СИСТЕМАТИЗАЦІЯ ОЗНАК НЕСАНКЦІОНОВАНОГО ДОСТУПУ ДО КОРПОРАТИВНОЇ ІНФОРМАЦІЇ НА ОСНОВІ ЗАСТОСУВАННЯ КРИПТОГРАФІЧНИХ МЕТОДІВ ЗАХИСТУ.

Autor: Криворучко, Олена, Костюк, Юлія, Десятко, Альона
Zdroj: Ukrainian Scientific Journal of Information Security; 2024, Vol. 30 Issue 1, p140-149, 10p
Abstrakt: Recently, an increase in incidents of unauthorized access to corporate information has been detected. The article considers an approach aimed at solving the issue of developing a method whose main purpose is to propose a scheme for protecting corporate information from any unauthorized access using a cryptographic algorithm. The reliability of the algorithm is achieved by combining a cryptographic algorithm with a secret key. The implementation of a binary template as a secret key, which is integrated into the process of generating a hash value using the MD5 hashing algorithm, is characterized by a relatively high degree of stability and reliability. The subsequent comparison of the obtained hash value with the stored one is carried out in order to effectively manage access to corporate information. The use of a hidden key in the hashing algorithm means that the data is used as an additional input to a one-way function that hashes the password. Thus, the method of the chosen cryptographic scheme demonstrates effectiveness in ensuring the confidentiality, integrity and availability of corporate information. [ABSTRACT FROM AUTHOR]
Databáze: Complementary Index