Konferans Bildirisi
BibTex RIS Kaynak Göster
Yıl 2023, Cilt: 26, 19 - 25, 30.12.2023
https://doi.org/10.55549/epstem.1409285

Öz

Kaynakça

  • Abdymanapov, S. A., Muratbekov, M., Altynbek, S., & Barlybayev, A. (2021). Fuzzy expert system of Information security risk assessment on the example of analysis learning management systems. IEEE Access, 9, 156556-156565.
  • Agibalov, G. P. (2009). Finite automata in cryptography. Prikladnaya Diskretnaya Matematika, 11, 43-73.
  • Aktayeva, A., Niyazova, R., Muradilova, G., Makatov, Y., & Kusainova, U. (2018). Cognitive computing cybersecurity: social network analysis. In International Conference on Convergent Cognitive Information Technologies (pp. 28-43). Cham: Springer International Publishing.

Development of Reliable and Effective Methods of Cryptographic Protection of Information Based on the Finite Automata Theory

Yıl 2023, Cilt: 26, 19 - 25, 30.12.2023
https://doi.org/10.55549/epstem.1409285

Öz

This paper describes project to conduct study of cryptographic protection of information on publications in publications and development of methods for reliable and efficient cryptographic protection of information based on finite automaton models-FAM, preparation of additions to standards and management of dissertations of undergraduates and doctoral students on information security and information protection. To achieve this goal, following tasks will be solved: 1. Study of mathematical foundations of cryptology and analysis of standards for cryptographi. Results: Theory of finite fields, models of FA, descriptions of requirements of standards, proposals to standards. 2. Study of applicability of various FA models in construction of reliable and efficient cryptoalgorithms. Results: Algorithm for obtaining an inverse FA from given FA - proving applicability of FA in cryptosystem, algorithm for composing several FA - proving increase in reliability of cryptosystem using composite FA with increased number of states, algorithm for constructing equivalent FA – proving increase in efficiency of cryptosystems using equivalent FA with reduced number of states. 3.. Development and verification of programs for reliable and efficient cryptosystem based on KA. Results: FA cryptographic programs and their applications in steganography, verification and testing protocols for developed programs.

Kaynakça

  • Abdymanapov, S. A., Muratbekov, M., Altynbek, S., & Barlybayev, A. (2021). Fuzzy expert system of Information security risk assessment on the example of analysis learning management systems. IEEE Access, 9, 156556-156565.
  • Agibalov, G. P. (2009). Finite automata in cryptography. Prikladnaya Diskretnaya Matematika, 11, 43-73.
  • Aktayeva, A., Niyazova, R., Muradilova, G., Makatov, Y., & Kusainova, U. (2018). Cognitive computing cybersecurity: social network analysis. In International Conference on Convergent Cognitive Information Technologies (pp. 28-43). Cham: Springer International Publishing.
Toplam 3 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Çevresel ve Sürdürülebilir Süreçler
Bölüm Makaleler
Yazarlar

Altynbek Sharıpbay

Zhanat Saukhanova

Gulmira Shakhmetova

Alibek Barlybayev

Erken Görünüm Tarihi 24 Aralık 2023
Yayımlanma Tarihi 30 Aralık 2023
Yayımlandığı Sayı Yıl 2023Cilt: 26

Kaynak Göster

APA Sharıpbay, A., Saukhanova, Z., Shakhmetova, G., Barlybayev, A. (2023). Development of Reliable and Effective Methods of Cryptographic Protection of Information Based on the Finite Automata Theory. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 26, 19-25. https://doi.org/10.55549/epstem.1409285