TY - JOUR T1 - Development of Reliable and Effective Methods of Cryptographic Protection of Information Based on the Finite Automata Theory AU - Sharıpbay, Altynbek AU - Saukhanova, Zhanat AU - Shakhmetova, Gulmira AU - Barlybayev, Alibek PY - 2023 DA - December DO - 10.55549/epstem.1409285 JF - The Eurasia Proceedings of Science Technology Engineering and Mathematics JO - EPSTEM PB - ISRES Publishing WT - DergiPark SN - 2602-3199 SP - 19 EP - 25 VL - 26 LA - en AB - This paper describes project to conduct study of cryptographic protection of information on publications in publications and development of methods for reliable and efficient cryptographic protection of information based on finite automaton models-FAM, preparation of additions to standards and management of dissertations of undergraduates and doctoral students on information security and information protection. To achieve this goal, following tasks will be solved: 1. Study of mathematical foundations of cryptology and analysis of standards for cryptographi. Results: Theory of finite fields, models of FA, descriptions of requirements of standards, proposals to standards. 2. Study of applicability of various FA models in construction of reliable and efficient cryptoalgorithms. Results: Algorithm for obtaining an inverse FA from given FA - proving applicability of FA in cryptosystem, algorithm for composing several FA - proving increase in reliability of cryptosystem using composite FA with increased number of states, algorithm for constructing equivalent FA – proving increase in efficiency of cryptosystems using equivalent FA with reduced number of states. 3.. Development and verification of programs for reliable and efficient cryptosystem based on KA. Results: FA cryptographic programs and their applications in steganography, verification and testing protocols for developed programs. KW - Cryptography KW - Information security KW - Finite automata KW - Reversibility of finite automata KW - Information security standards CR - Abdymanapov, S. A., Muratbekov, M., Altynbek, S., & Barlybayev, A. (2021). Fuzzy expert system of Information security risk assessment on the example of analysis learning management systems. IEEE Access, 9, 156556-156565. CR - Agibalov, G. P. (2009). Finite automata in cryptography. Prikladnaya Diskretnaya Matematika, 11, 43-73. CR - Aktayeva, A., Niyazova, R., Muradilova, G., Makatov, Y., & Kusainova, U. (2018). Cognitive computing cybersecurity: social network analysis. In International Conference on Convergent Cognitive Information Technologies (pp. 28-43). Cham: Springer International Publishing. UR - https://doi.org/10.55549/epstem.1409285 L1 - https://dergipark.org.tr/en/download/article-file/3617916 ER -