Rudnytska Y. The information technology for modeling symmetric operations of cryptographic encoding for protected information systems of critical infrastructure

Українська версія

Thesis for the degree of Doctor of Philosophy (PhD)

State registration number

0825U000603

Applicant for

Specialization

  • 126 - Інформаційні системи та технології

25-04-2023

Specialized Academic Board

PhD 1061

Cherkasy State Technological University

Essay

The thesis is devoted to increasing the scientific research productivity of the security improving processes in the information systems of critical infrastructure by creating new methods of symmetric cryptographic coding operations' modeling and analysis. In the first section, it is determined that one of the promising directions of information systems and technologies development is their improvement to ensure the possibility of automating the scientific research conduction aimed at increasing the security of information systems of critical infrastructure. An analytical review of protected information systems of critical infrastructure was conducted, which showed the need for its constant improvement. As a result of analysizing the models and methods of information protection in information systems of critical infrastructure it was found that they are generally similar to the information protection methods in information and telecommunication systems, and do not take into account the peculiarities of practical application. The results of the current state of scientific research related to the synthesis and analysis of cryptographic coding operations are presented. The results have shown the possibility of information protection systems adaptation to the features of information representation, which is used in information systems of critical infrastructure objects management. It has been established that symmetric two-operand operations are used in the construction of almost all cryptographic algorithms, but not enough attention was paid to the automating processes of their modeling and research. The aim and objectives of the study are formulated. The second section is devoted to constructing a method for synthesizing the models of symmetric two-operand operations of cryptographic encoding based on tuples of symmetric one-operand operations. For this purpose, the possibility of synthesizing the models of symmetric two-operand operations of cryptographic encoding based on modulo union of symmetric one-operand operations models was investigated. The possibility of synthesizing symmetric two-operand operations of cryptographic encoding based on modulo duplication and modulo union of symmetric one-operand operations models has been studied. The possibility of synthesizing the models of symmetric two-bit two-operand operations of cryptographic encoding based on the tuples of symmetric one-operand operations of information transformation has been investigated. At the research, the qualitative and quantitative characteristics of various approaches to synthyzing symmetric two-operand operations were established. Basing on the obtained results, a method for synthesizing the models of symmetric two-operand operations of cryptographic encoding through the tuples of symmetric one-operand operations was proposed and an algorithm for its implementation was developed. The third section is devoted to developing a method of synthesizing the models' groups of symmetric two-operand operations of cryptographic encoding for block cypher based on a given symmetric two-operand operation. For this purpose, based on the generalization of the known methods of analyzing the results of the groups of symmetric modified operations synthesis, it was proposed a concept of synthesis, which allows combining the methods of synthesizing the groups of symmetric two-bit two-operand operations that were studied. Based on the proposed concept, two new groups of symmetric two-operand operations are synthesized. The constructed groups of operations confirmed the correctness of the proposed concept of modified two-operand operations synthesis. On the basis of the proposed concept of the synthesized groups of symmetric two-operand operations synthesis and analysis, a method of synthesizing models of symmetric two-operand operations of cryptographic encoding was constructed and an algorithm for its implementation has been developed. The fourth section is devoted to the improvement of the methods for building information systems and information technologies of cryptographic encoding operations modeling and research. For this purpose, the implementation features of the method for synthesizing the models of symmetric two-operand operations of cryptographic encoding based on tuples of symmetric one-operand operations for the block cipher systems were investigated. Based on the obtained practical results, a search algorithm of symmetric commutative two-operand operations is proposed. The implementation peculiarities of the method for synthesizing the groups of symmetric two-operand operations of cryptographic encoding on the basis of the selected symmetric commutative operation are studied. Basing on the obtained results, the methods for building information systems and information technologies of cryptographic encoding operations modeling and research have been improved. It has been developed the structure of the information system, which ensures the impl

Research papers

Лада Н. В., Козловська С. Г., Рудницька Ю. В. Дослідження і синтез групи симетричних модифікованих операцій додавання за модулем чотири. Центральноукраїнський науковий вісник. Технічні науки: зб. наук. пр. Кропивницький: КНТУ, 2019. Вип. 2 (33). С. 181–189. DOI: https://doi.org/ 10.32515/2664-262X.2019.2(33).181-189

Лада Н. В., Рудницький С. В., Зажома В. М., Рудницька Ю. В. Дослідження і синтез групи симетричних модифікованих операцій правостороннього додавання за модулем чотири. Системи управління, навігації та зв’язку: зб. наук. пр. Полтава: ПНТУ, 2020. № 1 (59). С. 93–96. DOI: https://doi.org/10.26906/SUNZ.2020.1.093

