Information Security Methods—Modern Research Directions
In Tomsk University of Control Systems and Radioelectronics (TUSUR) one of the main areas of research is information security. The work is carried out by a scientific group under the guidance of Professor Shelupanov. One of the directions is the development of a comprehensive approach to assessing t...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-01-01
|
Series: | Symmetry |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-8994/11/2/150 |
_version_ | 1811305541162500096 |
---|---|
author | Alexander Shelupanov Oleg Evsyutin Anton Konev Evgeniy Kostyuchenko Dmitry Kruchinin Dmitry Nikiforov |
author_facet | Alexander Shelupanov Oleg Evsyutin Anton Konev Evgeniy Kostyuchenko Dmitry Kruchinin Dmitry Nikiforov |
author_sort | Alexander Shelupanov |
collection | DOAJ |
description | In Tomsk University of Control Systems and Radioelectronics (TUSUR) one of the main areas of research is information security. The work is carried out by a scientific group under the guidance of Professor Shelupanov. One of the directions is the development of a comprehensive approach to assessing the security of the information systems. This direction includes the construction of an information security threats model and a protection system model, which allow to compile a complete list of threats and methods of protection against them. The main directions of information security tools development are dynamic methods of biometrics, methods for generating prime numbers for data encryption, steganography, methods and means of data protection in Internet of Things (IoT) systems. The article presents the main results of research in the listed areas of information security. The resultant properties in symmetric cryptography are based on the properties of the power of the generating functions. The authors have obtained symmetric principles for the development of primality testing algorithms, as discussed in the Appendix. |
first_indexed | 2024-04-13T08:27:09Z |
format | Article |
id | doaj.art-ca47cc90064d40a8b508bf896e1ec83e |
institution | Directory Open Access Journal |
issn | 2073-8994 |
language | English |
last_indexed | 2024-04-13T08:27:09Z |
publishDate | 2019-01-01 |
publisher | MDPI AG |
record_format | Article |
series | Symmetry |
spelling | doaj.art-ca47cc90064d40a8b508bf896e1ec83e2022-12-22T02:54:23ZengMDPI AGSymmetry2073-89942019-01-0111215010.3390/sym11020150sym11020150Information Security Methods—Modern Research DirectionsAlexander Shelupanov0Oleg Evsyutin1Anton Konev2Evgeniy Kostyuchenko3Dmitry Kruchinin4Dmitry Nikiforov5Department of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, RussiaDepartment of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, RussiaDepartment of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, RussiaDepartment of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, RussiaDepartment of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, RussiaDepartment of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, RussiaIn Tomsk University of Control Systems and Radioelectronics (TUSUR) one of the main areas of research is information security. The work is carried out by a scientific group under the guidance of Professor Shelupanov. One of the directions is the development of a comprehensive approach to assessing the security of the information systems. This direction includes the construction of an information security threats model and a protection system model, which allow to compile a complete list of threats and methods of protection against them. The main directions of information security tools development are dynamic methods of biometrics, methods for generating prime numbers for data encryption, steganography, methods and means of data protection in Internet of Things (IoT) systems. The article presents the main results of research in the listed areas of information security. The resultant properties in symmetric cryptography are based on the properties of the power of the generating functions. The authors have obtained symmetric principles for the development of primality testing algorithms, as discussed in the Appendix.https://www.mdpi.com/2073-8994/11/2/150symmetrymodel of information security systemthreat modelbiometric authenticationneural networksencryptionprimesdigital object authenticitysteganographyautomated control systemssecure communication channels |
spellingShingle | Alexander Shelupanov Oleg Evsyutin Anton Konev Evgeniy Kostyuchenko Dmitry Kruchinin Dmitry Nikiforov Information Security Methods—Modern Research Directions Symmetry symmetry model of information security system threat model biometric authentication neural networks encryption primes digital object authenticity steganography automated control systems secure communication channels |
title | Information Security Methods—Modern Research Directions |
title_full | Information Security Methods—Modern Research Directions |
title_fullStr | Information Security Methods—Modern Research Directions |
title_full_unstemmed | Information Security Methods—Modern Research Directions |
title_short | Information Security Methods—Modern Research Directions |
title_sort | information security methods modern research directions |
topic | symmetry model of information security system threat model biometric authentication neural networks encryption primes digital object authenticity steganography automated control systems secure communication channels |
url | https://www.mdpi.com/2073-8994/11/2/150 |
work_keys_str_mv | AT alexandershelupanov informationsecuritymethodsmodernresearchdirections AT olegevsyutin informationsecuritymethodsmodernresearchdirections AT antonkonev informationsecuritymethodsmodernresearchdirections AT evgeniykostyuchenko informationsecuritymethodsmodernresearchdirections AT dmitrykruchinin informationsecuritymethodsmodernresearchdirections AT dmitrynikiforov informationsecuritymethodsmodernresearchdirections |