Кафедри
Постійне посилання на розділhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/35393
Переглянути
2 результатів
Результати пошуку
Документ Rationale for improving authentication protocols in the conditions of postquantum cryptography(Національний авіаційний університет, 2024) Havrylova, Alla; Aksonova, Iryna; Khokhlachova, Yuliia; Milevska, Tetiana; Dunaiev, SergiiThe paper studies the relevance of the issues of encrypting confidential data for their transmission over unsecured channels of information and communication networks. An analysis of encrypted information exchange on the Internet based on the Google service was carried out in terms of the volume of encrypted web traffic. It is concluded that the difference in traffic volumes between countries is due to the popularity of the types of devices used, the geographic access infrastructure, as well as the availability of software that provides modern types of encryptions. The role of the HTTPS protocol in ensuring the security of working with resources on the Internet is substantiated. The NIST security requirements for modern information and communication systems in the post-quantum period are analyzed. It is determined that within a short period of time the power of computing devices increases exponentially, which entails an increase in the implementation of both already known and new attacks on cryptographic algorithms that ensure the strength of security services in networks. Based on the results of this study, the results of a comparative analysis of the complexity of classical and quantum algorithms were demonstrated. The classification of special attacks was considered according to the signs of influence on computing processes, according to access to systems and means, as well as according to the specifics of the attacks themselves. Solutions submitted for participation in the NIST competition for the definition of security standards through electronic digital signature mechanisms, encryption algorithms and key encapsulation are analyzed. The results of the analysis are presented in the form of a scheme of security and stability of the proposed protocols and algorithms. It is recommended to use TLS protocols to ensure the integrity and authenticity of users when establishing communication sessions with websites. A scheme of the process of authenticated encryption and authentication of an encrypted message transmitted over a TLS connection has been developed. A process scheme has been developed for authentication encryption and decryption of information when establishing a communication session in TLS protocols. A comparative analysis of the characteristics of the TLS 1.3 and TLS 1.2 protocols was carried out.Документ Design and evaluation of an IOTA-based medical information system(Національний авіаційний університет, 2023) Shmatko, Oleksandr; Kliuchka, Yaroslav; Korolov, Roman; Khvostenko, Vladyslav; Dunaiev, SergiiThe traditional medical information systems are plagued by issues such as data breaches, lack of privacy, and data integrity concerns. This paper presents the design and evaluation of an IOTA-based medical information system aimed at addressing these challenges. In recent years, blockchain technology has emerged as a powerful tool for securing and managing data in a decentralized manner. One area where this technology has the potential to revolutionize the way we do things is in e-medicine. E-medicine, or electronic medicine, refers to the use of technology to deliver healthcare services remotely. This includes telemedicine, online consultations, and remote monitoring of patients' health status. IOTA blockchain technology, in particular, has a lot of potential in e-medicine. IOTA is a distributed ledger technology that uses a directed acyclic graph (DAG) instead of a traditional blockchain. The main ad-vantage of this approach is that it eliminates the need for miners and makes the system more scalable, fast, and energy-efficient. IOTA is also designed to be feeless, making it an ideal choice for microtransactions. In e-medicine, IOTA can be used in several ways. One potential use case is for secure and decentralized storage of patients' medical records. Medical records are highly sensitive and contain confidential information that needs to be protected from unauthorized access. By using IOTA's tamperproof and immutable ledger, patients can have more control over their medical records and choose who has access to them. This can be especially useful in situations where patients need to share their medical records with multiple healthcare providers or research institutions. By leveraging the unique features of IOTA, such as its feeless microtransactions, scalability, and distributed ledger technology, the proposed system enhances security, privacy, and interoperability in healthcare information