Перегляд за Автор "Tkachov, Andrii"
Зараз показуємо 1 - 4 з 4
Результатів на сторінці
Налаштування сортування
Документ Complex method of determining the location of social network agents in the interests of information operations(Національний технічний університет "Харківський політехнічний інститут", 2024) Herasymov , Serhii; Tkachov, Andrii; Bazarnyi, SergiiThe researcher developed a method for determining the location of social network agents in the interest of conducting an information operation based on a comprehensive approach to data analysis of the information system. The relevance of the method is determined by the need to specify the enemy's target audience in the area of the information operation. Results. The author proposed a complex method for determining the location of social network agents, which is based on the combination of data from the analysis of the social connections of the specified agent, geotags and the time of registration of his friends in the social network, databases of IP addresses and geolocations of social network agents. The advantage of the developed method is the possibility of its application without direct access to the devices of agents of the social network that use the data of global positioning satellite systems. Conclusion. The application of the proposed complex method of determining the location of agents of social networks makes it possible to increase the effectiveness of information operations due to a more accurate definition of the enemy's target audience in the area of operations. The direction of improvement of the developed method can be its integration with complex information systems of psychological influence, as well as the use of machine learning methods and algorithms.Документ Development of procedures for modifying the cipher GOST 28147(Національний технічний університет "Харківський політехнічний інститут", 2021) Yevseiev, S. P.; Korolyov, Roman; Tkachov, Andrii; Nimchenko, AnastasiaThe entry of mankind into the era of high technologies, the rapid growth of computer technology contributes to the expansion of the range of electronic services. To ensure the security of confidential information, personal data, cryptographic systems of traditional cryptography (symmetric cryptosystems) and public key cryptography (asymmetric cryptosystems) are used. As a rule, the former provides security services, the latter provide key distribution. However, in the conditions of totalitarian surveillance in society by the special services of developed countries, cryptographic tabs are embedded in cryptographic algorithms, which, on the one hand, provide “quick” access for special services to confidential information, and on the other hand, allow intruders to break into the cryptosystem and obtain user data. The article proposes a modification of the well-known GOST 28147-89 algorithm, which ensures the "elimination" of possible crypto-bookmarks and an increase in crypto-resistance in the post-quantum period (the emergence of a full-scale quantum computer that allows hacking modern symmetric and asymmetric cryptosystems based on Grover and Shor algorithms). It is proposed to use the procedures for modifying the block-symmetric encryption algorithm (BSEA) GOST 28147-89 (2009, 2015) in OFB mode, which will make it possible to form a pseudo-random sequence based on dynamic changes in the S-box, and provide the required level of security.Документ Justification of directions for improving authentication protocols in information and communication systems(Національний авіаційний університет, 2023) Havrylova, Alla; Khokhlachova, Yuliia; Tkachov, Andrii; Voropay, Natalya; Khvostenko, VladyslavThe analysis of information about the conducted cyber-threats makes it possible to identify modern information security problems when transmitted through unprotected communication channels. When conducting such an analysis, various components of the methods of implementing cyber threats are considered, but in this paper, it is proposed to pay attention to the motivational component of the emergence of threats and the existing effective tools for countering them. Such a comprehensive approach will make it possible to predict various modes of cyberattacks that cybercriminals can use against certain systems and to prepare the necessary digital security systems for the implementation of future threats. The influence of the exponential growth of the capacities of computing devices on the growth of the possibilities of implementing attacks by cybercriminals on cryptographic algorithms was also revealed. In this regard, the work considered the possibilities of increasing the level of resistance to such interventions, which are ensured by the NIST requirements for stability and security in the conditions of the post-quantum period. To determine the level of security of data transmission over an insecure network with privacy, integrity and authentication, a comparative analysis of the capabilities of information transmission protocols was conducted. The results of the analysis are presented in the form of a scheme of security and stability of protocols and algorithms that made it to the finals of the NIST competition. To ensure the integrity and authenticity of users when establishing communication sessions with websites, it is recommended to use TLS protocols. A scheme of the process of authenticated encryption and verification ofthe authenticity of an encrypted message transmitted using a TLS connection has been developed. The process diagram of authentication encryption and decryption of information when establishing a communication session in TLS protocols has been developed. A comparative analysis of different versions of TLS protocols was carried out.Документ Perspective national communication system for cyber management of critical facilities(Peal Press Ltd., Great Britain, 2020) Tomashevsky, Bogdan; Yevseiev, S. P.; Tkachov, AndriiIn a promising confidential communication system, it is proposed to use special communication systems (networks), special dual-purpose systems, as well as systems of open public Internet systems and mobile communication systems. Secrecy of data transmission, cryptographic strength, authentication and authenticity is ensured by the use of a verbatim container, cryptoalgorithms of protection, hash functions, random switching of transmission channels and blockchain transaction technology.