JPRS ID: 9115 EAST EUROPE REPORT SCIENTIFIC AFFAIRS
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP82-00850R000200090001-9
Release Decision:
RIF
Original Classification:
U
Document Page Count:
21
Document Creation Date:
November 1, 2016
Sequence Number:
1
Case Number:
Content Type:
REPORTS
File:
Attachment | Size |
---|---|
![]() | 1018.42 KB |
Body:
APPROVE~ FOR RELEASE: 2007/02/08: CIA-R~P82-00850R00020009000'1 -9
i ~ J ~
~ ,~~l~E ~~~0 f F~l~~ ~
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
FOR OFF[CIAL USE ONLY
JPRS L/9115
2 June 1980
- .
- E a st E u ro e R e o rt -
p p
- SCIENTIFIC AFFAIRS -
CFOUO 5/80)
,
FB~$ FOREIGN BROADCAST INFORMATION SERVICE
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
NOTE _
JPRS publications contain information primarily from foreign
newspapers, periodicals and books, but also from news agency
transmissions and broadcasts. Materials from foreign-language
sources are translated; those from English-language sources
are transcribed or reprinted, with the original phrasing and
- other characteristics rPtained.
- Headlines, editorial reports, and material enclosed in brackets
are supplied by JPRS. Processing indicators such as [Text]
or [Excerpt] in the first line of each item, or following the
last line of a brief, indicate how the original information was
processed. Where no processing indicator is given, the infor-
~ mation was summarized or extracted.
Unfamiliar names rendered phonetically or transliterated are
enclosed in parentheses. Words or names preceded by a gues-
tion mark and enclosed in parentheses were not clear in the
original but have been supplied as appropriate in context.
Other unattributed parenthetical notes within the body of an
item originate with the source. Times within items are as
given by source.
Tl,.e contents of this publication in no way represent the poli-
cies, views or attitudes of the U.S. ~overnment.
For further information on report content
call (7031 351-3060. _
COPYRIGHT LAW~ AND REGULATIONS GOVERNING OGI~TERSHIP OF
MATERI.P.LS REPRODUCED HEREIN REQUIRE THAT DISSEi~IINATION -
OF THIS PUBLICATION BE RESTRICTED FOR OFFICIAI, USE ONI,Y.
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
FOR OFFICIAL USE ONLY -
. JPRS L/9115
2 June 1.9 80 -
EAST EUROPE REPORT
$CIENTIFIC AFFAIRS
' (FOUO 5/so)
= CONTENTS
CZECHOSLOVAKIA
Use of Decision Tables for Protection of Data in Computers _
- tt3:nnd Date, Banka
(Cestmir Sra~hans; AUTOMATIZACE, Feb 80) .1
_ High-Quality Steel From 0].a Jet Engines
(Bohdan Irmler; HUTNiK, Feb 80) 10
- a - [IZI - EE ~ 65 FOUO]
- FOR 0~'FICIAL USE ONLY
b
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
FOR OFFICIAL USE ONLY
CZECHOSLOVAKIA
UDC 381.32:517.1
USE OF DECISION TABLES FOR PROTECTION OF DATA IN CONIPUTERS AND DATA BANKS '
Prague AUTOMATIZACE in Czech No 2, Feb SO pp 40-43
[Article by Engr Cestmir Srajhans, CSc, College of the National Security
' Corps, Prague]
- [Text] The article discusses the problem of protecting
_ data in computers and data banks. The decision algorithm _
in automatic protection systems is fairly complex. The =
~ decision table is a suitable tool for ths solution of
this demanding problem. If the protection system is suit-
ably designed, then the computer automatically puts into
effect measures co~nensurate with the degree of threat to
the stored or processed data. The article presents one
of the feasible variants for designing data protection.
Topic tags: data protection, decision tables.
Introduction
Advances in computer technology and the constantly growing volume of data
- stored and processed in computers and data banks create various problems.
One such problem is effective and preferably automatic protection of the
data from destruction, tampering, theft or misuse by an unauthorized person.
- If we disregard natural hazards (fires, earthquakes, floods, etc.), then
_ the main threat to data security is man--the penetrator. By this concept
we mean the organization or individual who intentionally or accidentally
enters the system and by his action causes the data to be destroyed, dis-
torted or stolen, to the user's detriment.
Indentifier's Role
The pretection of data from penetration thus consists essentially of iden-
tifying the persons who have authorized access to the data, and of accurate-
ly defining the rights and privileges of these authorized persons. The vari- :
ous types of protection must therefore permit the differentiation of the in- -
dividual users as authorized or unauthorized. An authorized user may Y.ave -
the following rights:
1 -
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
FOR OFFICIr1L USE ONLY
To alter the recorded data; '
To read the data;
To exercise his privileges that may be full or li.mited;
To enjoy a certain priority in relation to other users.
