Conference Paper
BibTex RIS Cite
Year 2023, Volume: 26, 19 - 25, 30.12.2023
https://doi.org/10.55549/epstem.1409285

Abstract

References

  • Abdymanapov, S. A., Muratbekov, M., Altynbek, S., & Barlybayev, A. (2021). Fuzzy expert system of Information security risk assessment on the example of analysis learning management systems. IEEE Access, 9, 156556-156565.
  • Agibalov, G. P. (2009). Finite automata in cryptography. Prikladnaya Diskretnaya Matematika, 11, 43-73.
  • Aktayeva, A., Niyazova, R., Muradilova, G., Makatov, Y., & Kusainova, U. (2018). Cognitive computing cybersecurity: social network analysis. In International Conference on Convergent Cognitive Information Technologies (pp. 28-43). Cham: Springer International Publishing.

Development of Reliable and Effective Methods of Cryptographic Protection of Information Based on the Finite Automata Theory

Year 2023, Volume: 26, 19 - 25, 30.12.2023
https://doi.org/10.55549/epstem.1409285

Abstract

This paper describes project to conduct study of cryptographic protection of information on publications in publications and development of methods for reliable and efficient cryptographic protection of information based on finite automaton models-FAM, preparation of additions to standards and management of dissertations of undergraduates and doctoral students on information security and information protection. To achieve this goal, following tasks will be solved: 1. Study of mathematical foundations of cryptology and analysis of standards for cryptographi. Results: Theory of finite fields, models of FA, descriptions of requirements of standards, proposals to standards. 2. Study of applicability of various FA models in construction of reliable and efficient cryptoalgorithms. Results: Algorithm for obtaining an inverse FA from given FA - proving applicability of FA in cryptosystem, algorithm for composing several FA - proving increase in reliability of cryptosystem using composite FA with increased number of states, algorithm for constructing equivalent FA – proving increase in efficiency of cryptosystems using equivalent FA with reduced number of states. 3.. Development and verification of programs for reliable and efficient cryptosystem based on KA. Results: FA cryptographic programs and their applications in steganography, verification and testing protocols for developed programs.

References

  • Abdymanapov, S. A., Muratbekov, M., Altynbek, S., & Barlybayev, A. (2021). Fuzzy expert system of Information security risk assessment on the example of analysis learning management systems. IEEE Access, 9, 156556-156565.
  • Agibalov, G. P. (2009). Finite automata in cryptography. Prikladnaya Diskretnaya Matematika, 11, 43-73.
  • Aktayeva, A., Niyazova, R., Muradilova, G., Makatov, Y., & Kusainova, U. (2018). Cognitive computing cybersecurity: social network analysis. In International Conference on Convergent Cognitive Information Technologies (pp. 28-43). Cham: Springer International Publishing.
There are 3 citations in total.

Details

Primary Language English
Subjects Environmental and Sustainable Processes
Journal Section Articles
Authors

Altynbek Sharıpbay

Zhanat Saukhanova

Gulmira Shakhmetova

Alibek Barlybayev

Early Pub Date December 24, 2023
Publication Date December 30, 2023
Published in Issue Year 2023Volume: 26

Cite

APA Sharıpbay, A., Saukhanova, Z., Shakhmetova, G., Barlybayev, A. (2023). Development of Reliable and Effective Methods of Cryptographic Protection of Information Based on the Finite Automata Theory. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 26, 19-25. https://doi.org/10.55549/epstem.1409285