Tsyhanenko O. Models and methods of improving the quality of information systems service

Українська версія

Thesis for the degree of Doctor of Philosophy (PhD)

State registration number

0821U102987

Applicant for

Specialization

  • 122 - Комп’ютерні науки

16-12-2021

Specialized Academic Board

ДФ 41.090.007

Odessa State Ecological University

Essay

The dissertation research is devoted to topical issues of development of new and improvement of existing models and methods of ensuring confidentiality and reliability to increase the efficiency of using the TLS protocol in the post-quantum period. The dissertation analyzes the existing approaches to providing basic quality of service (QoS) – reliability and security, identifies the main threats in the context of significant growth of computing resources, the emergence of a full-scale quantum computer, and the possibility of its use by attackers. Integrated mechanisms are proposed, which allow to simultaneously provide requirements for reliability (probability of delivery of information messages / information flows), security (provision of information integrity and confidentiality services) and efficiency based on the use of post-quantum algorithms - crypto-code constructions of Niederreiter (CCC) codes that use the algebraic apparatus of noise-tolerant coding theory and parameters of geometric curves, AGC). Thus, the urgent task is to develop information technology based on crypto-code constructions of Niederreiter, which allow to provide modern requirements for the quality of customer service in the transition to NGN and the post-quantum period. Models of functioning (cryptoscheme) of asymmetric crypto-code constructions of Niederreiter on modified (shortened and extended) elliptical codes are developed in the work, the introduction of which due to the method of formation and decoding of the codegram allows to provide the level of security (secure time – Тs> 200 years, resistance to cryptanalysis RC <1025 group operations) and reliability level (probability of data transfer (Рeror <10-9) of information circulating in information systems and in cyber-attacks to increase the level of service quality and survivability of the systems themselves. The paper proposes a method of ensuring the confidentiality and integrity of information resources, which is based on modified crypto-code constructions of Niederreiter with modified (shortened or extended) elliptical codes, which increases the level of information concealment and probability, reduces 5 times the time to form code order GF (q). Developed models of functioning (cryptoscheme) of hybrid crypto-code constructions of Niederreiter, the introduction of which due to the method of formation and decoding of the codegram allows to increase the level of service quality of information systems and to provide the level of cryptosecurity (Рсrypt<1035 group operations), reliability level (transmission probability (Рerror<10-12) of information circulating in information systems in the post-quantum period. A method of ensuring the confidentiality and integrity of information resources, which is based on hybrid crypto-code constructions of Niederreiter with unprofitable codes, which allows to increase the level of information concealment and reliability, reduce energy costs for their practical implementation by 10 – 12 times (encryption, decryption) by reducing the order GF (q) is proposed. An improved method of assessing the quality of service information systems based on multi-criteria evaluation, which allowed, in contrast to the existing, to highlight ranges of change in the parameters of the criteria of reliability and security to determine them in conditional points. The method of two-factor (strict) authentication based on the use of crypto-code constructions (ССС) of McEliece and Niederreiter, DSA (Digital Signature Algorithm), which allow to provide a security service – authenticity, is proposed. The practical implementation of the proposed methods and models in the form of software applications, which allows their practical use in the protocols TLS, DSA and 2FA is performed. It has been experimentally proven that the use of the proposed crypto-code constructions of Niederreiter on MEC provides a 4.5 time reduction without loss of security compared to the classical scheme of Niederreiter on binary codes, with the use of loss codes by another 7%. The implementation of the results of the dissertation performed in the activities of LLC “Cypher” (Kyiv). The research results are implemented in the educational process of the Department of Cybersecurity and Information Technologies of Simon Kuznets Kharkiv National University of Economics.

Files

Similar theses