SECURITY CRYPTOGRAPHIC PROTECTION OF SOVEREIGN INFORMATION RESOURCES

  • T. Katkova
Keywords: complex information protection, cryptographic methods of information protection, legal basis for cryptographic information security, cryptographic information security software

Abstract

The development of new information technologies and the introduction of computer systems in all spheres of human activity have led to a sharp increase in the interest of a wide range of users in the problem of information security. Information protection is a set of methods and tools that ensure the integrity, confidentiality and accessibility of information when it is affected by threats of a natural or artificial nature, the implementation of which may harm the owners and users of information. Cryptography plays a leading role in ensuring information security in information and telecommunication systems, one of the main tasks is: ensuring the confidentiality, integrity and authenticity of transmitted data. Cryptography - the science of mathematical methods to ensure the confidentiality (inability to read information by others) and authenticity (integrity and authenticity of the author) of information. Today, cryptography, as a field of knowledge, and cryptographic protection of information, as a separate field of activity, concerns: issues of encryption, the latest e-commerce technologies, automated management systems, reporting and control, and so on. The formation of high-performance encryption methods (decryption) with high cryptographic stability is an important component in addressing information security. Methods of cryptographic protection of information are information encryption systems, algorithms for protection against imposition of false information (MAC codes and electronic digital signature algorithms) and cryptographic protocols for key distribution, authentication and confirmation of receipt (transmission) of information. Cryptographic stability of cryptographic information protection methods is a property of cryptographic algorithms and cryptographic protocols, which characterizes their ability to resist decryption methods (the process of unauthorized restoration of the original message text). Modern cryptography is characterized by the use of open encryption algorithms that involve the use of computing tools. To date, there are more than a dozen proven encryption methods that, when using a key of sufficient length and the correct implementation of the algorithm, make encrypted text inaccessible to cryptanalysis (the science of "breaking" cryptographic transformations).

In the process of work we have considered cryptographic methods and means of information protection, which are one of the elements of a comprehensive information security system. The types of encryption, as well as the essence of electronic signatures are highlighted. The legal bases of application of cryptographic methods of information protection are given.

Published
2022-08-12