Кафедра безпеки інформаційних технологій (БІТ)
Постійний URI для цієї колекції
Перегляд
Перегляд Кафедра безпеки інформаційних технологій (БІТ) за датою видання
Зараз показано 1 - 20 з 426
Результатів на сторінку
Варіанти сортування
Публікація Варіант оптимізації витрат на систему захисту інформації(ХНУРЭ, 2008) Заболотний, В. І.; Петросян, К. С.Organization of restricted access information during the information activity starts from problem definition of information security. There are three variants of problem definition. It is recommended to provide information security by one of variants depending on information owner. One of the variants is based on conscious allowance such level of information security which causes loses of unprotected data not more than all enterprise income.Публікація Универсальное хеширование по кривым Гурвица(ХНУРЭ, 2008) Халимов, Г. З.Presents result research to curves for target universal hashing up to CarterVegman, parameters valuation algebraic curve Hurvitz.Публікація Анализ статистических свойств генератора псевдослучайных чисел на основе многомодульных преобразований(ХНУРЭ, 2008) Гриненко, Т. А.; Макарчук, Я. А.; Стадченко, Э. Ю.The problem of construction of pseudorandom sequences with required properties is considered. Construction algorithm of such pseudorandom sequences is offered and theoretically justified.Публікація Специальные схемы цифровой подписи(ХНУРЭ, 2008) Долгов, В. И.; Неласая, А. В.The given work is devoted to the collective digital signature protocols on elliptical and hyperelliptical curves based on the idea of general use public key worked out by the authors. These curves have a property that the size of the signature do not increase proportionally for the number of signature participant and if we use the hyperelliptical curve of the size of the signature is decreased proportionally for genus of curve yet . It is shown that the result of strength analysis of the proposed protocols to coupled key attack, only reuse key attack, existential falsification and in the presence of more then one signed message attackПублікація О стойкости уменьшенных моделей блочных шифров к линейному криптоанализу(ХНУРЭ, 2008) Долгов, В. И.; Руженцев, В. И.The reduced scale models of modern block ciphers are proposed. The security of these models to linear cryptanalysis are checked with using of various testing methods. The conclusions about using the various methods of testing the security from linear cryptanalysis of modern block ciphers are made.Публікація К вопросу оценки криптографических свойств подстановок случайного типа(ХНУРЭ, 2008) Долгов, В. И.; Лисицкая, И. В.; Сергиенко, Р. В.; Обухов, А. Е.The given work is devoted to comparative evaluation of two Sblock selection methods for symmetric block ciphers. The first one is based on the evaluation resistance component of Boolean functions, and the second one uses the criteria of substitution selection, based on the theory of probabilities (for number of the inversion, the increases and the cycles). It is shown, that the quality of the substitution selection according the theory of probabilities do not concede the quality of choose according instrument of Boolean functions in practice.Публікація Аналіз схем розгортання ключів блокових симетричних шифрів(ХНУРЭ, 2008) Горбенко, І. Д.; Шапочка, Н. В.Key expansion scheme is carried out in this work. Cryptographic analysis methods concerned to key expansion scheme are considered. Projects of block symmetric ciphers are presented and requirements to key expansion schemes are studied. Because of serious deficiency the national algorithm "Kalina" is studied and requirements to its key expansion scheme are proposed.Публікація Подход к криптоанализу блочного симметричного шифра «лабиринт»(ХНУРЭ, 2008) Казимиров, А. В.; Олейников, Р. В.; Небывайлов, А. Б.This work is devoted to the analysis of the symmetric block cipher “Labyrinth” proposed as a candidate to a national standard of Ukraine. We applied first stage of algebraic attack on Sbox, which is used in the encryption algorithm. The main point of the attack is to represent Sbox as a system of equation. Researched Sbox is weak to algebraic attack, that is a vulnerable part of cipher “Labyrinth”.