Кафедри
Постійне посилання на розділhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/35393
Переглянути
2 результатів
Результати пошуку
Документ Development of Niederreiter hybrid crypto-code structure on flawed codes(PC Technology center, 2019) Yevseiev, S. P.; Tsyhanenko, O. S.; Gavrilova, A.; Guzhva, V.; Milov, O.; Moskalenko, V.; Opirskyy, I.; Roma, O.; Tomashevsky, B.; Shmatko, O.The use of the Niederreiter modified crypto-code structure (MCCS) with additional initialization vectors (with many invalid positional vectors of the error vector and multiple positions of shortening the error vector) requires an increase in the speed of cryptographic transformation of the system as a whole. For this purpose, it is proposed to use flawed codes. Flawed codes allow you to increase the speed of code transformations by reducing the power of the field while damaging the plaintext and reducing the amount of data transferred by damaging the ciphertext. This approach allows the construction of hybrid crypto-code structures based on the synthesis of Niederreiter modified crypto-code structures on modified (shortened or extended) codes on elliptic curves with damaging procedures. A significant difference from classical hybrid (complex) cryptosystems is the use of asymmetric cryptosystems to ensure data security with fast crypto-transformation procedures (generation and decoding of a codogram). The paper discusses methods for constructing flawed codes and approaches for using the Niederreiter hybrid crypto-code structure on modified elliptic codes. Practical algorithms are proposed for using the MV2 damage mechanism in the Niederreiter crypto-code structure on modified elliptic codes, which makes it possible to implement a hybrid crypto-code structure. The results of a comparative assessment of energy consumption for the formation of an information package with various methods of damage, which determined the choice of damage method in practical algorithms. The conducted studies confirm the competitive efficiency of the proposed cryptosystem in Internet technologies and mobile networks, ensuring practical implementation on modern platforms and the necessary cryptographic strength under post-quantum cryptography.Документ Adaptive decision support systems for cyber security(Національний технічний університет "Харківський політехнічний інститут", 2019) Milov, O.The subject of the researchis the principles and models of adaptive decision support systems in cyber security. The purposeis to develop basic principles and models underlying the operation of adaptive decision support sys tems in the field of cybersecurity. The methods of researchare methods of system analysis, control theory, decision theory, and artificial intelligence. The result of the study. The basic principles and models are proposed, the consideration and use of which in decision support systems will allow the formation of adaptive properties of the described systems. It is shown that the properties of adaptability can be formulated as a learning task. Presents optimization algorithms that underlie learning processes. Conclusion. The combined use of mathematical modeling methods, the theory of adaptation and artificial intelligence methods (training, pattern recognition and problem solving planning) with the corresponding creation of ontologies of cybersecurity systems that ensure the filling of databases, models and knowledge will allow you to implement an effective adaptive decision support system that will be useful a tool for managers at any level at all stages of decision making and implementation. The presented approaches can be used as a basis for building and operating decision support systems, increasing the area of application of such systems due to the formation of their adaptability properties.