Conference Paper

Development of Reliable and Effective Methods of Cryptographic Protection of Information Based on the Finite Automata Theory

Volume: 26 December 30, 2023
  • Altynbek Sharıpbay
  • Zhanat Saukhanova
  • Gulmira Shakhmetova
  • Alibek Barlybayev
EN

Development of Reliable and Effective Methods of Cryptographic Protection of Information Based on the Finite Automata Theory

Abstract

This paper describes project to conduct study of cryptographic protection of information on publications in publications and development of methods for reliable and efficient cryptographic protection of information based on finite automaton models-FAM, preparation of additions to standards and management of dissertations of undergraduates and doctoral students on information security and information protection. To achieve this goal, following tasks will be solved: 1. Study of mathematical foundations of cryptology and analysis of standards for cryptographi. Results: Theory of finite fields, models of FA, descriptions of requirements of standards, proposals to standards. 2. Study of applicability of various FA models in construction of reliable and efficient cryptoalgorithms. Results: Algorithm for obtaining an inverse FA from given FA - proving applicability of FA in cryptosystem, algorithm for composing several FA - proving increase in reliability of cryptosystem using composite FA with increased number of states, algorithm for constructing equivalent FA – proving increase in efficiency of cryptosystems using equivalent FA with reduced number of states. 3.. Development and verification of programs for reliable and efficient cryptosystem based on KA. Results: FA cryptographic programs and their applications in steganography, verification and testing protocols for developed programs.

Keywords

References

  1. Abdymanapov, S. A., Muratbekov, M., Altynbek, S., & Barlybayev, A. (2021). Fuzzy expert system of Information security risk assessment on the example of analysis learning management systems. IEEE Access, 9, 156556-156565.
  2. Agibalov, G. P. (2009). Finite automata in cryptography. Prikladnaya Diskretnaya Matematika, 11, 43-73.
  3. Aktayeva, A., Niyazova, R., Muradilova, G., Makatov, Y., & Kusainova, U. (2018). Cognitive computing cybersecurity: social network analysis. In International Conference on Convergent Cognitive Information Technologies (pp. 28-43). Cham: Springer International Publishing.

Details

Primary Language

English

Subjects

Environmental and Sustainable Processes

Journal Section

Conference Paper

Authors

Altynbek Sharıpbay This is me
Kazakhstan

Zhanat Saukhanova This is me
Kazakhstan

Gulmira Shakhmetova This is me
Kazakhstan

Alibek Barlybayev This is me
Kazakhstan

Early Pub Date

December 24, 2023

Publication Date

December 30, 2023

Submission Date

July 10, 2023

Acceptance Date

November 28, 2023

Published in Issue

Year 2023 Volume: 26

APA
Sharıpbay, A., Saukhanova, Z., Shakhmetova, G., & Barlybayev, A. (2023). Development of Reliable and Effective Methods of Cryptographic Protection of Information Based on the Finite Automata Theory. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 26, 19-25. https://doi.org/10.55549/epstem.1409285