Analysis and Improvement of Information Security Technologies in Distributed and Asymmetric Systems

2025;
: pp. 158 - 162
1
Vasyl Stefanyk Carpathian National University, Ukraine
2
Vasyl Stefanyk Carpathian National University, Ukraine
3
Vasyl Stefanyk Carpathian National University, 57, Ukraine
4
Vasyl Stefanyk Precarpathian National University, Ukraine
5
Vasyl Stefanyk Carpathian National University, Ukraine
6
Vasyl Stefanyk Carpathian National University, Ukraine
7
College of Engineering, Wasit University,Iraq

The article discusses modern information security technologies in distributed and asymmetric systems, as well as problems arising from their implementation in the context of growing cyber threats. An analysis of cryptographic methods, authentication systems, access control, and intrusion detection has been provided. Particular attention has been paid to the limitations of existing technologies and promising areas for their improvement, in particular the use of machine learning methods, block chain technologies, and the Zero Trust concept. The importance of adaptive cyber defense models for ensuring the resilience of distributed and cyber-physical systems has been emphasized. A software  model of a steganography channel using the El Gamal asymmetric algorithm has been implemented

[1]     Stallings W. (2016) Cryptography and Network Security. Pearson, 768.

[2]     Bishop M. (2019) Computer Security: Art and Science. Addison-Wesley, 1472.

[3]     Anderson R. (2020) Security Engineering. Wiley, 1232.

[4] Shostack A. (2014) Threat Modeling: Designing for Security. Wiley, 624.

[5]     Chivukula, R., Lakshmi, T. J., Kandula, L. R. R., & Alla, K. (2021, November). A study of cyber security issues and challenges. In 2021 IEEE Bombay Section Signature Conference (IBSSC) (pp. 1-5). IEEE. DOI: 10.1109/IBSSC53889.2021.9673270.

[6] Schneier B. (2015) Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York. Wiley, 912.

[7] Stallings W. (2017) Network Security Essentials: Applications and Standards. Pearson, 640.

[8]     Pfleeger  C.,  Pfleeger  S.  (2016)  Security in  Computing. Boston. Pearson, 880.

[9] Anderson R. (2020) Security Engineering: A Guide to Building Dependable Distributed Systems. – 2nd ed.  – New York: Wiley, 1232.

[10] Viega J., McGraw G. (2019) Building Secure Software: How to Avoid Security Problems the Right Way. Boston. Addison-Wesley, 528.

[11]  Easttom  C.  (2018)  Computer   Security  Fundamentals. Boston. Pearson, 608.

[12] Ordonez, A. J., Medina R. P., and Gerardo B. D., (2018) Modified El Gamal algorithm for multiple senders and single receiver encryption. IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), Penang, Malaysia, 201-205. DOI: 10.1109/ISCAIE.2018.8405470.

[13] Yang, S., Liu, C., Wu, H., and Hu, A. (2023). Security Analysis of Enhanced DNA and ElGamal Cryptosystem for Secure Data Storage and Retrieval in Cloud, 13th International Conference on Information Technology in Medicine and Education (ITME), Wuyishan, China, 444- 446. DOI: 10.1109/ITME60234.2023.00094.

[14] Iavich, M., Gnatyuk, S., Jintcharadze, E., Polishchuk Y., and Odarchenko, R. (2018) Hybrid Encryption Model of AES and ElGamal Cryptosystems for Flight Control Systems. 5th International Conference on Methods and Systems of Navigation and Motion Control (MSNMC), Kiev, Ukraine, 229-233. DOI: 10.1109/MSNMC.2018.8576289