}\), (\(m = \overline{1,\;k}\), \(i = \overline{1,\;n}\)). It is necessary that \(a_{m} \ge a_{{il_{i} }}\).

Thus, the necessary and sufficient conditions for error correction are determined by eliminating the distorted base. These conditions are simultaneous fulfillment of equality and inequality:

$$ \beta_{m} = \beta_{{i{\kern 1pt} l_{i} }} ,\;a_{m} \ge a_{{i{\kern 1pt} l_{i} }} . $$
(9)

Above, the algorithm for detecting and correcting errors in the SRC by means of L-codes was described. Let be \((a_{k} - a_{k + 1} )\bmod d_{kk + 1}\) when calculating values, it is determined that \(a_{i - 1\;i} \ne 0\), \(a_{{i{\kern 1pt} {\kern 1pt} {\kern 1pt} i + 1}} \ne 0\), and all other values are:

$$ a_{k\;k + 1} = (a_{k} - a_{k + 1} )\bmod d_{k\;k + 1} = 0. $$
(10)

Then it is stated that the number A is incorrect, and the error is present in the remainder of the base \(m_{i}\), i.e.

$$ \widetilde{A} = (a_{1} ,\;a_{2} ,\;...,\widetilde{{a_{i} }},\;...,\;a_{n} ). $$
(11)

Referring by the values \(a_{i - 1\;\;i}\) and \(a_{i\;\;i + 1}\) to the block of error constants, we determine the error value \(\Delta a_{i}\) and then we determine the true value of the residual:

$$ a_{i\;cor} = \widetilde{{a_{i} }} - \Delta a_{i} . $$
(12)

The corrected number will appear as:

$$ A_{cor} = (a_{1} ,\;a_{2} ,\;...,a_{i\;cor} ,\;...,\;a_{n} ). $$
(13)

To correct an error with the help of the developed correction method, it is necessary that the error \(\Delta a_{i}\) is not at the same time divisible by two dividers \(d_{i - 1\;\;i}\) and \(d_{i\;\;i + 1}\), which limits the class of corrected errors [24].

Thus, there is a need to develop effective methods and algorithms to expand the class of possible correctable errors.

The method of correction of one-time errors, allowing to correct errors that are multiples of one of the dividers \(d_{i - 1\;\;i}\) or \(d_{i\;\;i + 1}\), is as follows [22].

Let a SRC be set with mutually not simple bases, i.e. greatest common divider (GCD) \((m_{1} ,\;m_{2} ,\;...,m_{n} ) \ge 2.\)

And let a number be given in the SRC \(A_{cor} = (a_{1} ,\;a_{2} ,\;...,\;a_{n} )\).

We define all values \(a_{k\;k + 1}\), i.e. \(a_{12} ,\;a_{23} ,\;a_{34} ,\;...,\;a_{n - 1\;\;n} ,\;a_{n\;\;1}\). Without breaking the generality of reasoning, we assume that \(a_{i\;\;i + 1} \ne 0\), and all other values are \(a_{k\;\;k + 1} \ne 0\). Because:

$$ a_{i\;\;i + 1} = (a_{i} - a_{i + 1} )\bmod d_{i\;\;i + 1} \ne 0. $$
(14)

error may be present only in residues on the bases \(m_{i}\) or \(m_{i + 1}\). In this regard, two hypotheses are possible:

  • an error is present in the residual \(a_{i}\);

  • an error is present in the residual \(a_{i + 1}\).

Before we consider the error correction process by the proposed method, we formulate and prove a theorem, the result of which we use in determining the convergence process for the totality of numbers of the form:

$$ A^{{(k_{i} )}} = (a_{1} ,\;...,\;a_{i - 1} ,\;a_{{i{\kern 1pt} k_{i} }} ,\;a_{i + 1} ,...,\;a_{n} ), $$
(15)

to the correct number:

$$ A^{(\rho )} = (a_{1} ,\;...,\;a_{i - 1} ,\;a_{{i{\kern 1pt} \rho }} ,\;a_{i + 1} ,...,\;a_{n} ). $$
(16)

First consider the lemma.

Lemma. The sum, difference, and product of any L-code code words are also code words.

Theorem 2.

Let in the ordered (\(m_{i - 1} < m_{i}\); \(i = \overline{1,\;n}\)) system of residual classes with bases \(m_{1} ,\;m_{2} ,\;...,m_{n}\) an incorrect (distorted in one residue) number be given \(\widetilde{A} = (a_{1} ,\;a_{2} ,\;...,\;a_{i - 1} ,\;\widetilde{{a_{i} }},\;a_{i + 1} ,...,\;a_{n} )\) and let \(\Delta a_{i} = \widetilde{{a_{i} }} - a_{i} = k_{i} d_{i - 1\;i}\).

Then in the set of values \(a_{{ik_{i} }} = (\widetilde{{a_{i} }} - k_{i} d_{i - 1\;i} )\bmod m_{i}\) there is a single value of \(a_{i\rho }\), at which the number:

$$ A^{(\rho )} = (a_{1} ,\;a_{2} ,\;a_{{i{\kern 1pt} \rho }} ,\;...,\;a_{n} ), $$
(17)

is the correct number, where \(d_{i - 1\;i} (m_{i - 1} ,\;m_{i} )\), and \(k_{i}\) may take values \(k_{i} = 1,\;2,...,\;m_{i} /d_{i - 1\;i} - 1\).