Публікація Сравнительный анализ поточных симметричных шифров проекта eSTREAM(ХНУРЭ, 2008) Нейванов, А. В.; Головашич, С. А.; Горбенко, И. Д.The given work is devoted to the modern developments in the field of stream symmetrical ciphers. We regard the winners of eSTREAM project and conduct a comparative analysis with a goal to selecting perspective algorithm.Публікація Аналіз принципу роботи фотодетектора «лазерного мікрофону»(ХНУРЭ, 2008) Ковальчук, Ю. О.The given work is devoted to research of possibilities of laser systems of acoustic reconnais sance. Research consists in building and the analysis of corresponding quantitative models, for obtaining the results which can be used in process of assessment of the information leakage channel and building the measures of protection.Публікація Метод оценивания информационных рисков на основе математического аппарата нечеткой логики(ХНУРЭ, 2008) Замула, А. А.; Одарченко, А. С.In the given report questions of methods of an estimation of information risks are discussed. Existing techniques and algorithms of an estimation of risks and also an urgency and expediency of an estimation of information risks are considered. The method of estimation risks with use fuzzy logic are in detail consideredПублікація Эквивалентность решения задач Диффи-Хеллмана и дискретного логарифма в мультипликативной группе конечного поля(ХНУРЭ, 2009) Надточий, Д. К.Equivalence of solving the Diffie-Hellman problem and solving discrete logarithm problem is considered.Публікація Биометрическая аутентификация на основе применения гибридной вэйвлет-нейронной сети(ХНУРЭ, 2009) Галушка, И. В.Iris patterns become interesting as an alternative approach to reliable visual recognition persons, and especially when there is a need to search very large databases. Although small (11 mm) and sometimes problematic to image, the iris has the great mathematical advantage that its pattern variability among different persons is enormous. In addition, the iris is well protected from the environment and stable over timeПублікація Виявлення залежності між сеансовими ключами ецп ecnr стандарту ISO/IEC 15946-4(ХНУРЭ, 2009) Шевчук, О. А.In modern schemes of digital signature signing algorithm divided in two steps: generation of pre-signature, and signing message with pre-signature. Main component of pre-signature is session key. Session key must be received absolutely randomly. Discovered situation when certain connection between session keys may be detectedПублікація Застосування геш-хамелеону у протоколах електронного цифрового підпису на основі білінійних відображень у системах на ідентифікаторах(ХНУРЭ, 2009) Погребняк, К. А.; Іщенко, Ю. М.The advantages of deployment of Identity-Based Systems and Hash-Chameleons are considered. The analysis of protocols of signatures with Hashchameleon based on using bilinear maps was made.Публікація Программное средство для проектирования многошаговых преобразователей кодов параллельного типа(ХНУРЭ, 2009) Бочаров, Е. В.In this paper is described the algorithm of work of a program that emulates the work of n-step transformer of codes of both parallel and consecutive typesПублікація Характеристика сертифікатів евростандарту та стандарту сертифіката Х509(ХНУРЭ, 2009) Фоков, В. И.Electronic digital signature can be used by any person as the hand made signature to make electronic document Law powerful . The law power of electronic document signed by Electronic digital signature is the same as the signature on the paper, signed by hand law active person or make a stamp on it.Публікація Розробка заходів захисту від ЛСАР(ХНУРЭ, 2009) Резніченко, С. О.; Ковальчук, Ю. М.The given work is devoted to research of possibilities of laser systems of acoustic reconnaissance. Research consists in building and the analysis of corresponding quantitative models, for obtaining the results which can be used in process of assessment of the information leakage channel and building the measures of protection.Публікація Анализ уязвимостей системы доменных имен в сетях TCP/IP(ХНУРЭ, 2009) Килипко, С. В.This report considers approach to describing the security issues for Domain Name System. Also author describes extensions to DNS that provide data integrity and authentication to security aware resolvers and applications thought the use of cryptographic digital signatures.Публікація Системы цифровой подписи и направленного шифрования на идентификаторах(ХНУРЭ, 2009) Козулин. A. A.This work is devoted applications of bilinear pairings in cryptography and contains basic concepts and ideas of the use of the id-based systems.