Probability of a Checksum Error in a Message with Possible Distortion


The study of the effectiveness of the checksum for detecting distortions in the transmitted message is an urgent task solved within the framework of various possible models of the operating conditions of information transmission channels. In this article, distortions were modeled by superimposing a noise component with a low signal-to-noise ratio \(\delta \), which is of the greatest practical interest. The considered class of checksums refers to the message integrity control implemented, in particular, in the TCP protocol. The functional dependence of the error probability of checksums on the value \(\delta \) with a small value of the latter was obtained.

This is a preview of subscription content, access via your institution.


  1. 1

    Vainshtein, L.A. and Zubakov, V.D., Vydelenie signalov na fone sluchainykh pomekh (Signal Detection in Background Noise), Moscow: Sov. Radio, 1960.

  2. 2

    Baranov, A.P. and Baranov, P.A., Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions, Autom. Control Comput. Sci., 2017, vol. 51, 959–964.

    Article  Google Scholar 

  3. 3

    Baranov, A.P. and Baranov, P.A., Estimating the probability of a checksum error in a message, Autom. Control Comput. Sci., 2019, vol. 53, pp. 874–878.

    Article  Google Scholar 

  4. 4

    GOST R IEC 870-1–95: Telemechanics Devices and Systems. Part 5. Transfer Protocols. Section 1. Formats of Transmitted Frames, 1995.

  5. 5

    Rao, S.R., Lineinye statisticheskie metody i ikh primenenie (Linear Statistical Methods and Their Application), Moscow: Nauka, 1968.

  6. 6

    Vasiliev, Y.S., Zegzhda, P.D., and Kuvshinov, V.I., Modern problems of cybersecurity, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2014, vol. 17, no. 3, pp. 210–214.

  7. 7

    Aleksandrova, E.B., Shkorkina, E.N., and Kalinin, M.O., Organization of the quantum cryptographic keys distribution system for transportation infrastructure users, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 969–971.

    Article  Google Scholar 

  8. 8

    Aleksandrova, E.B., Yarmak, A.V., and Kalinin, M.O., Analysis of approaches to group authentication in large-scale industrial systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 879–882.

    Article  Google Scholar 

  9. 9

    Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, ACM International Conference Proceeding Series, 2017, pp. 295–298.

  10. 10

    Krundyshev, V. and Kalinin, M., Prevention of false data injections in smart infrastructures, 2019 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2019, 2019.

  11. 11

    Lavrova, D., Poltavtseva, M., and Shtyrkina, A., Security analysis of cyber-physical systems network infrastructure, Proceedings of 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018, 2018, pp. 818–823.

    Article  Google Scholar 

  12. 12

    Konoplev, A.S. and Kalinin, M.O., Tasks of providing information security in distributed computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 669–672.

    Article  Google Scholar 

Download references

Author information



Corresponding authors

Correspondence to A. P. Baranov or P. A. Baranov.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by S. Avodkova

About this article

Verify currency and authenticity via CrossMark

Cite this article

Baranov, A.P., Baranov, P.A. Probability of a Checksum Error in a Message with Possible Distortion. Aut. Control Comp. Sci. 54, 779–785 (2020).

Download citation


  • information security
  • TCP
  • CRC
  • checksum
  • error probability
  • distortion model