ABOUT CRYPTOGRAPHIC METHODS

OF INFORMATION PROTECTION

 

Gulnur Zhangissina, Vice-rector,

Central-Asian University, Kazakhstan, Almaty, gul_zhd@mail.ru,

Saylau Kasabekov, Rector,  Central-Asian University, Kazakhstan, Almaty,

Nazira Munalbaeva,

Central-Asian University, Kazakhstan, Almaty

 

 

D:\ÔÎÒÎ Æàíãèñèíîé\Æàíãèñèíà_ôîòî.JPG

ZHANGISSINA Gulnur D., Doctor of Science (DSc), Professor, Vice-rector

Date and place of birth: 1958, Almaty, Kazakhstan.

Education: Kazakh National University named after Al-Farabi, 1980.

Research interests: information security, computer security, parallel computing, information systems and distance education.

Current position & Functions: Head of the Computer Science Department.

Publications: more than 200 publications, including 4 monographs, over 20 books & 180 papers.

E-mail: gul_zhd@mail.ru

 

 

C:\Ñòàòüè â ÅÍÓ èìåíè Ë.Í.Ãóìèëåâà\a0_130_0.jpg

Degree: Doctor of Philosophy

Scientific direction: Philosophy of Science

Region: Kazakhstan

Citation Index scientific biography: 1 (number of external links)

Rating: 129 (by Views profiles for the last month)

Certificate of participation encyclopedia "Russian scientists"

EDUCATION: 1984 - graduated from high school in the city of Almaty. 1991 - graduated from the philosophical and economic faculty of the Kazakh State University. Kirov. 1996 - defended his thesis on the topic: "The political development of man." 2010 - defended his doctoral thesis on "Socio-philosophical political activity"

2013 – Rector of Central-Asian University

MUNALBAEVA Nazira R., M.Sc. Master degree.

Date and place of birth: 1991, Taldykurgan, Kazakhstan.

Education: KAZAKH STATE WOMEN'S TEACHER TRAINING UNIVERSITy, 2008.

Research interests: information security, computer security, information systems.

E-mail: munalbaeva.nazir@mail.ru

 

 

 

 

Abstract. This article describes the basic cryptographic methods of information security. Objectified an advantage and disadvantages of cryptographic methods: symmetric cryptography key,  public cryptography key, encryption.

 

Key words: cryptography; information security; cryptographic methods; computer networks.

 

 


Cryptography - the science of protecting information from unauthorized reading it. Protection has achieved by encryption, transformation that make protected inputs difficult Rusk undermines the input data without the knowledge of a special key Institute formation - key. Easily understood by the key variable part cryptosystem storing in secret and determines which of the possible transformation of ciphering performed in this case. Cryptosystem - a family selected by a reversible transformation key transformations that convert plaintext into protected cryptograms and back.

It is desirable that the encryption methods had at least two properties:

- Legitimate recipient will be able to convert back and decrypt the message;

- Crypto analyst enemy interception of communications, couldn’t restore it to the original message without such time and resources that will make this work inappropriate.

Cryptographic transformation - the transformation of information, based on some algorithm that depends on the parameter to be changing (usually called the private key), and having the property that it is impossible to restore the original information on the transformed, without the knowledge of the current key with complexity less than a predetermination

The main advantage of cryptographic methods is that they provide a high resistance guaranteed protection, which can be calculated and expressed in a numerical form (the average number of operations and the time needed for disclosing the encrypted information or the key calculation).

The main drawbacks of cryptographic techniques include:

• significant resource costs (time, CPU performance) to perform cryptographic transformations of information;

• difficulty sharing encrypted (signed) information related to key management (generation, distribution, etc.);

• high demands on the safety of secret keys and public key protection against spoofing.

Cryptography was divided into two classes: symmetric key cryptography and public-key cryptography.

Cryptography with symmetric keys

In symmetric key cryptography (classical cryptography) subscribers used the same (common) key (secret element) for both encryption and decryption of data.

It will highlight the following advantages cryptography with symmetric keys:

• relatively high performance algorithms;

• high resistance cryptographic algorithms per unit length of the key.

The disadvantages of symmetric-key cryptography include:

• the needing to use complicated key distribution mechanism;

• technological difficulties ensuring non-repudiation.

Public-key cryptography

To solve the problems of key distribution were used ideas asymmetry change and public distribution of Hellman. The result was a public-key cryptography, which uses more than one secret, and a pair of keys: open (public) and private key (personal, individual) key known only to one side of interacting. Unlike the secret key, which must be kept secret, the public key can be distributed publicly.

