JUSTIFICATION OF DIRECTIONS FOR IMPROVING AUTHENTICATION PROTOCOLS IN INFORMATION AND COMMUNICATION SYSTEMS

Alla Havrylova, Y. Khokhlachova, A. Tkachov, Natalia Voropay, V. Khvostenko
{"title":"JUSTIFICATION OF DIRECTIONS FOR IMPROVING AUTHENTICATION PROTOCOLS IN INFORMATION AND COMMUNICATION SYSTEMS","authors":"Alla Havrylova, Y. Khokhlachova, A. Tkachov, Natalia Voropay, V. Khvostenko","doi":"10.18372/2410-7840.25.17593","DOIUrl":null,"url":null,"abstract":"The analysis of information about the conducted cyber-threats makes it possible to identify modern information security problems when transmitted through unprotected communication channels. When conducting such an analysis, various components of the methods of implementing cyber threats are considered, but in this paper, it is proposed to pay attention to the motivational component of the emergence of threats and the existing effective tools for countering them. Such a comprehensive approach will make it possible to predict various modes of cyberattacks that cybercriminals can use against certain systems and to prepare the necessary digital security systems for the implementation of future threats. The influence of the exponential growth of the capacities of computing devices on the growth of the possibilities of implementing attacks by cybercriminals on cryptographic algorithms was also revealed. In this regard, the work considered the possibilities of increasing the level of resistance to such interventions, which are ensured by the NIST requirements for stability and security in the conditions of the post-quantum period. To determine the level of security of data transmission over an insecure network with privacy, integrity and authentication, a comparative analysis of the capabilities of information transmission protocols was conducted. The results of the analysis are presented in the form of a scheme of security and stability of protocols and algorithms that made it to the finals of the NIST competition. To ensure the integrity and authenticity of users when establishing communication sessions with websites, it is recommended to use TLS protocols. A scheme of the process of authenticated encryption and verification of the authenticity of an encrypted message transmitted using a TLS connection has been developed. The process diagram of authentication encryption and decryption of information when establishing a communication session in TLS protocols has been developed. A comparative analysis of different versions of TLS protocols was carried out.","PeriodicalId":378015,"journal":{"name":"Ukrainian Information Security Research Journal","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ukrainian Information Security Research Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18372/2410-7840.25.17593","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The analysis of information about the conducted cyber-threats makes it possible to identify modern information security problems when transmitted through unprotected communication channels. When conducting such an analysis, various components of the methods of implementing cyber threats are considered, but in this paper, it is proposed to pay attention to the motivational component of the emergence of threats and the existing effective tools for countering them. Such a comprehensive approach will make it possible to predict various modes of cyberattacks that cybercriminals can use against certain systems and to prepare the necessary digital security systems for the implementation of future threats. The influence of the exponential growth of the capacities of computing devices on the growth of the possibilities of implementing attacks by cybercriminals on cryptographic algorithms was also revealed. In this regard, the work considered the possibilities of increasing the level of resistance to such interventions, which are ensured by the NIST requirements for stability and security in the conditions of the post-quantum period. To determine the level of security of data transmission over an insecure network with privacy, integrity and authentication, a comparative analysis of the capabilities of information transmission protocols was conducted. The results of the analysis are presented in the form of a scheme of security and stability of protocols and algorithms that made it to the finals of the NIST competition. To ensure the integrity and authenticity of users when establishing communication sessions with websites, it is recommended to use TLS protocols. A scheme of the process of authenticated encryption and verification of the authenticity of an encrypted message transmitted using a TLS connection has been developed. The process diagram of authentication encryption and decryption of information when establishing a communication session in TLS protocols has been developed. A comparative analysis of different versions of TLS protocols was carried out.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
对改进信息和通信系统认证协议的指示进行论证
通过对所进行的网络威胁信息的分析,可以识别通过未受保护的通信渠道传输的现代信息安全问题。在进行这样的分析时,考虑了实施网络威胁的方法的各个组成部分,但在本文中,建议注意威胁出现的动机部分和现有的有效工具。这种全面的方法将使预测网络犯罪分子可能对某些系统使用的各种网络攻击模式成为可能,并为实施未来威胁准备必要的数字安全系统。还揭示了计算设备容量的指数增长对网络犯罪分子对加密算法实施攻击的可能性增长的影响。在这方面,该工作考虑了提高对此类干预的抵抗水平的可能性,这是由NIST在后量子时期条件下对稳定性和安全性的要求所确保的。为了确定在具有隐私性、完整性和认证的不安全网络上传输数据的安全级别,对信息传输协议的能力进行了比较分析。分析结果以协议和算法的安全性和稳定性方案的形式呈现,该方案进入了NIST竞赛的决赛。为了保证用户与网站建立通信会话时的完整性和真实性,建议使用TLS协议。提出了一种验证加密和验证使用TLS连接传输的加密消息真实性的方案。给出了在TLS协议中建立通信会话时对信息进行身份验证、加密和解密的流程图。对不同版本的TLS协议进行了比较分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
DESIGN AND EVALUATION OF AN IOTA-BASED MEDICAL INFORMATION SYSTEM СИСТЕМА ПОКАЗНИКІВ ОЦІНЮВАННЯ КІБЕРСТІЙКОСТІ ІНФОРМАЦІЙНИХ СИСТЕМ ОБ’ЄКТІВ КРИТИЧНОЇ ІНФРАСТРУКТУРИ JUSTIFICATION OF DIRECTIONS FOR IMPROVING AUTHENTICATION PROTOCOLS IN INFORMATION AND COMMUNICATION SYSTEMS ПРАКТИЧНА ОЦІНКА РЕАЛІЗАЦІЇ РОЗПОДІЛЕНОГО КРИПТОАНАЛІЗУ В УМОВАХ ОБМЕЖЕНИХ РЕСУРСІВ ОСОБЛИВОСТІ ВИКОРИСТАННЯ СОЦІАЛЬНИХ МЕРЕЖ ДЛЯ ЗДІЙСНЕННЯ КІБЕРВПЛИВУ
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1