Кафедри
Постійне посилання на розділhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/35393
Переглянути
3 результатів
Результати пошуку
Документ Justification of directions for improving authentication protocols in information and communication systems(Національний авіаційний університет, 2023) Havrylova, Alla; Khokhlachova, Yuliia; Tkachov, Andrii; Voropay, Natalya; Khvostenko, VladyslavThe analysis of information about the conducted cyber-threats makes it possible to identify modern information security problems when transmitted through unprotected communication channels. When conducting such an analysis, various components of the methods of implementing cyber threats are considered, but in this paper, it is proposed to pay attention to the motivational component of the emergence of threats and the existing effective tools for countering them. Such a comprehensive approach will make it possible to predict various modes of cyberattacks that cybercriminals can use against certain systems and to prepare the necessary digital security systems for the implementation of future threats. The influence of the exponential growth of the capacities of computing devices on the growth of the possibilities of implementing attacks by cybercriminals on cryptographic algorithms was also revealed. In this regard, the work considered the possibilities of increasing the level of resistance to such interventions, which are ensured by the NIST requirements for stability and security in the conditions of the post-quantum period. To determine the level of security of data transmission over an insecure network with privacy, integrity and authentication, a comparative analysis of the capabilities of information transmission protocols was conducted. The results of the analysis are presented in the form of a scheme of security and stability of protocols and algorithms that made it to the finals of the NIST competition. To ensure the integrity and authenticity of users when establishing communication sessions with websites, it is recommended to use TLS protocols. A scheme of the process of authenticated encryption and verification ofthe authenticity of an encrypted message transmitted using a TLS connection has been developed. The process diagram of authentication encryption and decryption of information when establishing a communication session in TLS protocols has been developed. A comparative analysis of different versions of TLS protocols was carried out.Документ Методи захисту від сніфінгу у комп’ютерних мережах(Національний технічний університет "Харківський політехнічний інститут", 2017) Ковтун, Р. О.; Черних, Олена ПетрівнаДокумент Conceptual analysis of iris recognition systems(Національний технічний університет "Харківський політехнічний інститут", 2019) Mohammed, Amin Salih; Balaji, B. Saravana; Mawlood, Hiwa AbdulkarimBiometric is a reliable measurable physical feature as passwords. A biometric framework automatically provides evidence of an individual's identity based on the individual's unique features.Iris recognition is one of the physiological ways used to identify a person in the group and is one of the accurate biometric systems. This paper deals briefly about the surveys those done before about Iris recognition system and its benefits anduses in information technology and security fields.The use of low-cost equipment can help to make iris recognition other standards in security contexts, as the requirements for a secure identification are walking. As human Iris gives a phenomenal design for identification. In recent year, the acquisition, rehabilitation, quality assessment, compression of the image, divisions, noise reduction, normalization, removal of features, iris code match, large-size data base searching, applications, evaluation, performance in different conditions, and multi biometrics have been developing irises recognition in several active fields of research. This research gives at the background of iris recognition and literature of methods in various fields.