If a user wants to access the system (computer or data bank), he first must
prove that he is an authorized person, and that he performs activities and
requires services only for which he has authorization. As soon as he ex-
ceeds his authority, he becomes an unauthorized person. The protection sys-
tem then must immediately react, adopt the necessary measures and uncover
the unauthorized activity. The agreed-upon and unambiguously defined method
that is able to identify the user and to define his privileges is called the
identifier. If the protection system is to be effective, it is not enough -
to identify merely the user. It is also necessary to unambiguously identify
further elements of the system. Such elements are particularly: _
Hardware elements: terninals,
processors,
memories,
teleco~nunications channels;
Software elements: programs,
sets,
elements of the operating system;
- Privileges: priorities,
authorization of activity in the system,
secrecy classification.
Decision Tables
From the preceding it is evedient that it is by no means easy to decide
whether a user is an authorized person, and wnether he conducts only activ-
ities for which he is authorized. A decision matrix that could describe
this situation would have to be multidimensional and very complex. There-
fore it seems expedient to describe the decision algorithm with the help of -
decision tables. Decision tables are a suitable and by now well-developed
tool, understable to both the computer and to man. Depending on the number
of conditions, decision tables may contain scores and even hundreds of pos-
sible rules. The total number of all rules p is given by the equation:
P = 2q
where q is the number of conditions. In the case of three conditions, then,
we get eight different rules. If there are five conditions, the number of
dif~erent rules is 32; and in the case of 10 conditions, their number is
102a~. In such complex decision tables, many different rules lead to the -
same decisions. We then say that the decision table is redundant. It then
- becomes necessary to reduce the decision table and to exclude the redundant
2
- FOR OFFICI~,L USE ONLY _
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
FOR OFFICIAL USE ONLY
rules. When~complex decision tables are being reduced, it may easily happen
that some of the basic rules are omitted. If a decision table does not con-
tain all the rules that lead to different decisions, we say that the deci-
sion table is incomplete. Combinations of the conditions from which the
rules are formed may lead in some instances to contradictory situations in
_ which it is not possible to make any decision. If the decision table con-
tains such rules, we say that the table is contradictory (conflicting).
If the computer is to make correct decisions automatically on the basis of
the adopted decision table, this table must be complete and n~nredundant,
and it must not contain contradictory rules. When constructing a decision
table, therefore, it is essential to always check the table, correcting it _
when necessary.
During the logical analysis of the individual rules we often find ti~at some
of ttie conditions do not particip~te in the resultant decision; whether or
not the conditions is met does not influence the decision. In such cases
it is expedient to introduce in the quadrant of rules the so-called incon- -
sistent value N. It indicates that the condition does not participate in
the decision; thus for N we may substitute a value of 1 as well as a value
of 0. In certain types of decision tables it is convenient to introduce the
ELSE; rule. These are tables that lead only to two different decisions and
employ the logic function AND or OR. In decision tables of tnis tvpe only
one rule results in a certain d~acision, and all the other rules result in
the opposite decision. Such a table is thus highly redundant. We remove -
the redundancy by retaining only the one rule and combining all the other
rules into a single rule, the so-called ELSE rule. A decision table that
contains an ELSE rule is complete and r~onredundant.
Design of an Automatic Protection System
Figure i is a flowchart in which the decision algorithm of one of the pos-
sible systems for protecting data in computers or data banks is written
with the help of decision tables. It is of course possible to write a sin- _
gle decision table for this purpose, but such a table would be too complex.
,
The~refore three decision tables have been used: RT-1 (permission), RT-2
(execution), and RT-3 (verification). Let us now describe the mentioned
flowchart, check the individual decision tables and analyze their logic.
Wh~n accessing the system the user must identify himself with valid identi-
fiers. The first decision must be made, illustrated in the flowchart by the
diamond "Access procedures fulfilled." If the user does not know the valid
identifiers or makes a mistake during identification, he is rejected and
warned that he did not proceed properly. The concept "access procedures"
may include:
Tdentification of the user,
Identification of the terminal,
Identification of the processor, memory or channel.
- 3
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
FOR OFFICIAL USE ONLY
~'O O ~ O ~c
' ~4' O O K _
[i� ~ O ~c
_ ,p n ~ 'C .
v
~ - p
~N ~ ~ O ~ j ~
, 'v .F
~ ~ ~ Z e~ K i.a .
~4 ~
- O
~ ~3 ~
~ O ,N ~S O
~ v -~i` C ~p t~
a ~ C > > a O N U
,j C b c~i ~ N Q v U1 -
V~ ,l p ~ 1 ~ a y
~ v ~ ~ ~ ti t~, N
L ~Q ~ t ~v ~ ~ L U
Q U
l ~u O '1 C ~G O ~ C C ~ ^ ~
c�, ~ ~C ~ '4i ~ai�J ~ ~j'~ ~O ~ N 1~1 ~
~ ,b L
, Q~ ~ C ~ y
j E o ~l L~< 'C j W
'~n Q 44 V 4 u ~
� -
~ 'a' ~ N Ifl
.M.. Ol O r-I N N N ~-i r-~ N �~i
~ ~N.. N v ~I
r e v ~
~
. ro
L(1 ~ � ^
~ Q '
,G v y~' O ~ ~C ~m b~
a, o ?
