首页 > 最新文献

Voprosy kiberbezopasnosti最新文献

英文 中文
Main Problem Directions in the Field of Domestic Element Base of Supercomputers 国产超级计算机元库领域的主要问题方向
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-4-02-12
A. Adamov, D. Fomin, L. Eisymont
{"title":"Main Problem Directions in the Field of Domestic Element Base of Supercomputers","authors":"A. Adamov, D. Fomin, L. Eisymont","doi":"10.21681/2311-3456-2019-4-02-12","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-02-12","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ON MODELS AND METHODS OF PROBABILISTIC ANALYSIS OF INFORMATION SECURITY IN STANDARDIZED PROCESSES OF SYSTEM ENGINEERING 系统工程标准化过程中信息安全的概率分析模型与方法
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-6-71-82
A. Kostogryzov
Purpose: rational and description of the methodological apparatus of system engineering in terms of risk prediction, taking into account the requirements for information protection. Research methods include: methods of probability theory, risk-oriented models for predictive analysis of standardized processes of system engineering. Result: interrelated models and methods systematized for use in the planning and implementation of standardized processes of system engineering are described. Their use makes it possible to analyze the impact of information security in terms of predicted risks. Methods and models are implemented in a set of system engineering standards and analytically support the effective implementation of agreement, organizational project- enabling, technical management and technical processes according to GOST R 57193 (ISO/IEC/IEEE 15288) in relation to systems for various purposes (a total of 30 processes). The proposed models and methods of system analysis of information security in standardized processes of system engineering develop established approaches to risk prediction, ensuring and improving system security. The use of the proposed models and methods in the life cycle of systems helps to identify «bottlenecks», rational ways to reduce risks in the implemented standardized processes, taking into account the requirements for information protection, supports the making decisions in analytical problems of system engineering. Scientific novelty: the proposed methodological apparatus develops the existing approaches to risk prediction, ensuring and improving systems security. The ideas are implemented in the national standards GOST R 59329 – GOST R 59357. They allow enterprises to move to the pragmatic implementation of a risk-based approach using the analytical capabilities of solving inverse problems of effective security control, based on the specified level of acceptable risk.
目的:考虑到信息保护的要求,从风险预测的角度对系统工程的方法设备进行理性和描述。研究方法包括:概率论方法、面向风险的系统工程标准化过程预测分析模型。结果:描述了系统工程标准化过程的规划和实施中使用的相关模型和方法。它们的使用使得根据预测的风险来分析信息安全的影响成为可能。方法和模型在一套系统工程标准中实施,并根据GOST R 57193 (ISO/IEC/IEEE 15288),分析支持协议、组织项目启用、技术管理和技术过程的有效实施,这些过程与各种目的的系统(总共30个过程)有关。提出了系统工程标准化过程中信息安全系统分析的模型和方法,建立了风险预测、保障和提高系统安全性的方法。在系统生命周期中使用所建议的模型和方法有助于识别“瓶颈”,在实施的标准化过程中合理地减少风险,考虑到信息保护的要求,支持在系统工程的分析问题中做出决策。科学新颖性:提出的方法装置发展了现有的风险预测方法,确保和提高系统安全性。这些想法在国家标准GOST R 59329 - GOST R 59357中得到了实施。它们允许企业根据指定的可接受风险级别,使用解决有效安全控制的逆向问题的分析能力,转向基于风险的方法的实用实现。
{"title":"ON MODELS AND METHODS OF PROBABILISTIC ANALYSIS OF INFORMATION SECURITY IN STANDARDIZED PROCESSES OF SYSTEM ENGINEERING","authors":"A. Kostogryzov","doi":"10.21681/2311-3456-2022-6-71-82","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-6-71-82","url":null,"abstract":"Purpose: rational and description of the methodological apparatus of system engineering in terms of risk prediction, taking into account the requirements for information protection. Research methods include: methods of probability theory, risk-oriented models for predictive analysis of standardized processes of system engineering. Result: interrelated models and methods systematized for use in the planning and implementation of standardized processes of system engineering are described. Their use makes it possible to analyze the impact of information security in terms of predicted risks. Methods and models are implemented in a set of system engineering standards and analytically support the effective implementation of agreement, organizational project- enabling, technical management and technical processes according to GOST R 57193 (ISO/IEC/IEEE 15288) in relation to systems for various purposes (a total of 30 processes). The proposed models and methods of system analysis of information security in standardized processes of system engineering develop established approaches to risk prediction, ensuring and improving system security. The use of the proposed models and methods in the life cycle of systems helps to identify «bottlenecks», rational ways to reduce risks in the implemented standardized processes, taking into account the requirements for information protection, supports the making decisions in analytical problems of system engineering. Scientific novelty: the proposed methodological apparatus develops the existing approaches to risk prediction, ensuring and improving systems security. The ideas are implemented in the national standards GOST R 59329 – GOST R 59357. They allow enterprises to move to the pragmatic implementation of a risk-based approach using the analytical capabilities of solving inverse problems of effective security control, based on the specified level of acceptable risk.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of the Symmetric Diagram of the Digital Signature Developed on the Basis of the Algorithm "GOST R 34.12-2015" 基于“GOST R 34.12-2015”算法的数字签名对称图研究
