Halchenko A. Cryptography systems’ tools based on the deniable encryption

Українська версія

Thesis for the degree of Doctor of Philosophy (PhD)

State registration number

0821U102081

Applicant for

Specialization

  • 122 - Комп’ютерні науки

24-06-2021

Specialized Academic Board

ДФ 17.051.035

Zaporizhzhia National University

Essay

The Introduction substantiates the topicality of the thesis, outlines its relationship to scientific and technical research projects. It formulates the research goal and objectives, specifies the object, subject, and methods of research, and highlights the scientific novelty and practical value of the obtained results. It sketches out how the research results were used in practical cases. Further, it summarizes the personal contribution of the applicant, and presents how the approbation and publication of the contributed results were done. Chapter 1 reviews the top issue in the information security industry, which depends on the information technologies development. It determined that a plenty of methods applied to protect the electronic information (hardware, software, etc.). The special software applying is more widespread. Information security software and same tools improvement is one of the most important approaches for information technology and information security, both. It’s also determined that data protection tools have become more widespread in various human activities. They are based on the cryptography and steganography methods. It allows hiding the data and its context, preventing data from uncontrolled access and unauthorized changes, the third party abusing. It admits that the data context is the most valuable for users and offenders. Not only that, but it can be used to illegally enrich, harm the physical and mental condition of users, inflict reputational damages on legal entities, etc. It’s highlighted that classical cryptography and steganography safety is based on the protection scheme's computational stability. Therefore, the specified software development with the progressive protection schemes is an urgent issue nowadays. It’s found the most advanced cybersecurity approaches. In Chapter 2, we developed the new computational scheme. It’s based on the symmetric and public key cryptography combination and used to improve the basic deniable encryption algorithms. This approach has become to the original data size and data processing speed increasing. The suggested model allowed increasing transformations speed and eliminate changes of the original deniable encryption algorithms comparing to the existed solutions. Symmetric cryptography modes have been investigated. As a result, the common encryption modes have been transformed and become specialized for the deniable encryption algorithms applying. However, their analysis appears that the ECB and CBC modes can be applied. These modes provide the data protection immediately. Besides, it’s found that suggested computational model performance depends on the workstations' capacity. Chapter 3 focuses on the second deniable encryption algorithms investigation. It determined that the base model consists of plenty of complex tasks. It reduces the general capacity of the model. But these tasks cannot be calculated with parallel computing mechanisms (the Tunnel-Shanks algorithm, etc.). That’s why the basic computing model has been improved. This approach provides a wrapper for the deniable encryption algorithms, which does not affect the computing model. The parallel computing model low performance is highlighted. However, the basic computing model has been advanced with the data pre-processor applying. This method is based on the “divide and conquer” concept. Chapter 4 establishes that both models' performance depends on the original data length and quantity of data blocks. These variables’ management allows influences the summary model performance. An adaptive data encoding mechanism has been developed for this task. It’s based on the files' compression ratio forecasting, data compression management, LZMA2 and Deflate encoding algorithms applying. In Chapter 5 found that some local computing technologies have been investigated and applied. It allowed to increase the deniable encryption algorithms performance on the end clients. But it’s found that clients had the different capacity, because of hardware restrictions. The distributed encryption model with the static load balancing developed.

Files

Similar theses