Кафедри
Постійне посилання на розділhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/35393
Переглянути
3 результатів
Результати пошуку
Документ SSL/TLS protocol on post-quantum algorithms(Національний авіаційний університет, 2024) Milevskyi, Stanislav; Voropay, Natalya; Korol, Olha; Yevseiev, Serhii; Aksonova, IrynaThe development of mobile technologies and their integration with Internet of Things and smart technologies form both cyber-physical and socio-cyber-physical systems. In such systems, as a rule, wireless communication channels are used, in which SSL/TLS protocols are used to provide security services (confidentiality, integrity and authenticity). However, this protocol is not only vulnerable to "Meeting in the Middle", POODLE, BEAST, CRIME, BREACH attacks, but with the advent of a full-scale quantum computer, it can be broken. The article proposes a protocol based on quantum algorithms – crypto-code constructions, which will ensure not only resistance to current attacks, but also stability in the post-quantum period. To ensure the "hybridity" of services, it is proposed to use McEliece and Niederreiter crypto-code constructions and the improved UMAC algorithm based on McEliece crypto-code design. The use of crypto-code constructions provides not only resistance to attacks, but also simplifies the formation of a connection – the parameters of elliptic curves are used for the transmission of the common key. This approach significantly reduces the time of connecting mobile gadgets and simplifies the procedure of agreement before data transfer.Документ Justification of directions for improving authentication protocols in information and communication systems(Національний авіаційний університет, 2023) Havrylova, Alla; Khokhlachova, Yuliia; Tkachov, Andrii; Voropay, Natalya; Khvostenko, VladyslavThe analysis of information about the conducted cyber-threats makes it possible to identify modern information security problems when transmitted through unprotected communication channels. When conducting such an analysis, various components of the methods of implementing cyber threats are considered, but in this paper, it is proposed to pay attention to the motivational component of the emergence of threats and the existing effective tools for countering them. Such a comprehensive approach will make it possible to predict various modes of cyberattacks that cybercriminals can use against certain systems and to prepare the necessary digital security systems for the implementation of future threats. The influence of the exponential growth of the capacities of computing devices on the growth of the possibilities of implementing attacks by cybercriminals on cryptographic algorithms was also revealed. In this regard, the work considered the possibilities of increasing the level of resistance to such interventions, which are ensured by the NIST requirements for stability and security in the conditions of the post-quantum period. To determine the level of security of data transmission over an insecure network with privacy, integrity and authentication, a comparative analysis of the capabilities of information transmission protocols was conducted. The results of the analysis are presented in the form of a scheme of security and stability of protocols and algorithms that made it to the finals of the NIST competition. To ensure the integrity and authenticity of users when establishing communication sessions with websites, it is recommended to use TLS protocols. A scheme of the process of authenticated encryption and verification ofthe authenticity of an encrypted message transmitted using a TLS connection has been developed. The process diagram of authentication encryption and decryption of information when establishing a communication session in TLS protocols has been developed. A comparative analysis of different versions of TLS protocols was carried out.Документ Development of the double-contour protection concept in socio-cyberphysical systems(Національний технічний університет "Харківський політехнічний інститут", 2022) Pohasii, Serhii; Milevskyi, Stanislav; Tomashevsky, Bohdan; Voropay, NatalyaThe rapid development of mobile Internet technologies LTE (Long-Term Evolution) not only predetermined the further development of cyber-physical systems, which are based on the synthesis of technologies of classical computer systems and LTE technologies, as well as integration with Internet-of-Things technologies. As a result, the emergence of sociocyberphysical systems predetermines further development based on this integration. The creation of mesh- and sensor networks also allows the development of smart technologies and systems based on their conglomeration. The development and creation of a quantum computer, on the one hand, will make it possible to make a technical breakthrough in computing resources, use artificial intelligence, and on the other hand, it can lead to "chaos" in ensuring the security of modern technologies and systems. So, based on the algorithms of Shor and Grover quantum cryptography, symmetric cryptosystems based on traditional cryptography algorithms, as well as asymmetric cryptosystems, including systems based on elliptic curve cryptography, can be broken. The paper proposes to use a new approach to building security systems based on the concept of internal and external security contours. At the same time, security contours of continuous business processes are considered. This approach provides an objective assessment of the current state of security of the socio-cyber system as a whole.