C y o ~ ~N 2 p k a
IV i j w n k v~ e~ a~
~ � ~ .
~
~ ~ G
t J C
~ ~
~ ~ ~ ~N O N
o l ~ N ~.1 .
o ~ ~ 4 ~d Q)
o , ~ ~x
~ i 'v 'm -
v ~ y C ~C~ ~ ~ ~ ~ 3 3~1
7 Q ~ �p O iV I ~ ~ O ~
-'o~. Q 1~ ~ o y� ~ ~ w u
. o y ~ ~ y ~ ~ l~ C ,
� ~ Q e C C . 4~e ~ C ~ s~ �
~ C ~ i C ,O r-1
oi ~
~ � � 4 n a ~ ~ ~ . ~
4 4~ 4 Q, , ~ o o O 4 Q ~
.
W
~ '-,I rN-1 r-1 t7' tn tD f~ M Op
~ v v v ~ r1 r-I
~ v v ~ .
_ ~
FOR OFFICIAL USE ONLY �
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
i
FOR OF'FICIAL USE ONLY
,
Key to Figure 1: ~
1. Start 16. Authorized to read or alter data
2. Access procedures fulfilled 17. Switch to RT-1 -
3. No 18. Execute instruction
4. Warning 19. RT-3 (verification)
5. Yes 20. Additional identifiers do not
- 6. Wait agree
7. RT-1 (permission) 21. Memory blocked
8. ELSE 22. Sys~~em not functioning propErly
9. Authorized access to program 23. Simulate operation, issus alarm
10. Authorized access to set 24. Interrupt, institu�"te checks -
11. Priority user 25. Eliminate fault
12. Switch to RT-2 26. Simulation
13. Switch to RT-3 27. Alarm
?4. RT-2 (execution) 28. Stop
_ 15. Restriction on set or program
- If the user fulfills +the accessing procedures, he is allowed access to the
system and is checked further. Pennission table RT-1 investigates whether
- he hz.s authorized access to the desired program. The user nnist thus know
the identifier of this program. The identifier is valid for one access only
= and is changed after each access. It is actually a relative address record-
ed in the system's central memory as a two-digit number that is automatically
printed out for the user if he has been permitted access to the program. The
program the.~ selects the appropriate set. The user is aqain checiced whether
he has authorized access to the set. The se~'s identifier c~~ntains the fol-
lowing: the set's name, the descriptor of the form of recorciing, the user's
identifie.r, and the identifier of the medium. If the user passes also this
_ check, the ~:ermission table inv~stigates further whether he has any prior-
ity, whether he may claim preferential service. If the system has only one
_ user, this test may be omitted. The priority identifier is related to the
user's function and is expressed numerically (the lower the number, the
higher the function and the priority). If all condi~ions in Table RT-1 have
been met, the user may be served. In this case he is transferred to execu-
tion table RT-2. If any of the conditions in RT-1 is not met, the user be-
comes suspect. He is then transferred to verification table RT-3, which in- ~
r�estigates whether there is an att~mpt at penetration.
Table RT-1 contains the ELSF. rul~; hEnce it is nonr~dundant and complete,
- and therefore it does not have to be analyzed further.
Lei: us assume that the user has successfully passed all the tests, has -
reached table RT-2 and demands service. Before a decision to execute the
instruction, it is necessary to determine whether the user is within his
privileges for the system. Therefore a check is made whether. he has any re- -
strictions regarding the set and the program, and whether he is requesting
execution of an instruction for which he is authorized. His rights are ex-
pressed by the access iclentifiers. RT-2 thus checks whether these rights
5
FOR OFFICIAL USE ONLY �
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-00850R040240090001-9
FOR OFFICIAL USE ONLY
have been exceeded. If the user has not exceeded his rights, the desired
instruction is executed and the user is served.
F'secution table RT-2 contains two conditions. Hence from formula p= 2q
it follow~ that the table must contain four rules. These are:
P1 P2 P3 P4
1 1 0 0
1 0 1 0
Let us subject these rules to logical analysis. According to rule P1, the
user is authori2ed to read or alter the data, but this authorization is not
unlimited. He is restricted i.n relation to either the program or the set.
~ If the requested instruction is in conflict with his rights, the user is -
returned to RT-1 and is checked again. If it is established that the user
- accessed the system but does not have any rights (see rule P2 and P4), then
he is under suspicion of having stol~n some of the identifiers, or that he
removed or circumvented protection. He is then regarded as a p~netrator
and is transferred to verificatio:~ table RT-3. We see that in this case
the first rule has no significant validity. Therefore we may introduce the
inconsistent value N and combine rules P2 and P4. Then solely rule P3
leads to the execution of the instruction. According to this rule, the user
is under no r~striction and is authorized ~o request the instruction. With ,
the execution of the instruction, the algorithm ends.
