Leonid Chervyakov, Tagirbek Aslanov, Dmitry Polezhaev, Viktor Lysenko
{"title":"Features of the Security System Development of a Computer Telecommunication Network","authors":"Leonid Chervyakov, Tagirbek Aslanov, Dmitry Polezhaev, Viktor Lysenko","doi":"10.3844/jcssp.2024.986.996","DOIUrl":null,"url":null,"abstract":": Global computer networks have enabled ordinary users, companies, organizations and medical institutions to gain virtually unlimited access to data arrays. Therefore, developing systems capable of ensuring the good performance and secure operation of a standard Computer Telecommunication Network (CTN) has become one of the most pressing tasks demanded in the medical industry. Consequently, this study aims to create an ordered chain of operations that can perform information encryption to enhance data transmission and exchange security. This study examines the existing ordered chains of encryption operations and assesses their strengths and weaknesses. In addition, a framework for implementing cryptographic algorithms is proposed. This algorithm structure enables verification of the existence of the correct key along the specified path, thereby enhancing the overall security of the system. The study results indicate that the optimal variant of encryption is the ordered chains of encoding operations that rely on cryptography. The results of the testing demonstrated that the developed ordered chain of operations exhibited several advantages compared to its analogs, with an efficiency that exceeded that of the analogs by more than fourfold. The implementation of the proposed ordered chain of operations would provide a significantly safer operation of a standard CTN in a typical Medical Institution (MI).","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3844/jcssp.2024.986.996","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
: Global computer networks have enabled ordinary users, companies, organizations and medical institutions to gain virtually unlimited access to data arrays. Therefore, developing systems capable of ensuring the good performance and secure operation of a standard Computer Telecommunication Network (CTN) has become one of the most pressing tasks demanded in the medical industry. Consequently, this study aims to create an ordered chain of operations that can perform information encryption to enhance data transmission and exchange security. This study examines the existing ordered chains of encryption operations and assesses their strengths and weaknesses. In addition, a framework for implementing cryptographic algorithms is proposed. This algorithm structure enables verification of the existence of the correct key along the specified path, thereby enhancing the overall security of the system. The study results indicate that the optimal variant of encryption is the ordered chains of encoding operations that rely on cryptography. The results of the testing demonstrated that the developed ordered chain of operations exhibited several advantages compared to its analogs, with an efficiency that exceeded that of the analogs by more than fourfold. The implementation of the proposed ordered chain of operations would provide a significantly safer operation of a standard CTN in a typical Medical Institution (MI).
期刊介绍:
Journal of Computer Science is aimed to publish research articles on theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems. JCS updated twelve times a year and is a peer reviewed journal covers the latest and most compelling research of the time.