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2018-2-52-58
L. Babenko, A. José
{"title":"Investigation of the Symmetric Diagram of the Digital Signature Developed on the Basis of the Algorithm \"GOST R 34.12-2015\"","authors":"L. Babenko, A. José","doi":"10.21681/2311-3456-2018-2-52-58","DOIUrl":"https://doi.org/10.21681/2311-3456-2018-2-52-58","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131445844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Legal Aspects of Modern Cybersecurity and Cybercrime Counteraction 现代网络安全和打击网络犯罪的法律问题
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-1-58-74
A. Kartskhiya, G. Makarenko
The article analyses contemporary legal aspects and current cybersecurity issues, cybercrime features of Rus- sian and foreign law of information and communication technologies. The research methods consist of comparative legal analysis of contemporary Russian and foreign legislation and law enforcement practice, as well as, a formal and logical study of a conceptual apparatus, content and struc- ture of the research object. The study results enable the authors to formulate the awareness of cybercrime legal content, that includes not only offenses committed by using computer technology, but other information and communication equipment and tools, including software either. The rapid spread of cybercrime, the emergence of new forms of organized crime using the global Internet, intended and well-organized cyber attacks on a critical infrastructure of states and private companies indicate the formation of a special area of crime - cybersecurity crime and information technol- ogy, which goes beyond a common insight of crime of information technology and communications. Therefore, the authors came to certain conclusions to conceptualize theoretical and methodological principles, develop the foundations of law and order of cybersecurity, clarify the conceptual apparatus and specifics of legal regulation of cybersecurity in public and private law, as well as the formation of a new line of criminology of cybercrime. The scientific novelty of the study consists of a conceptual justification of a cybercrime countering, as an ele- ment of national cybersecurity, as well as, the substantiation of a specific line of criminology - cybercriminology.
文章分析了当代法律方面和当前网络安全问题、俄罗斯和外国信息通信技术法的网络犯罪特点。研究方法包括对当代俄罗斯和外国立法和执法实践的比较法律分析,以及对研究对象的概念工具、内容和结构的形式和逻辑研究。研究结果使作者能够制定对网络犯罪法律内容的认识,这不仅包括使用计算机技术犯下的罪行,还包括其他信息和通信设备和工具,包括软件。网络犯罪的迅速蔓延,利用全球互联网的有组织犯罪新形式的出现,对国家和私营公司关键基础设施的有预谋和有组织的网络攻击表明,形成了一个特殊的犯罪领域——网络安全犯罪和信息技术,这超出了对信息技术和通信犯罪的一般认识。在此基础上,笔者对网络安全的理论原则和方法论原则进行了概念化,梳理了网络安全的法律秩序基础,厘清了网络安全的公法和私法法律规制的概念机构和具体内容,形成了网络犯罪的犯罪学新线。该研究的科学新颖性包括对网络犯罪打击作为国家网络安全要素的概念辩护,以及对犯罪学的特定路线-网络犯罪学的证实。
{"title":"Legal Aspects of Modern Cybersecurity and Cybercrime Counteraction","authors":"A. Kartskhiya, G. Makarenko","doi":"10.21681/2311-3456-2023-1-58-74","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-58-74","url":null,"abstract":"The article analyses contemporary legal aspects and current cybersecurity issues, cybercrime features of Rus- sian and foreign law of information and communication technologies. The research methods consist of comparative legal analysis of contemporary Russian and foreign legislation and law enforcement practice, as well as, a formal and logical study of a conceptual apparatus, content and struc- ture of the research object. The study results enable the authors to formulate the awareness of cybercrime legal content, that includes not only offenses committed by using computer technology, but other information and communication equipment and tools, including software either. The rapid spread of cybercrime, the emergence of new forms of organized crime using the global Internet, intended and well-organized cyber attacks on a critical infrastructure of states and private companies indicate the formation of a special area of crime - cybersecurity crime and information technol- ogy, which goes beyond a common insight of crime of information technology and communications. Therefore, the authors came to certain conclusions to conceptualize theoretical and methodological principles, develop the foundations of law and order of cybersecurity, clarify the conceptual apparatus and specifics of legal regulation of cybersecurity in public and private law, as well as the formation of a new line of criminology of cybercrime. The scientific novelty of the study consists of a conceptual justification of a cybercrime countering, as an ele- ment of national cybersecurity, as well as, the substantiation of a specific line of criminology - cybercriminology.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128141152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A METHOD OF PARAMETRIC SYNTHESIS OF CRYPTO-CODE STRUCTURES FOR MONITORING AND RESTORING THE INTEGRITY OF INFORMATION 一种用于监控和恢复信息完整性的密码结构的参数合成方法