Table 22T-2 is likewise nonredundant and complete. I~ contains tr.ree rules,
each of which results in a different decision. Rule P2, which contains the
inconsistent value N~, actually represents two rules: P~ and P4. `
Verification table RT-3 contains three conditions. Theoretically it thus
- shenld have eight rules. In our case, however, inconsistent values N are
introduced into two rules, whereby the number of rules is reduced oy two.
Let us subject these rules to logical analysis. Rules P1 and P3 result in
~he same decision. A basic condition for both these rules is a third condi-
- tiona If this condition is fulfilled, then the system has lost control over `
- itself and security of the data is compromised. If t_o this condition there
is added a further fault, then it becomes necessary to issue an alarm (acous- `
tical or optical), to disconnect all users, to interrupt operation and insti-
tute checks. Rule PS likewise leads to a similar decision. But here the
system's improper functioning is not linked to any furicher fault. In this
case there is evidently a tecr.nical breakdown that must be correct~d without
delay.
Interesting is the decision pursuant to rule P2. In this case the protec- -
tion system iinds, with a high d~gree of prob~bility, that there is an at-
, tempt to penetrate the system. The user either did not know tY,e additional
identifiers or acted so clumsily that the protection system classified him
as a penetrator. If communication with him w~re broken off on the basis of
6
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
~
FOR OFFICIAL USE ONLY
- this finding, an actual penetrator would imanediately recognize that he has
been discovered, would strive to conceal his clues and to escape. Therefore
~ in this case a secret alarm is issued. Normal operation is simulated, but -
the penetrator receives false data. Thereby time is gained to catch the
p~ane�,trator in t:he act.
Rule P4 solves the case when one aser must allow another user with higher
priority to precede him. According to rule P6, the result of the check on
- the user is positive, and the protection system has no objection to provid-
- ing service for him.
We still have to check whether RT-3 is nonredundant and complete. In this
case, however, the situation is not so clear as in the case of decision ta-
bles RT-1 and RT-2.
Checking the Decisi~n Table -
In the case of complex decision tables we check their nonredundancy and com-
pleteness by successively reducing them into elementary decision tables whose
completeness and nonredundancy we are able tc recognize directly. During
the redt~ction into elementary de~ision tables is suificient to investi-
gate only the quadrant of c~nditions and the quadrant of rules. We distin-
guish in all six types of elementaxy decision tables with the following
properties: ~
> P Decision table incomplete.
Qr C
2 P -
= Q~ N Decision table nonredundant and com-
~ plete.
3. Pr Pi
Decision table incomplete and redundant.
Q, C C ,
~
4. Pr Pi
Q, C C Decision table nonredundant and com-
~ plete. `
_ 5 pi Pz Decision table redunandant, possibility
Q~ ~ ~ of contradiction not excluded.
- 7
- FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
FOR OFFICIAL USE OhZY
_ 6 P' P1
N N Decision table redundar~t, possibility
Q~ of contradiction not excluded. "
~ The symbols in these tables are as follows: ~
Q1~ Q2~ Q3 are the conditions,
, pl, P2, are the rules.
C,., is a consistent value of 1 or 0,.
_ C... is a consistent value of the opposite type, 0 or 1,
N... is an inconsistent value of 1 or 0.
The checked decision table is nonredundant and complete if all the Elemen-
_ tary decision tables it contains are either of t~pe 2 or type 4. If any
other type of elementary decision table occurs, then the checked decision
table is either redundant, incomplete or contains rules that lead to con-
tradicticn.
- Let us now reduce our decision table RT-3. We prepare the reduction An the
basis of a selected key condition. We strive to choose a condition that does
not contain the value N. In our casp we select the first condition, Q1. On
~he basis of this key candition we reduce the decision table into two partial -
_ decision tables, A and B. Table A will comprise the 1 values of key condi-
tion Q1, and table B will comprise the 0 values of key condition Q1. Thus
A B � ' _
_ p~ p1 p~ p pf p6
Q~ N N Oi 1 f 0 0
Q~ 1 0 0~ 1 0 1 0
Partial tables A and B are not elementar~ tables. Therefore we continue our
reduction. For the key condition in both cases we select Q3. In the same
- manner we obtain _
aa ae ea ea
p~ p p~ ps p` p6
- ~ 0~ N C= N 0= 1 0 Q2 1 0 -
~
All tliese par�tial tables are elementary tables and cannot be reduced further.
Elemen~ary decision tables AA and AB are of type 2, and elementary decision
tables BA and BB are of type 4. Table RT-3 does not contain elementary de- ~
cision tables of any other type. Hence it is nonredundant and complete.
_ The advantage of the described algorithm for checking decision tables is its ~
simplicity. Reduction and checking can be run on a computer. In the case
- of complex decision tables containing several hundred rules, the ~dvantage
' of this method of checking is obvious.
