Information Security Methods—Modern Research Directions

In Tomsk University of Control Systems and Radioelectronics (TUSUR) one of the main areas of research is information security. The work is carried out by a scientific group under the guidance of Professor Shelupanov. One of the directions is the development of a comprehensive approach to assessing t...

Full description

Bibliographic Details
Main Authors: Alexander Shelupanov, Oleg Evsyutin, Anton Konev, Evgeniy Kostyuchenko, Dmitry Kruchinin, Dmitry Nikiforov
Format: Article
Language:English
Published: MDPI AG 2019-01-01
Series:Symmetry
Subjects:
Online Access:https://www.mdpi.com/2073-8994/11/2/150
_version_ 1811305541162500096
author Alexander Shelupanov
Oleg Evsyutin
Anton Konev
Evgeniy Kostyuchenko
Dmitry Kruchinin
Dmitry Nikiforov
author_facet Alexander Shelupanov
Oleg Evsyutin
Anton Konev
Evgeniy Kostyuchenko
Dmitry Kruchinin
Dmitry Nikiforov
author_sort Alexander Shelupanov
collection DOAJ
description In Tomsk University of Control Systems and Radioelectronics (TUSUR) one of the main areas of research is information security. The work is carried out by a scientific group under the guidance of Professor Shelupanov. One of the directions is the development of a comprehensive approach to assessing the security of the information systems. This direction includes the construction of an information security threats model and a protection system model, which allow to compile a complete list of threats and methods of protection against them. The main directions of information security tools development are dynamic methods of biometrics, methods for generating prime numbers for data encryption, steganography, methods and means of data protection in Internet of Things (IoT) systems. The article presents the main results of research in the listed areas of information security. The resultant properties in symmetric cryptography are based on the properties of the power of the generating functions. The authors have obtained symmetric principles for the development of primality testing algorithms, as discussed in the Appendix.
first_indexed 2024-04-13T08:27:09Z
format Article
id doaj.art-ca47cc90064d40a8b508bf896e1ec83e
institution Directory Open Access Journal
issn 2073-8994
language English
last_indexed 2024-04-13T08:27:09Z
publishDate 2019-01-01
publisher MDPI AG
record_format Article
series Symmetry
spelling doaj.art-ca47cc90064d40a8b508bf896e1ec83e2022-12-22T02:54:23ZengMDPI AGSymmetry2073-89942019-01-0111215010.3390/sym11020150sym11020150Information Security Methods—Modern Research DirectionsAlexander Shelupanov0Oleg Evsyutin1Anton Konev2Evgeniy Kostyuchenko3Dmitry Kruchinin4Dmitry Nikiforov5Department of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, RussiaDepartment of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, RussiaDepartment of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, RussiaDepartment of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, RussiaDepartment of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, RussiaDepartment of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, RussiaIn Tomsk University of Control Systems and Radioelectronics (TUSUR) one of the main areas of research is information security. The work is carried out by a scientific group under the guidance of Professor Shelupanov. One of the directions is the development of a comprehensive approach to assessing the security of the information systems. This direction includes the construction of an information security threats model and a protection system model, which allow to compile a complete list of threats and methods of protection against them. The main directions of information security tools development are dynamic methods of biometrics, methods for generating prime numbers for data encryption, steganography, methods and means of data protection in Internet of Things (IoT) systems. The article presents the main results of research in the listed areas of information security. The resultant properties in symmetric cryptography are based on the properties of the power of the generating functions. The authors have obtained symmetric principles for the development of primality testing algorithms, as discussed in the Appendix.https://www.mdpi.com/2073-8994/11/2/150symmetrymodel of information security systemthreat modelbiometric authenticationneural networksencryptionprimesdigital object authenticitysteganographyautomated control systemssecure communication channels
spellingShingle Alexander Shelupanov
Oleg Evsyutin
Anton Konev
Evgeniy Kostyuchenko
Dmitry Kruchinin
Dmitry Nikiforov
Information Security Methods—Modern Research Directions
Symmetry
symmetry
model of information security system
threat model
biometric authentication
neural networks
encryption
primes
digital object authenticity
steganography
automated control systems
secure communication channels
title Information Security Methods—Modern Research Directions
title_full Information Security Methods—Modern Research Directions
title_fullStr Information Security Methods—Modern Research Directions
title_full_unstemmed Information Security Methods—Modern Research Directions
title_short Information Security Methods—Modern Research Directions
title_sort information security methods modern research directions
topic symmetry
model of information security system
threat model
biometric authentication
neural networks
encryption
primes
digital object authenticity
steganography
automated control systems
secure communication channels
url https://www.mdpi.com/2073-8994/11/2/150
work_keys_str_mv AT alexandershelupanov informationsecuritymethodsmodernresearchdirections
AT olegevsyutin informationsecuritymethodsmodernresearchdirections
AT antonkonev informationsecuritymethodsmodernresearchdirections
AT evgeniykostyuchenko informationsecuritymethodsmodernresearchdirections
AT dmitrykruchinin informationsecuritymethodsmodernresearchdirections
AT dmitrynikiforov informationsecuritymethodsmodernresearchdirections