Научный журнал
European Journal of Natural History
ISSN 2073-4972
ИФ РИНЦ = 0,301

METHODS AND MEANS OF INFORMATION SECURITY IN TELECOMMUNICATION SYSTEMS

Mahambaeva I.U. 1 Dautbaeva F.Zh. 1
1 Korkyt Ata Kyzylorda State University
1. Biryukov Alex, Shamir Adi, David Wagner. Real Time Cryptanalysis of A5/1 on a PC. Prepro- ceedings of FSE’7, 2000. – P. 1–18.
2. Kwan M., PieprzykJ.. A General Purpose Technique for Locating Key Scheduling Weaknesses in DES-like Cryptosystems. Advances in Cryptology – ASIACRYPT’91, Springer-Verlag, 1993. – Р. 237–246.
3. Kelsey J., SchneierВ., Wagner D. Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. Advances in Cryptology – CRYPTO’96 Proceedings, Springer Verlag, 1996. – Р. 237–251.

The recent progressive impact of information technology on almost all spheres of human activity causes the progressive growth of the requirements for telecommunications systems and telecommunications devices. This is due to the fact that these systems are so far the primary means of information exchange and the quality of their operation is the determining factor in the effectiveness of most of information technology. The most important component of the quality of functioning of telecommunication systems is the quality of information security. Provision of this component is currently facing a number of problems, the main one being the contradiction between the potential of the existing approaches and constantly increasing requirements for data protection. The potential failure of these approaches to fulfill changing requirements explains the relevance of the search direction of research fundamentally new approaches that allow solving the mentioned problems.

Cryptographic methods of information protection – is a powerful weapon in the struggle for information security.

Cryptography is a set of data conversion methods, aimed at making the data useless to the attacker. Such transformations can solve two major issues relating to information security:

  • Protection of privacy;
  • Integrity protection.

Problems of protection of confidentiality and integrity of information are closely linked, so the methods of solving one of them is often applicable to other solutions.

There are different approaches to the classification of cryptographic information transformation methods. By referring to the initial exposure information, cryptographic information conversion methods can be divided into four groups.

The encryption process is to conduct a reversible mathematical, logical, combinatorial and other transformations of the initial information, as a result of which the encrypted information is a chaotic set of letters, numbers and other characters and binary codes.For the encryption algorithm used information. Typically, the encryption algorithm for a particular method is unchanged. Initial data for the encryption algorithm is the information subject to encryption and encryption key. The key contains control information that determines the choice of conversion at certain steps of the algorithm and the size of the operands used in the implementation of the encryption algorithm. Operand – a constant, variable, function, expression, and other object programming language on which operations are performed. Unlike other methods of cryptographic transformation of information, methods of steganography can hide not only the meaning of stored or transmitted data, but also the fact of storing or transmitting classified information. The basis of all methods of steganography is the masking of sensitive information among open files, i.e. hiding secret data, thus it is realistic figures that are impossible to distinguish from the real thing. Handling multimedia files in information systems has opened almost unlimited opportunities for steganography.

The graphics and audio information presented in numerical form. Thus, the graphic objects in the smallest picture element can be encoded in one byte. The lower level of certain bytes of the image according to the algorithm cryptographic transformation placed bits hidden file. If you choose the right algorithm for image transformation and against which is placed a hidden file, the human eye is almost impossible to distinguish from the original image is obtained. With steganography, tools may be masked by the text, image, voice, digital signature, the encrypted message.

mah1.wmf

Classification of cryptographic information transformation methods

Hidden file can also be encrypted. If someone accidentally discovers a hidden file, the encrypted information is perceived as a failure of the system. Integrated use of steganography and encryption greatly increases the complexity of solving the problem of detection and disclosure of confidential information.

The content of the process of encoding information is the replacement of the original meaning of the message (words, sentences) codes. The codes can be used as a combination of letters, numbers, punctuation, special tables or dictionaries are used when encoding and reverse transformation. The information networks encoding of the original message (or signal) software and hardware used to improve the reliability of the transmitted information.

Often, encoding and encryption mistaken for the same thing, forgetting that to recover the encoded message, enough to know the replacement rule, while to decrypt the message encryption in addition to knowledge of the rules, it requires a key to the cipher.

Data compression can be attributed to the methods of cryptographic transformation of information with certain reservations. The aim of compression is to reduce the amount of information. At the same time, the compressed data cannot be read or used without inversion. Given the availability of means of compression and inversion, these methods can not be considered as a reliable means of cryptographic information transformation. Even if kept secret algorithms, they can be relatively easily opened by statistical processing methods. Therefore, the compressed files of confidential information are subject to subsequent encryption. To reduce the data transmission time is expedient to combine the compression and encryption process information.


The work is submitted to the International Scientific Conference “Modern high technologies”, Israel (tel Aviv), 20–27 Feb 2017, came to the editorial office оn 05.04.2017.


Библиографическая ссылка

Mahambaeva I.U., Dautbaeva F.Zh. METHODS AND MEANS OF INFORMATION SECURITY IN TELECOMMUNICATION SYSTEMS // European Journal of Natural History. – 2017. – № 4. – С. 83-84;
URL: https://world-science.ru/ru/article/view?id=33789 (дата обращения: 22.11.2024).

Предлагаем вашему вниманию журналы, издающиеся в издательстве «Академия Естествознания»
(Высокий импакт-фактор РИНЦ, тематика журналов охватывает все научные направления)

«Фундаментальные исследования» список ВАК ИФ РИНЦ = 1,674