8 -
FOR OFFICIAL USE ONLY -
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
FOR OFFICIAL USE ONLY
Conclusion
It is the duty of every top official to pratec� data and information in gen-
eral. Moderr.i computers of the later generations, the extensive dat~ banks,
and particularly the automatic control systems demand that the problem of
data protec~ion be solved seriously and with full respansibility at every
level of management. This does not apply merely to systems ~hat process
data which are state or official secrets. Al1 data, even nonsecret data,
are of considerable value to the user. For this reason ~t is necessary to _
guard such data with effective and reliably functioning ~rotec~ion systems.
Since the storage, processing and retrieval of data in .~~3ern systems is
highly automa`ted, it is essential that also the protection system function
- automatically. Hence suitable methods and tools must be sought for this _
purpose. The article points out that decision tables aXe very suitable
tools for this purpose.
BIBLIOGRAPHY
1. Gerasimov, V., and Vladislavskiy, V.: "Methods of Protecting Iriforma-
tion in Automatic Control Systems," a series of articles in ZARUBEZHNAYA
RADIOTEKHNIKA, Nos 2, 6, 8 and 10, 1975.
_ 2. Hoffman, L.: "Security and Privacy in Comguter Systems," Melaille
~ Publishing Co, Los Angeles, California, 1973.
- 3. Chvalovsky, V.: "Rozhodovaci Tabulky" (Decision Tables), SNTL [State -
Publishing House for Technical Literature], Prague, 1974.
4. Work paper for the Seminar on Decision Tables, Research Institute for
Control and Automation, Prague, 1970.
- 5. Srajhans, C.: "Protection of Inf~rmation in Automatic Control Systems," _
science-candidate dissertation, College of Special Sciences and Re-
search, Prague, 1979. ~
COPYRIGHT: ShTL, Nakladatelstvi Technicke Literatury, Prague, 1980.
1014
CSO: 2402
= 9 -
- FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED F~R RELEASE: 2007102/08: CIA-RDP82-00850R000200090001-9
~
- FOR OFFICIAL USE ONLY
CZECHOSLOVAKIA
_ HIGH-QUALITY STEEL FROM OLD JET ENGINES
Prague HUTNIK in Czech No 2, Feb 80 pp 57-60
[Article by Eng Bohdan Irmler, Trinec Iron Works VRSR [Trinec Iron Works
of the Great October Socialist Revolution~]
[Text] Discarded jet engines of aircraft made of highest quality construc-- -
tion materials containing Ni,Cr,Al constitute a very valuable raw material
for. metallurgical plants. But disassembly of discarded ~et engines into
individual elements is very time consuming and Kovosrot collection centers
perform it only to a limitPd degree. -
_ Originall~ the TZVRSR used to purchase discarded jet engines together with
- assorted highly allayed scrap for remelting in an open-hearth furnace to
recover steel of known chemical composition. Following the modification
of the remelting technology in an open-hearth furnace to remove phosphorus,
the chromium contained in the aircraft eng~ne was burned away which led to
a 4earch for a new method of procesa~ng aircraft engines. Following re-
melting in an electric arc f�urnace (the engine was added to the basic melt)
" the resul.cing average chemi~~al composition in percentages was as follows:
= C=0.61; Mn=1.04; Si=5.4~; P=0.049; Cu=1.16; Cr=7.7; Ni=10.15; Mo=0.59;
W=0.73; Ti=0.26; A1=11.0.
The high carbon content stems from the rubber components of the aircraft =
- engine. The true Si content will be considerably lower because following ~
the add3tion of the aircraft engine t.he furnace slag was completely de-
prived of oxygen and an unknown quantity of Si was extracted by reduction ~
from the ladle lining. In reality, the phosphorus content is lower; chem- _
:ical analyses of individual parts of the a','.rcraft engine disclosed that
the steel and the alloys used in the construction contained less than
0.03~ percent P. The average sulfur content was not determined because
- of complete desulfurization of the steel bath following the addition of
the aircraft engine (0.003 percent S). Also the aluminum eliminated with
the slag was considered.
_ Cheraical analysis reveals that it is most advantageous to process dis-
carded aircraft engines by oxidation remelting in the production of CrNi
10
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
- FOR OFFICIAL USE ONLY
_ (Mo) class 17 steel. The direct remelting technology was developed at
- TZVRSR between 1976 and 1977. Aircraft engines are remelted in an alkaline
12-ton electric-arc furnace equipped with electrohydraulic control. The
transformer input is 2.5 MVA.
The firat melts were characterized by excessive meltoff of the furnace
bottom and walls as a result of the high temperature of the steel bath -
following oxidation. The bath temperature could not be determined because
TZVRSR did not possess a device for measuring bath temperatures around
2,100�C. Fundamental improvement was not ach~tved until the following
technological changes were made:
a. Nickel plate was replaced with nickel oxide in the melt.
b. The steel-bath temperature before ovidation was increased from 1,580- -
1,600�C to 1,630-1,670�C. ~
c. Oxidation with oxygen was terminated when the carbon content in the
bath dropped to 0.12-0.15 percent.
