Very important, critical information should be protected while being transmitted at telecommunication systems as the communication channels are accessible to the offender. The cryptographic methods based on the cryptoconnectivity between communication objects, provided by the cryptographic key using which is unknown for the offender are the effective methods of the information protection.
The fact that the offender knows the key excludes encrypted information exchange holding between communication objects. It is especially visible when the information is transmitted encrypted on the general key in the communication net, including a lot of communication objects when the net key is least of all protected. The task becomes complicated when the key action time is limited and it is impossible or inappropriate to give another key as well as heavy expenses. The necessity of the task solving of the net cryptoconnectivity setting at the open communication channels is relevant.
The model of the open net cryptoconnectivity setting is proposed, which has integrated nature defined by the complicated conditions its construction and functioning. That is why the aggregate of the interconnected component-models joined by the one aim of the net key forming, net information transmission, net information interception, net cryptoconnectivity open setting, effectiveness evaluation is designed for the investigating process description.
The analysis of the complex model presented showed that it characterizes the process of the open net key forming in full. It is the further development of the known concept of the eavesdropping Viner channel and it can be used as the theoretical basis for the all-round investigation of the key net coordination process at the open communication channels.