Linked System of Data Organization and Management

Kulibaba, S. and Zubyk, L. and Kurchenko, O. and Sinitsyn, I. and Mazur, Nataliia (2023) Linked System of Data Organization and Management Cybersecurity Providing in Information and Telecommunication Systems (3421). pp. 117-126. ISSN 1613-0073

[thumbnail of S_Kulibaba_L_Zubyk_O_Kurchenko_ta_in_CPITS_3421_FITM.pdf] Text
S_Kulibaba_L_Zubyk_O_Kurchenko_ta_in_CPITS_3421_FITM.pdf

Download (563kB)

Abstract

This article presents a new method of cryptographic data encryption. The principle of operation consists of processing input data—changing the structure in a keyless format. There are a sufficient number of similar algorithms, which have the names symmetric and asymmetric. They work with keys for encryption or decryption. The new method will make it possible to process data according to the appropriate algorithm without changing the size of the input data, only by changing the structure, and also without using a key for decryption. For decryption, you need to apply the proposed algorithm in the reverse order. Currently, communication systems are gaining popularity, because society wants to maintain contact with others remotely, as well as with the security of personal data. The data loss of some systems has been noticed repeatedly, so in addition to displaying the new algorithm, the principle of data organization and management, which is called a “Linked System”, will be displayed. A significant number of systems are closed. They use other methods to keep data confidential. In addition to saving data, data may also be transferred. Transmission is carried out through communication channels, namely certain protocols. Some systems use special communication protocols to connect clients to the server. Each protocol can have a different data structure. The principle of application of the algorithm does not depend on the very structure of the system on which the corresponding protocol works. The algorithm is applied to all data that can be transmitted over the network mesh to which the clients are connected. Thanks to the individual approach, it is possible to achieve data reliability, as well as avoid the use of device resources thanks to an optimized algorithm and some software development tools.

Item Type: Article
Uncontrolled Keywords: system; encryption; decryption; key; protection; modification; speed
Subjects: Статті у наукометричних базах > Scopus
Divisions: Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка
Depositing User: Наталія Мазур
Date Deposited: 24 Jul 2023 05:27
Last Modified: 24 Jul 2023 05:45
URI: https://elibrary.kubg.edu.ua/id/eprint/45707

Actions (login required)

View Item View Item