DETERMINATION OF WAYS OF SPOOFING RESISTANCE IMPROVEMENT OF WARNING SYSTEMS OF NGU SECURITY SYSTEMS AT NUCLEAR POWER LANTS
Autor: | O. Yu. Iohov, V. H. Maliuk, I. I. Sydorenko |
---|---|
Rok vydání: | 2019 |
Předmět: |
автентичності повідомлень
алгебраїчні криві хеш-функції універсальне хешування Guard (information security) Theoretical computer science Universal hashing business.industry Computer science Hash function Cryptography Encryption Information protection policy Digital signature Cipher business message authenticity algebraic curves hash functions universal hashing |
Zdroj: | The collection of scientific works of the National Academy of the National Guard of Ukraine; Том 2, № 34 (2019); 58-65 Збірник наукових праць Національної академії Національної гвардії України; Том 2, № 34 (2019); 58-65 |
ISSN: | 2409-7470 |
DOI: | 10.33405/2409-7470/2019/2/34/192048 |
Popis: | Досліджено шляхи підвищення імітостійкості сигналів попередження систем охорони НГУ на об’єктах критичної інфраструктури. Виконано аналіз автентичності повідомлень з конструктивними елементами MAC кодів на основі сімей хеш-функцій. Зроблений висновок, що практичні схеми хешування повинні включати класи хеш-функцій з великим коефіцієнтом стиснення для даних можливо дуже великого об՚єму. Наведені оцінки колізійної стійкості для схем універсального хешування за найкращими алгебраїчними кривими з великим числом точок і максимальними кривими. An important part of the combat activity of units of the National Guard of Ukraine is the physical protection of important state critical infrastructure facilities. The development of modern information technologies leads to the emergence of new threats to the security of such facilities, in particular, the number and power of cyber-attacks motivated by the interests of individual states, organizations and groups of people is growing. This determines the relevance of ensuring the confidentiality and integrity of messages exchanged between units of the National Guard of Ukraine through a warning system with potentially dangerous objects. To solve this problem, imitation-resistant data encoding is used, which makes it possible to check whether the data has been changed by a third party. The likelihood that the data has been changed serves as a measure of the resistance of the cipher.Ensuring the simulated resistance of data transmission systems is possible on the basis of solving an interconnected set of information protection tasks. The quality of solving security problems is largely determined by cryptographic algorithms for encryption, digital signature, hashing and generation of authentication codes used.A study of ways to increase the spoofing resistance of warning signals of the guard systems of the National Guard of Ukraine at critical infrastructure facilities was conducted.An analysis of the authenticity of messages with constructive elements of MAC codes based on hash function families is made. It is concluded that practical hashing schemes should include hash classes with a large compression ratio for data of very large volumes as possible. For these purposes, hash families on the basis of long algebraic geometric codes are of interest.An analysis of the general characteristics of algebraic-geometric codes showed that the best properties in terms of their code distance and computational complexity are the extended Reed-Solomon code, codes on Hermite curves, and codes on Suzuki curves. Collision stability estimates are presented for universal hashing schemes for the best algebraic curves with a large number of points and a maximum curve.The presented theory of universal hashing with Reed-Solomon algebraic-geometrical codes and codes on Hermite curves shows the ability to provide the necessary measure of the probability of collision of hash functions. Since a linear increase in collision probability for Reed-Solomon hashing limits the size of the hashed message, one of the ways to increase the simplicity of data transmission is to use codes on Hermite curves. |
Databáze: | OpenAIRE |
Externí odkaz: |