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-2-36-51
S. Dichenko, Dmitry Samoilenko, O. Finko, Konstantin Ryumshin
The purpose of the work is to develop a method for monitoring and restoring the integrity of information in secure multidimensional data storage systems that ensures the stability of the systems under consideration under the destructive influences of an intruder and disturbances in the operating environment. Research method: in the course of the research, the scientific and methodological apparatus of the theory of algebraic systems was used in conjunction with the methods of cryptographic information protection and the mathematical apparatus of coding theory to implement the procedures of crypto-code transformations. Models of reliable data storage systems were studied to justify the feasibility of procedures for ensuring the confirmed integrity of the processed information. Results of the study: a method for formalized representation of information in secure multidimensional data storage systems used in the interests of information and analytical systems, which makes it possible to visually describe the developed structures for monitoring and restoring data integrity under the destructive influences of an intruder and disturbances in the operating environment. A mathematical model of the process of monitoring and restoring data integrity based on crypto-code transformations based on the aggregation of cryptographic methods and methods of error-correcting coding is presented. Combining well-known classical solutions to ensure data integrity will reduce the introduced redundancy, as well as expand the functionality of secure information and analytical systems, which consists in confirming the reliability of restoring the integrity of distorted or lost data without additional costs of their repeated control by cryptographic methods. The proposed model takes into account the structure of multidimensional representation of information in the considered data storage systems of information and analytical systems. Scientific novelty: the developed method of parametric synthesis of crypto-code structures for monitoring and restoring the integrity of information in secure multidimensional data storage systems differs from the known ones by obtaining optimal crypto-code structures due to the rational aggregation of cryptographic and code transformations in the parameter space of the considered data storage systems. Crypto-code structures formed on the basis of building multidimensional hash codes and performing transformations in extended Galois fields provide cryptographic control and restoration of information integrity with the possibility of flexible introduction of redundancy and confirmation with cryptographic reliability of information integrity after the restoration procedure
这项工作的目的是开发一种监测和恢复安全多维数据存储系统中信息完整性的方法,以确保所考虑的系统在入侵者的破坏性影响和操作环境中的干扰下的稳定性。研究方法:在研究过程中,结合密码学信息保护的方法和编码理论的数学装置,运用代数系统理论的科学方法装置,实现了密码学转换的过程。研究了可靠数据存储系统的模型,以证明确保已处理信息的确认完整性的程序的可行性。研究结果:一种在信息和分析系统中使用的安全多维数据存储系统中对信息进行形式化表示的方法,可以直观地描述已开发的结构,用于在入侵者和操作环境干扰的破坏性影响下监测和恢复数据完整性。提出了一种基于密码学方法和纠错编码方法聚合的基于密码转换的数据完整性监控和恢复过程的数学模型。结合众所周知的经典解决方案来确保数据完整性将减少引入的冗余,并扩展安全信息和分析系统的功能,这包括确认恢复扭曲或丢失数据的完整性的可靠性,而不需要通过加密方法重复控制它们的额外成本。该模型考虑了信息和分析系统的数据存储系统中信息的多维表示结构。科学新颖性:所开发的用于监控和恢复安全多维数据存储系统中信息完整性的密码结构参数综合方法与已知方法不同,它通过在所考虑的数据存储系统的参数空间中合理地聚集密码和代码转换来获得最佳密码结构。建立多维哈希码并在扩展伽罗瓦域中进行转换的基础上形成的密码学结构提供了信息完整性的密码控制和恢复,并且可以灵活地引入冗余,并在恢复过程后以密码可靠性确认信息完整性
{"title":"A METHOD OF PARAMETRIC SYNTHESIS OF CRYPTO-CODE STRUCTURES FOR MONITORING AND RESTORING THE INTEGRITY OF INFORMATION","authors":"S. Dichenko, Dmitry Samoilenko, O. Finko, Konstantin Ryumshin","doi":"10.21681/2311-3456-2023-2-36-51","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-2-36-51","url":null,"abstract":"The purpose of the work is to develop a method for monitoring and restoring the integrity of information in secure multidimensional data storage systems that ensures the stability of the systems under consideration under the destructive influences of an intruder and disturbances in the operating environment. Research method: in the course of the research, the scientific and methodological apparatus of the theory of algebraic systems was