cryptographic protection

Innovative Methods of Encryption and Storage of Database Parts in Distributed Systems Based on Smart Contracts

The article proposes a comprehensive approach to solving the data protection problem in decentralized distributed information storage systems based on blockchain technology. A conceptual ‘SecureChain’ model has been developed that integrates modern cryptographic protection methods with programmable smart contract logic for automated access management and data integrity assurance. The model employs a multi-level architecture including data layer, smart contract layer, network interaction layer, and user interface.

Methods of Blockchain Technology Formation in the Arms Sales Accounting System

The article explores the application of blockchain technology in the field of arms sales accounting. The authors examine the main methods of forming such technology, including distributed ledger, hash functions, cryptographic protection, smart contracts, consensus protocols, decentralized network, transactions, genesis block, decentralized governance, and public key. The authors analyze the potential of these methods in creating an efficient and secure arms sales accounting system.

ARCHITECTURE AND IMPLEMENTATION OF BASIC COMPONENTS OF NEURAL NETWORK PROTECTION SYSTEM AND DATA TRANSMISSION CODING

The development of basic components of the neural network protection system, data transmission coding based on an integrated approach, which includes an improved method of neural network encryption (decryption) and the method of adaptive barker-like coding (decoding) of data, which focuses on modern element base. The principles of specialization and adaptation of hardware and software to the structure of algorithms for neuro-like encryption (decryption) of data, neural network architecture, and barker-like code are used to develop the system.

The Quintessence of Information Security of a Cyber-physical System

The quintessence of an information security (IS) of cyber-physical systems (CPS) was presented, which is deployed on the level of complex security system (CSS) creation paradigm and conception as well as the CSS universal platform in the field “threats – profiles – tools”; it is also implemented in the part of CSS integral model of cyber-physical system “iPhone – Wi-Fi, Bluetooth – sensors” and cryptographic protection of CPS wireless communication environment based on block data encryption of algorithm “Kalyna”.