The first two technological measures were designed to postpone the oxida-
tion of A1 and Si dissolved in the steel bath partly into the last melting
stage, mainly into the post-tieating stage. This resulted in a sharp in-
crease in the temperature of the steel bath at about 1,600�C at which
point the temperature of the melt rose by SO�C within 10 minutes. -
The third technological measure was based on the experience that, in dif- _
ference to melts conducted by the standard technology where intensive carbon
- combustion terminates at a 0.05 to Ov08 percent carbon content in the bath,
intensive carbon burnoff is blocked at a content of 0.12 to 0.15 percent
carbon in steel. Prolonged oxidation of inelts containing aircraft engines
- results in increased melting loss of Cr, excessive temperature rise of the
steel bath and slag and the simultaneous undesirable meltoff of the furnace -
bottom, walls and lid.
Tests designed to postpone oxidation till the final melting phase in order
to make use of the chemical heat of A1 and Si dissolved in the bath were
- unsuccessful. They resulted in high Cr losses (about 3 percent) and high
meltoff of the furnace hearth lining.
~ In view of the high Ni0 and low alloy and low phosphorus scrap content in
the burden which yields melts with a P content lower than 0.035 percent and
after oxidation a carbon content of 0.10 to 0.16 percent, aircraft engines -
are now being remelted exclusively in the production of steel according to
- CSN (Czechoslovak Norm) 17,251 of chemical composition of at most 0.2Q per-
cent C, 1.5 Mn, 2.00 Si, 0.035 P, 0.035 S, 18 to 21 Cr and 8 to 11 percent
- Ni.
Charging and Melting Technology -
Charging is accomplished in two batches which consist of (in kg):
11 -
~ FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
_ ' FOR OFFICTAL USE ONLY
First batch: low P and Ni scrap ~,000
heavy high alloy Cr,Ni scrap 3,000
carbon Fe-Cr 500
_ Second batch: discarded aircraft engine 800
nickel oxide 500
high-alloy Cr-Ni chips 3,800
Total 11,600
Table I. Change in the Content of Elements During Oxidation
T(vb) IZo~b)eg o> (d~ Obenh .
a C~ I C~ I C~~' Cr~ I d(;r I ~[n, I Alrt~ I d\in I F.li I 91~ I de1 I Tli ( AI~'� -
- s leG.~c. priimcr 47 0,?A'? (1,130 13,79 13,28 0,508 0,793 0,502 0.289 0,8RG U,209 0,0,7 0,14�l 1,204
moto� mici. 0,10 0,()0 11,84 11,1? -0,(30 0,69 0,33 0,1�2 U,3�l 0,08 0,04 0,04 0,6:i
rom rozputi
(e) g) max. 0,72 0,19 1b,44 15,47 3,19 2,05 1,03 1,02 1,22 0,47 0,03 0,23 1.0~
bez (f) prum~Sr 33 0,348 0,0~~ (f,,4U* 14,61 1,79 0,691 0,370 0.3~1 Q,3(38 0,0~31 0,277 O,Q4'? -
letcc. min. 0,18 O,Of, 13,34 11,95 0,82 0,45 0,~7 0,20 0,21 0,05 0,11 ~,01 -
motorii rozputi
max. 0,62 0,14 19,85 17,69 3,05 1,32 0,47 0,70 0,08 0,19 0,67 0,14 -
Key:
- a. Melt e. With aircraft engine
b. Value f. Without aircraft engine
c. Number of Melts g. Average, minimum, range,
d. Content (percent) maximum
Comments:
Index 1--content of element in the bath following melting
Index 2--content of element in the bath following oxidation
Delta--difference in the contents of elements in the bath before and after
oxidation
~ *--the high average meltdown chromium content is due to the fact that 22
compared melts out of 33 were o~iginally conducted as reduction remelts, _
but because the required meltdown content of carbon was exceeded, melt- ;
ing had to be conducted by oxidative remelting
**--in reality the aluminum contents will be lower; due to lack of chemical _
homogeneity the upper layers of the bath are richer in aluminum. Alu- ~
- minum determination is not quantitative and is rather difficult and
expensive in this type of steel. For these reasons, aluminum content -
_ was determined only in the case of 14 melts.
12
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
FOR OFFICIAL USE ONLY
After the first batch has melted by 60 to 70 percent, the aircraft engine -
is added and heaped with nickel oxide and alloy chips. The first batch -
must not be completely melted. Following immersion of the aircraft engine =
into a cumpletely melted batFi the aluminum alloys of the aircraft engine
flare up and burn intensely. The meltdown slag is not collected; by chem- _
ical composition and appearance it exhibits reducing properties. It is
- oxidized by oxygen when it reaches the steel bath temperature of 1,630 to .