used in conjunction with the methods of cryptographic information protection and the mathematical apparatus of coding theory to implement the procedures of crypto-code transformations. Models of reliable data storage systems were studied to justify the feasibility of procedures for ensuring the confirmed integrity of the processed information. Results of the study: a method for formalized representation of information in secure multidimensional data storage systems used in the interests of information and analytical systems, which makes it possible to visually describe the developed structures for monitoring and restoring data integrity under the destructive influences of an intruder and disturbances in the operating environment. A mathematical model of the process of monitoring and restoring data integrity based on crypto-code transformations based on the aggregation of cryptographic methods and methods of error-correcting coding is presented. Combining well-known classical solutions to ensure data integrity will reduce the introduced redundancy, as well as expand the functionality of secure information and analytical systems, which consists in confirming the reliability of restoring the integrity of distorted or lost data without additional costs of their repeated control by cryptographic methods. The proposed model takes into account the structure of multidimensional representation of information in the considered data storage systems of information and analytical systems. Scientific novelty: the developed method of parametric synthesis of crypto-code structures for monitoring and restoring the integrity of information in secure multidimensional data storage systems differs from the known ones by obtaining optimal crypto-code structures due to the rational aggregation of cryptographic and code transformations in the parameter space of the considered data storage systems. Crypto-code structures formed on the basis of building multidimensional hash codes and performing transformations in extended Galois fields provide cryptographic control and restoration of information integrity with the possibility of flexible introduction of redundancy and confirmation with cryptographic reliability of information integrity after the restoration procedure","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114456767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Algebraic Immunity of Coding Systems 编码系统的代数免疫
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-1-59-68
V. Leontiev, E. Gordeev
{"title":"On the Algebraic Immunity of Coding Systems","authors":"V. Leontiev, E. Gordeev","doi":"10.21681/2311-3456-2019-1-59-68","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-1-59-68","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114859384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A NEW APPROACH TO THE DEVELOPMENT OF MULTIDIMENSIONAL CRYPTOGRAPHY ALGORITHMS 一种开发多维密码算法的新方法
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-2-52-64
D. Moldovyan, N. Moldovyan
Purpose of work is the reduction in the size of the public key of public-key algorithms of multivariate cryptography based on the computational difficulty of solving systems of many power equations with many unknowns. Research method is use of non-linear mappings defined as exponentiation operations in finite extended fields GF(qm) represented in the form of finite algebras. The latter makes it possible to perform the exponentiation operation in the field GF(qm) by calculating the values of power polynomials over the field GF(q), which define a hardly reversible nonlinear mapping of the vector space over GF(q) with a secret trapdoor. Due to the use of nonlinear mappings of this type, it is possible to specify a public key in multidimensional cryptography algorithms in the form of a nonlinear mapping implemented as a calculation of the values of a set of polynomials of the third and sixth degree. At the same time, due to the use of masking linear mappings that do not lead to an increase in the number of terms in polynomials, the size of the public key is reduced in comparison with known analogue algorithms, in which the public key is represented by a set of polynomials of the second and third degrees. The proposed approach potentially expands the areas of practical application of post-quantum algorithms for public encryption and electronic digital signature, related to multidimensional cryptography, by significantly reducing the size of the public key. Results of the study are the main provisions of a new approach to the development of algorithms of multidimensional cryptography are formulated. Hardly invertible nonlinear mappings with a secret trapdoor are proposed in the form of exponentiation operations to the second and third powers in finite extended fields GF(qm), represented in a form of a finite algebra. A rationale is given for specifying a