Кафедра "Кібербезпека"

Постійне посилання колекціїhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/63626

Офіційний сайт кафедри https://cybersecurity.kpi.kharkov.ua

Кафедра "Кібербезпека" створена 11 січня 2022 року.

Кафедра активно співпрацює у галузі освіти та наукових досліджень із провідними ІТ-компаніями (Distributed Lab, Сайфер, Microcrypt Technologies). Викладачі кафедри та студенти, що навчаються за напрямом кафедри, активно використовують ресурси хмарних обчислень та застосовують технології сучасних мереж і засоби кібербезпеки разом із провідними фахівцями.

Кафедра проводить міжнародну науково-практичну конференцію “Інформаційна безпека та інформаційні технології” в рамках міжнародного науково-практичний форуму "Цифрова реальність", є співорганізатором міжнародного конгресу ”Human-Computer Interaction, Optimization and Robotic Applications” (IEEE, Анкара, Турція).

Кафедра входить до складу Навчально-наукового інституту комп'ютерних наук та інформаційних технологій Національного технічного університету "Харківський політехнічний інститут".

На кафедрі "Кібербезпека" працюють 11 викладачів, з них 3 мають науковий ступінь доктора технічних наук, 5 – науковий ступінь кандидата технічних наук; 3 – звання професора, 8 – звання доцента.

Переглянути

Результати пошуку

Зараз показуємо 1 - 4 з 4
  • Ескіз
    Документ
    The development of the method of multifactor authentication based on hybrid crypto­code constructions on defective codes
    (2017) Yevseiev, S. P.; Kots, Hryhorii; Minukhin, Sergii; Korol, O. G.; Kholodkova, Anna
    The proposed security mechanisms in hybrid-crypto-code systems, based on Niederreiter and McEliece modified asymmetric crypto-code systems on flawed codes allow further use of the methods of strict two-factor authentication on OTP passwords (OTP based 2FA). To ensure the required security and efficiency in the multi-factor authentication protocol, the McEliece and Niederreiter modified asymmetric crypto-code systems, allowing integrated reliability provision in information transmission on the basis of error-correction coding on elliptic codes are used. The use of the MV2 algorithm ensures an increase in the total entropy of the key and the physical separation of the transmission of the authenticator parts by various mobile/Internet communication channels based on multi-channel cryptography systems on flawed codes. The proposed mathematical models and algorithms for the practical implementation of the Niederreiter and McEliece HCCSFC make it possible to significantly reduce the energy capacity of group operations by reducing the power of the Galois field to GF 24–26 by additional transformations based on the MV2 algorithm, ensuring the required cryptographic strength.
  • Ескіз
    Документ
    Construction of hybrid security systems based on the crypto-code structures and flawed codes
    (ПП "Технологічний Центр", 2017) Yevseiev, S. P.; Korol, O. G.; Kots, Hryhorii
    In order to ensure safety of SCCI, it is proposed to use hybrid crypto-code constructions based on the modified asymmetric crypto-code McEliece systems on flawed codes, which make it possible to obtain maximum quantity of emergent properties at minimal resource cost for initiating in the system the synergistic effect of security provision. The main difference from known approaches to the construction of hybrid cryptosystems is the use of MCCS instead of symmetric cryptosystems; to strengthen resistance and to "reduce" the alphabet power (dimensionality of field GF(26–28) to build the McEliece MCCS), the systems on flawed codes are employed. The algorithms proposed in present work for the formation and decryption of a cryptogram in the hybrid cryptosystem based on MCCS on flawed codes make it possible to practically implement HCCSFC. The study that we conducted into energy consumption of major operations in the hybrid cryptosystems and their stability on the basis of the proposed assessment procedure confirms efficiency of their application in order to provide basic requirements to service quality in IES.
  • Ескіз
    Документ
    Developing of multi-factor authentication method based on Niederreiter-McEliece modified crypto-code system
    (ПП "Технологічний Центр", 2016) Yevseiev, S. P.; Kots, Hryhorii; Liekariev, Yehor
    Two-factor authentication methods to date, are considered by experts as authenticators resistance amplification mechanisms, while ensuring the authenticity services in various fields of high technology, financial and insurance sectors of the market, large banking institutions and public sector enterprises. Thus, authenticators based on OTP passwords and various types of tokens are typically used in the ABS. The suggested synergistic threat assessment approach revealed that attackers use a comprehensive approach to the implementation of threats, based on a combination of social engineering techniques with traditional methods, of disguise and infiltration. New types of cyber-attacks are also used to effectively embed malware on mobile communication devices, which in turn leads to a decrease in the profitability of the two-factor authentication methods based on SMS messages and OTP passwords in ABS. The proposed safety mechanisms based on modified crypto code Niederreiter and Mc-Eliece systems allow to ensure reliability (based on the use of elliptical error-correcting codes) and safety (proposed cryptosystem are secret models of provable resistance) of data transmitted. Their usage in the multi-factor authentication protocol ensures the security of the physical separation of transmission of the parts of authenticator of banking transactions through mobile lines (using the Niederreiter MCCS) and ABS (using the McEliece MCCS). The proposed mathematical model and algorithms of practical implementation of the Niederreiter MCCS allow, based on the error vector symbol shortening, to reduce the energy capacity of the group operations, reduce the power of the Galois field to GF 2⁶–2⁷, providing the required cryptographic resistance.
  • Ескіз
    Документ
    Practical implementation of the Niederreiter modified crypto­code system on truncated elliptic codes
    (ПП "Технологічний Центр", 2018) Yevseiev, S. P.; Tsyhanenko, O. S.; Ivanchenko, Serhii; Aleksiyev, Volodymyr; Verheles, Dmytrо; Volkov, Sergey; Korolev, Roman; Kots, Hryhorii; Milov, Oleksandr; Shmatko, O. V.
    On the basis of the practical implementation of the classic Niederreiter scheme for non-binary codes, a pattern has been identified for practical implementation –fixing the admissible position vectors of the plaintext transformation based on equilibrium coding. The obtained set of position vectors of the error vector with a fixed set of masking matrices (the recipient's private key) allows us to obtain the algorithm for decoding the classical Niederreiter crypto-code scheme on non-binary codes. For this, a modification of the crypto-code system (CCS) is necessary. It is proposed to use the additional parameter of key data – the initialization vector (the set of invalid position vectors of the error vector). To counter the Sidelnikov attacks, it is proposed to use modified (shortened) algebraic-geometric (elliptic) codes (MEC). For this, it is necessary to use the second additional initialization vector (the set of positions for shortening the error vector). Based on the modification of the classical Niederreiter scheme on non-binary codes, applied algorithms for generating and decrypting a cryptogram in the Niederreiter modified crypto-code system based on modified (shortened) elliptic codes and software are proposed. To confirm the profitability of the proposed crypto-code system, the results of the comparative evaluation of energy consumption for the implementation of the classical Niederreiter scheme on elliptic codes and the implementation of the proposed system on modified elliptic codes are presented. The results confirm the possibility of practical implementation of the Niederreiter crypto-code system based on the proposed algorithms. At the same time, the required level of cryptographic strength of the crypto-code system, protection of the cryptosystem against the Sidelnikov attacks and an increase in the rate of cryptographic transformations by 3-5 times compared with the classical Niederreiter scheme are guaranteed.