METHOD OF EVALUATION OF FUNCTIONAL SECURITY OF INFORMATION TECHNOLOGIES FOR CREATION OF WARRANTY AUTOMATED SYSTEMS
DOI:
https://doi.org/10.28925/2663-4023.2020.7.153164Keywords:
guarantee capacity, reliability, functional safety, integrity, confidentiality. functional security of cryptographic subsystem, cryptographic attack, stability of cryptographic transformation, Reed-Muller codeAbstract
The components of ensuring the warranty of automated systems, which are subject to increased requirements in connection with their use in many sensitive areas of public activity, including national security and defense, critical industrial technologies, energy and communications, banking, environmental protection , technologies of legitimate distance learning, etc. Certain components can significantly affect the quality and reliability of information services in regulatory conditions. In particular, the special role of the functional security of the cryptographic subsystem in terms of supporting the performance of the automated system for its tasks and functions in general, as well as in terms of ensuring the confidentiality and integrity of information. The components of the cryptographic subsystem have been identified, the poor or incorrect operation of which negatively affects the security of these subsystems. The types of the most dangerous attacks on these subsystems are analyzed, their classification from the point of view of possibility of realization in modern scientific and technical conditions and depending on capacity of available computing means and technologies on the basis of which the most real and dangerous variant of realization of remote attacks on software implementation of cryptographic subsystem is defined. .
Based on the analysis, a method for evaluating the quality of cryptographic transformations based on a modified algorithm for solving the problem of finding solutions of systems of linear equations with distorted right-hand parts using the so-called decoding based on "lists" of first-order "shortened" Reed-Muller codes is proved. the correctness of the proposed algorithm.
Downloads
References
V.S. Kharchenko, "Guarantee and guarantee systems: elements of methodology", Radio-electronic and computer systems, № 5, p. 7-19, 2006.
Babash AV, Shankin GP Cryptography. Edited by VP Sherstyuka, EA Primenko, - M .: SOLON-R, 2002. - 512p.
G.N. Gulak, “Modeling at the stage of assessing the security of confidential information encoders”, Scientific and practical journal “Modern special equipment”, № 1 (24), p. 73-81, 2011.
G.M. Gulak, "Characteristics of dangerous failures of means that implement steganographic methods of information transformation", Scientific and Technical Journal "Information Protection", № 1 (42), p. 56-59, 2009.
Gulak G., Kovalchuk L., "Different approaches to the definition of random sequences", Scientific and technical collection "Legal, regulatory and metrological support of information security in Ukraine", № 3, - K., -2001, - p. .127-133.
Gulak GM, Mukhachev VA, Khoroshko VO, Yaremchuk YE Fundamentals of cryptographic information protection: a textbook. V .: VNTU, 2011. 198p.
A.G. Conheim Fundamentals of Cryptography. Per. with English - M: Radio and communication, 1987. - 412p.
E.L. Bauer's incomprehensible knowledge. Methods and maxims of cryptology. Two extensions. Springer. 1991. 472p.
Elias P., “List decoding for noisy channels”, Proceedings of WESCON Conv. Rec., 1957. ó P. 94ó 104.
Wozenkraft J.M., “List decoding,” Quart. Progr. Rep., Res. Lab. Electron. - MIT. Cambridge, 1958. Vol. 48.
Guruswami V., Hastad J., Sudan M., Zuckerman D., “Combinatorial bounds for list decoding”, IEEE Trans. on Inform. Theory. - 2002. - Vol. IT-48 (5). - P. 1021 - 1034.
Ekdahl P., Johansson T., “Another attack on A5 / 1”, IEEE Trans. on Inform. Theory. - 2003. - Vol. IT-49 (1). - P. 284 - 289.
Logachev OA, Salnikov AA, Yashchenko VV Boolean functions in coding theory and cryptology. - М .: МЦНМО, 2004. - 470 с.
Dumer II, Kabatyansky GA, Tavernier S., "List decoding of first-order Reed-Muller binary codes", Problems of information transfer. - 2007. - V. 43. № 3. - p. 66 - 74.