The methods for protection of non-public information against electromagnetic infiltration are very important issue that requires constant development of technological advancement of the devices on which such information is processed. The current methods are the solutions regarding construction of the devices and organisation oriented solutions that are related mainly to physically limiting access to such information. The new area concerning electromagnetic protection of processed information by means of electricity is the programme based methods. These, however, do not deal with the issues of cryptographic information protection. The programme based protection uses special shapes of fonts, which having passed through the Radiated Information Infiltration Channel (RIIC) make reading of protected data impossible. This is achieved through eliminating specific character elements (roots, sheriffs, arcs) and maximising the degree of similarity between them. However, the assimilation should not make the original characters, i.e. those displayed on the screen of the device that processes these data harder to differentiate between them. Yet, is maximising the degree of similarity between the characters of a safe font decisive for electromagnetic security? The article presents two font solutions of similar character shape, which are however much different from one another in terms of their degree of recognisability on the output of the RIIC due to structural detail. This shows that maximising similarity between characters in their original form does not have to increase the degree of resistance to recognition of the secondary characters.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.