Proof. We show that there is such a value of \(a_{{i\rho_{1} }}\), at which the number \(A = (a_{1} ,\;a_{2} ,\;...,\;a_{{i{\kern 1pt} \rho }} ,\;...,\;a_{n} )\) is the correct number. By the condition of the theorem, the error \(\Delta a_{i}\) is a multiple of the divisor \(d_{i - 1\;i}\). The expression \(k_{i} d_{i - 1\;i}\) contains all possible multiples of \(d_{i - 1\;i}\).

Thus, there will be at least one value of \(k_{i} = \rho_{1}\), at which:

$$ \Delta a_{{i\rho_{1} }} = \rho_{1} d_{i - 1\;i} , $$
(18)

and

$$ a_{{1\rho_{1} }} = \widetilde{{a_{i} }} - \Delta a_{{i\rho_{1} }} . $$
(19)

We show that \(A^{{(\rho_{1} )}}\) is the only correct number from the set of numbers of the form \(A^{{(k_{i} )}}\).

Suppose there is such a value:

$$ a_{{1\rho_{2} }} = \widetilde{{a_{i} }} - \rho_{2} d_{i - 1\;i} , $$
(20)

at which the number \(A^{{(\rho_{2} )}}\) is also correct. Then, in accordance with lemma, the number:

$$ A^{{(\rho_{1} )}} - A^{{(\rho_{2} )}} = (0,...,a_{{i\;\rho_{1} }} - a_{{i\;\rho_{2} }} ,\;...,\;0), $$
(21)

is correct. If the number \(A^{{(\rho_{1} )}} - A^{{(\rho_{2} )}}\) is correct, then in accordance with lemma we have:

$$ \begin{gathered} (\rho_{2} - \rho_{1} )d_{i - 1\;i} \equiv 0(\bmod d_{1 - i} ) \hfill \\ (\rho_{2} - \rho_{1} )d_{i - 1\;i} \equiv 0(\bmod d_{2 - i} ) \hfill \\ \;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;... \hfill \\ (\rho_{2} - \rho_{1} )d_{i - 1\;i} \equiv 0(\bmod d_{n - i} ) \hfill \\ \end{gathered} $$
(22)

If \(i \ne n\), then the only correct number \(A^{{(\rho_{1} )}} - A^{{(\rho_{2} )}}\) is the zero code word. This is due to the fact that \(d_{i - 1\;i} \ne 0\) and \(d_{i - 1\;i}\) is not equal to the GCD of the dividers \(d_{1i} ,\;d_{2i} ,\;...,\,d_{ni}\).

Moreover, inequality \(d_{i - 1\;i} \ne [d_{1i} ,\;d_{2i} ,\;...,\,d_{ni} ]\) contradicts the condition of arbitrary choice of bases \(m_{1} ,\;m_{2} ,\;...,m_{n}\). Therefore, the following equality holds \(A^{{(\rho_{1} )}} - A^{{(\rho_{2} )}} = (0,\;0,...,0,\;...,\;0)\).

Thus, \(\rho_{1} = \rho_{2}\), that confirms the uniqueness of existence \(\rho_{1}\), at which:

$$ A^{{(\rho_{1} )}} = (a_{1} ,\;a_{2} ,\;...,\;a_{{i{\kern 1pt} \rho_{1} }} ,\;...,\;a_{n} ), $$
(23)

is correct. Q.E.D.

Thus, the developed method of error correction in the SRC allows to extend the class of corrected errors. This greatly expands the corrective possibilities of the L-codes in the class of deductions.

Consider the operation of the device for detecting errors using L-codes, in accordance with the above algorithm. This device contains the input register, modulo adders \(m_{i}\) and \(d_{1i}\) (\(i = \overline{2,\;n}\)) and (\(n - 1\))—the input element OR (see Fig. 2).

Fig. 2
figure 2

Device for detecting errors

The algorithm of operation of this device corresponds to the error detection algorithm developed above [25].

As can be seen from the considered materials of the performance of the error correction operation, using the L-codes, the error detection process is implemented extremely simply.

The time of error detection for the SRC given by any system of bases is always equal to three conditional time ticks and does not depend (as is observed for R-codes) on the number \(n\) of information bases [26].

The above-discussed variants of devices for detecting errors in the SRC make it possible to guarantee the detection of a number \(A\), distortion, however, this does not determine the number of the base on which the residue was distorted [22].

4 Conclusion

The need to eliminate threats and destructive factors of progressive information and technological development of the national economy became the basis for substantiation of conceptual and practical provisions for the formation of a secure information environment. It is proved that strengthening the information security of the business entity should be based on ensuring the reliability, confidentiality, integrity of information. It is established that modern methods and means of information and communication and digital technologies cannot entirely provide full protection and reliable processing of ever-growing arrays of information. Therefore, the basis for ensuring the information security of enterprises is determined by improvement of methods of errors diagnosis and correction in the system of residual classes.

Thus, the error correction algorithms in the SRC with mutual in pairs non-simple bases make it relatively easy to implement a procedure for detecting and correcting one-time errors [27]. The considered scheme of detecting and correcting one-time errors makes it possible to localize the erroneous base and correct the error in one residual in just five conventional time ticks for any number of the SRC bases. The main advantages of the L-codes in the SRC is the simplicity of the procedure for detecting the location of an error and its localization. By the simplicity of decoding schemes, the L-codes have no analogues, both in the PNS and in the SRC.