public key in a form that includes a superposition of two non-linear mappings performed as a calculation of a set of second and third degree polynomials defined over GF(q). Techniques for implementing mappings of this type are proposed and specific options for specifying the fields GF(qm) in the form of finite algebras are considered. An estimate of the size of the public key in the algorithms developed within the framework of the new approach is made. at a given security level.. Practical relevance includes the developed main provisions of a new method for constructing multidimensional cryptography algorithms based on the computational difficulty of solving systems of many power equations with many unknowns and related to post-quantum cryptoschemes. The proposed approach expands the areas of practical application of post-quantum algorithms of this type by significantly reducing the size of the public key, which provides the prerequisites for improving performance and reducing technical resources for their implementation
工作的目的是基于求解多未知数多幂方程系统的计算难度,减小多元密码学公钥算法的公钥大小。研究方法是利用有限扩展域GF(qm)中以有限代数形式表示的幂运算来定义非线性映射。后者通过计算场GF(q)上的幂多项式的值,使得在场GF(qm)中执行幂运算成为可能,它定义了GF(q)上具有秘密活门的向量空间的几乎可逆的非线性映射。由于使用这种类型的非线性映射,可以在多维密码学算法中以非线性映射的形式指定公钥,该非线性映射实现为对一组三次和六次多项式的值进行计算。同时,由于使用屏蔽线性映射,不会导致多项式中项数的增加,与已知的模拟算法相比,公钥的大小减小了,其中公钥由一组二阶和三度多项式表示。所提出的方法通过显著减小公钥的大小,潜在地扩展了与多维密码学相关的公共加密和电子数字签名的后量子算法的实际应用领域。研究结果为多维密码学算法的开发提供了一种新的途径。在有限扩展域GF(qm)上,用有限代数的形式给出了具有秘密陷门的难可逆非线性映射的二次和三次幂运算形式。给出了以一种形式指定公钥的基本原理,该形式包括两个非线性映射的叠加,作为在GF(q)上定义的一组二次和三次多项式的计算。提出了实现这种类型映射的技术,并考虑了以有限代数形式指定域GF(qm)的特定选项。对在新方法框架内开发的算法中的公钥大小进行了估计。在给定的安全级别…实际意义包括开发了一种新的方法来构建多维密码算法的主要条款,该方法基于求解具有许多未知数的多功率方程系统的计算难度,并与后量子密码方案相关。所提出的方法通过显著减小公钥的大小,扩展了这种类型的后量子算法的实际应用领域,这为提高性能和减少实现的技术资源提供了先决条件
{"title":"A NEW APPROACH TO THE DEVELOPMENT OF MULTIDIMENSIONAL CRYPTOGRAPHY ALGORITHMS","authors":"D. Moldovyan, N. Moldovyan","doi":"10.21681/2311-3456-2023-2-52-64","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-2-52-64","url":null,"abstract":"Purpose of work is the reduction in the size of the public key of public-key algorithms of multivariate cryptography based on the computational difficulty of solving systems of many power equations with many unknowns. Research method is use of non-linear mappings defined as exponentiation operations in finite extended fields GF(qm) represented in the form of finite algebras. The latter makes it possible to perform the exponentiation operation in the field GF(qm) by calculating the values of power polynomials over the field GF(q), which define a hardly reversible nonlinear mapping of the vector space over GF(q) with a secret trapdoor. Due to the use of nonlinear mappings of this type, it is possible to specify a public key in multidimensional cryptography algorithms in the form of a nonlinear mapping implemented as a calculation of the values of a set of polynomials of the third and sixth degree. At the same time, due to the use of masking linear mappings that do not lead to an increase in the number of terms in polynomials, the size of the public key is reduced in comparison with known analogue algorithms, in which the public key is represented by a set of polynomials of the second and third degrees. The proposed approach potentially expands the areas of practical application of post-quantum algorithms for public encryption and electronic digital signature, related to multidimensional cryptography, by significantly reducing the size of the public key. Results of the study are the main provisions of a new approach to the development of algorithms of multidimensional cryptography are formulated. Hardly invertible nonlinear mappings with a secret trapdoor are proposed in the form of exponentiation operations to the second and third powers in finite extended fields GF(qm), represented in a form of a finite algebra. A rationale is given for specifying a public key in a form that includes a superposition of two non-linear mappings performed as a calculation of a set of second and third degree polynomials defined over GF(q). Techniques for implementing mappings of this type are proposed and specific options for specifying the fields GF(qm) in the form of finite algebras are considered. An estimate of the size of the public key in the algorithms developed within the framework of the new approach is made. at a given security level.. Practical relevance includes the developed main provisions of a new method for constructing multidimensional cryptography algorithms based on the computational difficulty of solving systems of many power equations with many unknowns and related to post-quantum cryptoschemes. The proposed approach expands the areas of practical application of post-quantum algorithms of this type by significantly reducing the size of the public key, which provides the prerequisites for improving performance and reducing technical resources for their implementation","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117252709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study the Possibility of Developing a Universal Tool for Tunneling TCP-traffic the DNS Protocol 研究开发一种通用的tcp流量隧道工具DNS协议的可能性