Encryption

Implementation circuit connected with a digital signature by calculating the hash function (digest) of the data, which is a unique number obtained from the raw data by compressing (convolution) with a complex but well-known algorithm. A hash function is a unidirectional function, i.e. on its hash value is impossible to recover the original data. A hash function is sensitive to all sorts of corruption. Additionally, very difficult to find two data sets having the same hash value.

Cryptography today - is the most important part of information systems: from email to cellular network access from the Internet to electronic cash. Cryptography ensures accountability, transparency, accuracy and privacy. It prevents fraud attempts in e-commerce and provides a legally binding financial transactions. Cryptography helps to establish your identity, but also provides you with anonymity. Cryptographic methods of information protection against unauthorized access, alteration or deletion of important commercial and personal data stored on your computer. In the world of modern commerce, information is one of the most important elements, and the main part of this important information is stored and processed electronically, so reliable methods of protecting computer information - is the best way to prevent deliberate or accidental leak it. And in the future, as commerce and communications are all closely connected with computer networks, cryptography becomes vital. But participants in the market do not provide cryptographic the level of protection that is promised in the advertisement. Most products are developed and applied not in cooperation with the cryptographers. Engineers were engaged, for which cryptography - just another component of the program. But cryptography - it is not a component. Can not ensure the security of the system, "inserting" cryptography after its development. At every stage, from conception to installation, you must realize that you are doing and why.

In order to properly implement your own cryptosystem is necessary not only to get acquainting with other errors, and understand the reasons for which they have occurred, but perhaps special secure programming techniques and specialized tools. On computer security spend billions of dollars, with much of the money thrown away on worthless products. Two Crypto Pack for e-mail have a similar user interface, but of this ensure the safety and the second allow eavesdropped. Comparison may indicated similarities of the two programs, but one of them security while gaping hole which devoid of another system. Experienced cryptographer can tell the difference between these two systems. The same can be done and the attacker. The date, of Computer security - is a house of cards, which at any moment could fall apart. Too many weak products didn’t of them because they are little used. Once they become widespread, they will become a magnet for criminals. Press immediately give publicity to these attacks, undermining public confidence in these cryptosystems. Writing this work, we can draw the following conclusions:

- Cryptoalgorithms undoubtedly the "heart" of cryptographic systems, but their direct application without any modifications to encode large amounts of data is not actually very acceptable.

- Reasonable choice of a protection system in general should be based on some performance criteria.

- We recommend using some integral indicators, taking into account the characteristics of the system.

But in any case, the selecting set of cryptographic methods will combine as convenience, flexibility and efficiency of use, and protection from intruders circulating in the system information.

Recent advances in the field of cryptography was the development of a cryptographic system, based on the properties of quantum particles. Some of the parameters of quantum particles can not be predicted, and they are used for key generation. Parameters of a quantum particle distorted when you try to copy it, so the fact of listening to the information once it becomes known to the recipient.

In the market of information security software was expected to appear commercial quantum cryptosystems.

As shown, in the presence of systems such as AES or RSA, the weak point in the security of information is often not the cipher strength, and other factors, such as errors in the implementation of the algorithm, security holes in software equipment and human factors.

The effectiveness of modern cryptographic systems and their resistance to decipherment is so high that in some countries the using of powerful algorithms prohibited because it does not decrypt the information even possible for the authorities that can be used for criminal purposes. The restrictions imposed on the possibility of cryptographic systems to resist the business community - in fact anyone who needs numbers that can easily be hacked competitors.

In Kazakhstan, and other countries, there are strict limits on the using of cryptography. Almost all the activities associated with obtaining information requires encryption state license. Availability resistant to breaking cryptographic systems, however, is one of the important factors for the development of e-business.

Hopefully, with time the situation in Kazakhstan will free development and use of strong cryptographic systems that will undoubtedly have a positive impact on the electronic market of the country.

 

References

 

[1] Shangin V.G. Protection of information in computer systems and networks. - DMK-Press, 2012, 592 p.

[2] Domarev V.V. Safety of information technology. The systems approach. / V. Domarev - K.: TID Dia Software Ltd., 2004. - 992 p.

[3] Zegzhda D.P. Fundamentals of Information Systems Security / DP Zegzhda, A.M.Ivashko - Moscow Hotline - Telecom, 2000. 452 p.

[4] Zhangissina G., Kuldeev E., Shauhanova A., Data protection from network attacks.. - Bezpeka ìnformacìì, 2013. – 21 p.