1,670�C with the oxidation completed at a 0.12 to 0.15 percent carbon con-
tent of the bath. Chromium is not recovered from the slag by reduction
(median Cr203 content in 17 oxidation slag samples is 11.56 percent), the
oxidation slag is skimmed off and oxygen removal precipitation is accom-
plished by 3 kg/t aluminum forged to a pole. New slag forms consisting
of lime and fluor spar. The bath is left to cool and is then alloyed by
low carbon ferrochrome, nickel plate or recycling scrap. Following dis-
solution of the added alloys and homogenization of the bath, the slag is ~
skimmed off and alloying of the melt to the desired composition is com-
pleted on the basis of chemical analysis.
This technology is characterized by decarbonization of an actual C-Mn-Si-
Cr-Ni-A1-Ti melt. The change in the content of individual elements due to
oxidation is indicated in Table I. The same table contains, for comparison,
values found in comparison melts without the addition of aircraft engines.
The comparatively high A1 content in the bath before oxidation influences -
the increase of the meltdown content of Mn, Si and Ti. Heat generation due
to A1, Si and Ti combustion at the start of oxidation raises the tempera-
ture of the steel bath rapidly to 1,850�C and higher. At these tempera-
tures, carbon burns off before chromium which is supported conclusively by -
the melting loss of chromium by 0.508 percent.
The Relationships Established
The basic statistical characteristics were calculated by correlation and
regression analysis on an IBM 370/148 computer programmed for mathematical-
statistical analysis and relationships between selected technological
parameters and chromium loss were established. The most important factors
affecting chromium loss were found to be the carbon content in the steel -
bath following oxidation, the chromium content in the bath following melt-
down., the te~?perature of the melt before oxidation and the melting loss of
Si during oxidation.
The equation of the regression hypersurface from which the Cr melting loss
can be theoretically derived has for a given number of 47 melts (the crit-
ical correlation coefficient value is 0.287) the following form:
Cr = 4.973 - 12.68 C2 + 0.25 Crl - 0.00404 T+ 0.443 0 Si (1)
wher e
- ~ Cr...chromium melting loss during oxidation (percent)
13
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
FOR OFFICIAL USE ONLY
C2.....carbon content in the bath following oxidation (percent)
Crl.,..chromium content in the bath following melting (percent)
_ T......bath temperature before oxidation (�C)
~ Si...silicon melting loss during oxidation (percent)
The calculated coefficient of multiple correlation for the given equation -
is 0.737; therefore, it can be said that the chromium melting loss c~n be
explained by the given equation by almost 55 percent as indicated by the
- graph in Figure 1. Very surprising is the finding that during oxidation
the chromium melting loss increases with increasing silicon melting loss.
Other important findings established include in addition the relationship
between the carbon content and the silicon content in the bath following
oxidation. The regression equation found has the following form:
C2 = 0.106 + 0.118 Si2;r~, = 0.442 (2)
~ Cr~
1,00 . . . � ~
_ 4 ~ � t~. ~ ' -,y{ry:
a'� r~ ?..T: . . .�r;�:,:
0,80
. dsi
0,60
~ 0 40 � rXy = 0, ~3~
~ d = 54 3
~ N = 47 ~aveb
� 0, 20 T .
melts
~ D o0 '
~ .
-q 20 Cs
0,09 0,11 0,93 0,15 0,1~ CI J _
11,0 13,0 15,0 Crf C'.)
150D . 9600 1~00 T(�C J
0,30 0,50 0,'~D 0,90 a Si
Figure 1. Graphic Representation of Chromium Melting Loss According to
Equation (1)
1~+
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
FOR OFFICIAL USE ONLY
where
C2....carbon content in the bath following oxidation (percent)
Si2...silicon content in the bath following oxidation (~,~rcent)
The graphic representation is in Figure 2.
g 1s -
_ ^
~ q~4
_ ~N
_ ~ ~7Z ~ � _ . .
/
~ ~
Oj10 . .
~ g~ R3 gs 4~ -
siZ !/.1~ � .
Figure 2. Graphic Representation of the Dependence of the Carbon Content
in the Bath Following Meltdown According to Equation (2)
The effect of the aluminum content in the bath before oxidation could not
be determined for lack of reliable data, even though it is of overriding -
importance in the technology under study.
The chemical composition of the slag after the melt and oxidation differs
considerably from that of inelts conducted according to standard technology _
as is evident from Table II. -
The comparison of analyses of ineltdown slags resulting from individual
technologies reveals that the content of oxides of elements with lower
affinity to oxygen than a?uminum is several times lower in melts contain-
ing aircraft engines and is replaced by increased content of A1203 which
averages 52.3 percent. The average content of Cr203 is 2.94 percent com-
pared to 12.1 percent in comparative melts. Oxidation slags in melts with
aircraft engines have an Fe0,Mn0 and Cr203 content two to three times
lower than the oxidation slags of the comparison melts and are again re-
placed by A1203 and partly by MgO. In both technologies, the Ca0 contents
are on approximately the same level both after meltdown and oxidation.