Прокопенко Т. О., Можаєв М. О., Рудницький С. В., Рудницька Ю. В. Програмування режиму ненавантаженого резервування у комп’ютерних системах критичного застосування. Вісник Черкаського державного технологічного університету. Черкаси: ЧДТУ, 2020. № 4. С. 77–83. DOI: https://doi.org/10.24025/2306-4412.4.2020.221845

Рудницький В. М., Лада Н. В., Рудницька Ю. В., Короткий Т. К. Моделювання симетричних двохоперандних операцій криптографічного кодування на основі об’єднання однооперандних операцій. Сучасна спеціальна техніка. 2021. № 4. С. 32–38.

Lada N., Rudnytska Yu. Implementation of a method for synthesizing groups of symmetric double-operand operations of cryptographic information coding for block encryption systems. Innovative Technologies and Scientific Solutions for Industries / Information Technology. 2022. No. 2 (20). DOI: https://doi.org/10.30837/ ITSSI.2022.20.035

Rudnytskyi V., Babenko V., Lada N., Tarasenko Ya., Rudnytska Yu. Constructing symmetric operations of cryptographic information encoding. Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS II 2021), Oct. 26, 2021. Kyiv, Ukraine: CEUR Workshop Proceedings, 2022. P. 182–194. ISSN 1613-0073 (Scopus)

Prokopenko T., Tarasenko Ya., Lavdanska O., Rudnytskyi S., Rudnytska Yu. Developing the comprehensive technology for alternative management of complex organizational and technological objects in the conditions of cyber threats. Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS II 2021), Oct. 26, 2021. Kyiv, Ukraine: CEUR Workshop Proceedings, 2022. P. 170–181. ISSN 1613-0073 (Scopus)

Лада Н. В., Рудницька Ю. В. Класифікація груп несиметричних двохоперандних операцій криптоперетворення інформації на основі перестановочних схем їх синтезу. Проблеми інформатизації: матеріали Шостої міжнар. наук.-техн. конф.: тези доп., Черкаси – Баку – Бельсько-Бяла – Харків, 14–16 листоп. 2018 р. Черкаси: ЧДТУ; Баку: ВА ЗС АР, Бельсько-Бяла: УТіГН, Харків: НТУ «ХПІ», 2018. С. 11.

Лада Н. В., Бреус Р. В., Рудницька Ю. В., Висоцький С. В. Аналіз групи двохоперандних симетричних операцій криптоперетворення. Проблеми інформатизації: матеріали Сьомої міжнар. наук.-техн. конф.: тези доп., Черкаси – Харків – Баку – Бельсько-Бяла, 13–15 листоп. 2019 р. Черкаси: ЧДТУ; Баку: ВА ЗС АР, Бельсько-Бяла: УТіГН, Харків: НТУ «ХПІ», 2019. Т. 1. С. 85.

Прокопенко Т. О, Рудницька Ю. В. Автоматизація проектування криптопримітивів. Проблеми інформатизації: матеріали Дев’ятої міжнар. наук.-техн. конф.: тези доп., Черкаси – Харків – Баку – Бельсько-Бяла, 16– 18 листоп. 2021 р. Черкаси: ЧДТУ; Баку: ВА ЗС АР, Бельсько-Бяла: УТіГН, Харків: НТУ «ХПІ», 2021. Т. 1. С. 85.

Рудницька Ю. В. Короткий Т. К. Інформаційна технологія моделювання та дослідження симетричних сет-операцій. Проблеми інформатизації : Десята міжнар. наук.-техн. конф.: тези доп. Черкаси – Баку – Бельсько-Бяла – Харків, 24 – 25 листоп. 2022 р. Черкаси: ЧДТУ; Баку: ВА ЗС АР, Бельсько-Бяла: УТіГН, Харків: НТУ «ХПІ», 2022. Т. 1. С. 40.

Рудницька Ю. В. Рудницький С. В. Моделювання симетричних операцій криптографічного кодування. Проблеми інформатизації : Десята міжнар. наук.-техн. конф.: тези доп. Черкаси – Баку – Бельсько-Бяла – Харків, 24 – 25 листоп. 2022 р. Черкаси: ЧДТУ; Баку: ВА ЗС АР, Бельсько-Бяла: УТіГН, Харків: НТУ «ХПІ», 2022. Т. 2. С. 10.

Similar theses