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-5-34-41
S. Migalin, A. Skuratov, A. Los
{"title":"Study the Possibility of Developing a Universal Tool for Tunneling TCP-traffic the DNS Protocol","authors":"S. Migalin, A. Skuratov, A. Los","doi":"10.21681/2311-3456-2019-5-34-41","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-5-34-41","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Analogy of the Problems of Optimizing the Choice of Information Security Controls with Some Problems of Communication Theory 信息安全控制措施优化选择问题与通信理论若干问题的类比
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-5-30-35
V. Gribunin, A. Timonov
Purpose of the article: optimization of the choice of information security tools in a multi-level automated system, taking into account higher levels, quality indicators of information security tools, as well as the general financial budget. Demonstration of analogies of solving these problems with known problems from communication theory. Research method: optimal choice of information security tools based on risk analysis and the Lagrange multiplier method; Optimal bit budget allocation based on the Waterfilling optimization algorithm. Optimal placement of information security tools in a multilevel automated system based on bisectional search. Obtained result: the article shows analogies between some problems of communication theory and the optimal choice of information security tools. The well-known problem of the optimal choice of information security tools is solved using the rate-distortion theory, the well-known problem of the optimal budget allocation for their purchase is solved by analogy with the problem of distributing the power of transmitters. For the first time, the problem posed for the optimal placement of information security tools in a multilevel automated system was solved by analogy with the problem of distributing the total bit budget between quantizers.
本文的目的:优化多层次自动化系统中信息安全工具的选择,考虑到更高层次的信息安全工具的质量指标,以及一般的财务预算。用交际理论中的已知问题来解决这些问题的类比论证。研究方法:基于风险分析和拉格朗日乘数法的信息安全工具优化选择;基于注水优化算法的最优比特预算分配。基于对分搜索的多级自动化系统中信息安全工具的优化配置。得到的结果是:本文展示了通信理论的一些问题与信息安全工具的最佳选择之间的相似性。利用率失真理论解决了众所周知的信息安全工具的最优选择问题,用发射机功率分配问题类比解决了众所周知的信息安全工具的最优预算分配问题。首次将多级自动化系统中信息安全工具的最佳配置问题类比为在量化器之间分配总比特预算的问题。
{"title":"On the Analogy of the Problems of Optimizing the Choice of Information Security Controls with Some Problems of Communication Theory","authors":"V. Gribunin, A. Timonov","doi":"10.21681/2311-3456-2021-5-30-35","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-30-35","url":null,"abstract":"Purpose of the article: optimization of the choice of information security tools in a multi-level automated system, taking into account higher levels, quality indicators of information security tools, as well as the general financial budget. Demonstration of analogies of solving these problems with known problems from communication theory. Research method: optimal choice of information security tools based on risk analysis and the Lagrange multiplier method; Optimal bit budget allocation based on the Waterfilling optimization algorithm. Optimal placement of information security tools in a multilevel automated system based on bisectional search. Obtained result: the article shows analogies between some problems of communication theory and the optimal choice of information security tools. The well-known problem of the optimal choice of information security tools is solved using the rate-distortion theory, the well-known problem of the optimal budget allocation for their purchase is solved by analogy with the problem of distributing the power of transmitters. For the first time, the problem posed for the optimal placement of information security tools in a multilevel automated system was solved by analogy with the problem of distributing the total bit budget between quantizers.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"374 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124683253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Studying the Impact of Active Network Attacks on a Mobile Robots Group 研究主动网络攻击对移动机器人群的影响
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-1-35-44
E. Basan, A. Basan, O. Makarevich, Lyudmila Babenko
{"title":"Studying the Impact of Active Network Attacks on a Mobile Robots Group","authors":"E. Basan, A. Basan, O. Makarevich, Lyudmila Babenko","doi":"10.21681/2311-3456-2019-1-35-44","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-1-35-44","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121400566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Voprosy kiberbezopasnosti
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1