Since the addition of lime to the charge is the same in both technologies,
- the conclusion can be reached that the weight of the meltdown and oxida- -
tion slags is the same in both technologies.
15
FOR OFFICIAL USE ONLY
s ~
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
FOR OFFICIAL USE ONLY
A marked difference exists in the alkalinity of the slags which can be
calculated by the simple~equation
Ca0
- V =
Si02
and by the expanded equation
' Ca0 + Mg0
V =
Si02 + A1203
In view of the high A1203 content in slags from melts containing aircraft
_ engines, the more correct calculation of alkalinity is derived from the
expanded equation. Median alkalinity of slags calculated in this way is
0.551 in melts containing air~raft engines and 0.537 following oxidation
which is 2.32 times or 2.33 times lower than in melts not containing air-
craft engines. _
The Economic Gain
The introduction of direct remelting of aircraft engines in the production
- of steel in accordance with CSN 17,251 has resulted in considerable saving
in ferroalloys, power and in increased output. Compared with the original
technology the following savings were achieved:
Reduction in the consumption of FeSiCr 4.41 kg/y
FeSi 10.Y9 kg/t
MnSi 0.56 kg/t
Mn aff 1.06 kg/t
FeCr IV 17.27 kg/t -
FeCr II 25.78 kg/t
power 110.7 kWh/t
- Increased EOP output 0.220 t/h
_ Conclusion
The electric steel department of the TZVRSR has developed a technology of
direct processing of discarded ~et aircraft engines by oxidative remelting -
of high-alloy scrap in st~el production according to CSN 17,251 resulting
in considerable savings of alloying additives, power conswnption and in
increased output. The decarbonization of the C-Mn-Si-Cr-Ni-A1-Ti melt
with an average content of 1.204 percent A1 was tested and introduced in
practice. The technology of producing steel in an alkaline fu.rnace using
highly acidific slag of inedian post-oxidation alkalinity of 0.537 at post-
oxidation steel temperatures of around 2,100�C was mastered.
1.6
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200090001-9
FOR OFFICIAL USE ONLY
Ta~le II. The Chemical Composition of Slag Following Melting and Oxiaation
~b) ~d~ _ (e) Obenh [�a~
A Rtrueka iloilnotn o~ Ou0 Cu0 ~i4s0 !
E ~y Fu0 ~ DirtO I SIO, i A1,0, I Cu0 I\[RO I Cr,O, I T10, I NIO ( tii0, I~i0, f.\I,U,
I
~ po rozta- pri~mur 1,3G 0,9~ 4,11 5'l,3 �_-~,4 Fi,Gl 'L,94 2,U0 ~0,137 5,~J~ 0,651
o veni min. 0,35 0,3~ 1,85 ?9,5 15 1 3 50 U,70 0:i~ 0 012 7:3 0 33
~ rozpgti ' ~ ' ' ' '
o~ ~g~ i) max. 17 2,85 1,48 7,60 64,0 38,9 10.40 4.97 3,50 1,020 lfi,21 1,61
~ po oxidaci priim~r I 2,91 2,28 13,?4 3fi,1 10,18 lfi.32 11.5f, 2,5fi 0,30 0.7Ei8 0,537
m min. 2,19 1,81 9,8 �8,5 7,7 1U,7 3,01 1,10 0,010 O,~Fi 0,?1
(h~ rozpgtf
�D mns. 20 3,69 3,2D 1fi,2 4?,1 ll,b 2~,? 18,9 4,70 0,059 0,9; 0,77
M po roztn- pr~Ymi;r 3,70 4,Ofl '13.3 ~,7 24,0 l~,:i 1?,l l,p3l ~,~~7
o ~�cni miti. 0,8'l 0,4fi 13,4 3,5 13,0 !!,1) 1,0 p~~ p~~l
o rozputt
~ . mnx. �0 6,17 7,b8 34,8 11,~ 42,8 32,~ 25,"_ 2,3 2,31
y -
` po oxiclnci priimi~r i U,7? 4,8'2 ]4,05 3.fi~ 1f1,:i~J i I�.R1 37.:S~1 - 0,7O'l 1,'L�iH
N min. G,28 3,03 8,30 2,12 5,7 7,U ~1,8 0,4 0,70 ~ -
~ rozp8ti ~
max. 20 ~13,01 7,�8 15,80 5,5;i 1~.1 �8,3 45.f, 1,0 1,7~
Key:
a. Melts f. With aircraft engine, without
b. Slag aircraft
c. Value g. Following melting
d. Number of Melts h. Following oxidation
e. Content (percent) i. Average, minimum, range, maximum
COPYRIGHT: SNTL, Prague, Nakladatelstvi technicke literatury n.p., 1980
8664 END
CSO: 2402
17
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200090001-9