шифрування даних

Security Analysis of Modern Wi-fi Network Protection Protocols: Assessment of Wpa3 Protocol Resistance During Attacks Based on Dragonblood Utility

With the constant development of information technology and the growing threat of cyber attacks, the security of Wi-Fi wireless networks is of particular relevance. This article aims to provide an in-depth analysis of modern Wi-Fi security protocols such as WPA2, WPA3, and OWE, focusing on their strengths and weaknesses in securing the network against the most common types of attacks.

Потокова модифікація алгоритму RSA з використанням проективних та афінних перетворень для деяких класів зображень

На основі алгоритму RSA як найбільш вживаного промислового стандарту шифрування даних запропоновано модифікації з використанням проективних відо- бражень та афінних перетворень для шифрування зображень, що дають змогу строго виділяти контури.

Based on the algorithm of RSA, as the most common industry standard data encryption, proposed modifications using projective mappings and affine transformation for image encryption, allowing strictly allocate paths.

Development of Mobile Facilities of Neuro-like Cryptographic Encryption and Decryption of Data in Real Time

The requirements are formed, the method is chosen and the main stages of development of mobile means of neuro-like cryptographic encryption and real-time data decryption are considered. It is shown that the development of mobile means of neuro-like cryptographic encryption and decryption of real-time data with high efficiency of equipment is reduced to minimize hardware costs while providing a variety of requirements, characteristics and limitations. The tabular-algorithmic method of calculating the scalar product has been improved.