шифрування даних

Complex Security System of a Regional Corporate Network Based on the OSI Model and the ‘Defense-in-Depth’ Model

The strategy of the EU Agency for Cybersecurity (ENISA) and Ukraine’s Cybersecurity Strategy aims to develop and implement new approaches, methodologies, and technologies for addressing cybersecurity challenges in critical infrastructure sectors, particularly in ensuring data confidentiality within corporate networks.

Security Analysis of Modern Wi-fi Network Protection Protocols: Assessment of Wpa3 Protocol Resistance During Attacks Based on Dragonblood Utility

With the constant development of information technology and the growing threat of cyber attacks, the security of Wi-Fi wireless networks is of particular relevance. This article aims to provide an in-depth analysis of modern Wi-Fi security protocols such as WPA2, WPA3, and OWE, focusing on their strengths and weaknesses in securing the network against the most common types of attacks.

Потокова модифікація алгоритму RSA з використанням проективних та афінних перетворень для деяких класів зображень

На основі алгоритму RSA як найбільш вживаного промислового стандарту шифрування даних запропоновано модифікації з використанням проективних відо- бражень та афінних перетворень для шифрування зображень, що дають змогу строго виділяти контури.

Based on the algorithm of RSA, as the most common industry standard data encryption, proposed modifications using projective mappings and affine transformation for image encryption, allowing strictly allocate paths.

Development of Mobile Facilities of Neuro-like Cryptographic Encryption and Decryption of Data in Real Time

The requirements are formed, the method is chosen and the main stages of development of mobile means of neuro-like cryptographic encryption and real-time data decryption are considered. It is shown that the development of mobile means of neuro-like cryptographic encryption and decryption of real-time data with high efficiency of equipment is reduced to minimize hardware costs while providing a variety of requirements, characteristics and limitations. The tabular-algorithmic method of calculating the scalar product has been improved.