Abdymanapov, S. A., Muratbekov, M., Altynbek, S., & Barlybayev, A. (2021). Fuzzy expert system of Information security risk assessment on the example of analysis learning management systems. IEEE Access, 9, 156556-156565.
Agibalov, G. P. (2009). Finite automata in cryptography. Prikladnaya Diskretnaya Matematika, 11, 43-73.
Aktayeva, A., Niyazova, R., Muradilova, G., Makatov, Y., & Kusainova, U. (2018). Cognitive computing cybersecurity: social network analysis. In International Conference on Convergent Cognitive Information Technologies (pp. 28-43). Cham: Springer International Publishing.
Development of Reliable and Effective Methods of Cryptographic Protection of Information Based on the Finite Automata Theory
This paper describes project to conduct study of cryptographic protection of information on publications in publications and development of methods for reliable and efficient cryptographic protection of information based on finite automaton models-FAM, preparation of additions to standards and management of dissertations of undergraduates and doctoral students on information security and information protection. To achieve this goal, following tasks will be solved: 1. Study of mathematical foundations of cryptology and analysis of standards for cryptographi. Results: Theory of finite fields, models of FA, descriptions of requirements of standards, proposals to standards. 2. Study of applicability of various FA models in construction of reliable and efficient cryptoalgorithms. Results: Algorithm for obtaining an inverse FA from given FA - proving applicability of FA in cryptosystem, algorithm for composing several FA - proving increase in reliability of cryptosystem using composite FA with increased number of states, algorithm for constructing equivalent FA – proving increase in efficiency of cryptosystems using equivalent FA with reduced number of states. 3.. Development and verification of programs for reliable and efficient cryptosystem based on KA. Results: FA cryptographic programs and their applications in steganography, verification and testing protocols for developed programs.
Abdymanapov, S. A., Muratbekov, M., Altynbek, S., & Barlybayev, A. (2021). Fuzzy expert system of Information security risk assessment on the example of analysis learning management systems. IEEE Access, 9, 156556-156565.
Agibalov, G. P. (2009). Finite automata in cryptography. Prikladnaya Diskretnaya Matematika, 11, 43-73.
Aktayeva, A., Niyazova, R., Muradilova, G., Makatov, Y., & Kusainova, U. (2018). Cognitive computing cybersecurity: social network analysis. In International Conference on Convergent Cognitive Information Technologies (pp. 28-43). Cham: Springer International Publishing.
There are 3 citations in total.
Details
Primary Language
English
Subjects
Environmental and Sustainable Processes
Journal Section
Articles
Authors
Altynbek Sharıpbay
Kazakhstan
Zhanat Saukhanova
L.N. Gumilyov Eurasian National UniversityKazakhstan
Gulmira Shakhmetova
L.N. Gumilyov Eurasian National UniversityKazakhstan
Alibek Barlybayev
L.N. Gumilyov Eurasian National UniversityKazakhstan
Sharıpbay, A., Saukhanova, Z., Shakhmetova, G., Barlybayev, A. (2023). Development of Reliable and Effective Methods of Cryptographic Protection of Information Based on the Finite Automata Theory. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 26, 19-25. https://doi.org/10.55549/epstem.1409285