Salman W.orcid-id
Analysis of Homomorphic Cryptosystems of Benaloh and Paillier for the Construction of an Electronic Voting SystemЖурнала ТУЗС - Том 7, №2, 2021

  • Abstract:The analysis of the performance of two cryptographic algorithms (Paillier and Benaloh), in order to apply them in the construction of electronic voting systems is carried out. A description of each system and their homomorphic properties is given. Electronic voting systems based on these schemes are described. The requirements for the voting system are formulated and a comparative analysis of the voting systems based on the schemes of Paillier and Benaloh is carried out. The analysis showed that the Paillier scheme is the best and simplest method for building secure electronic voting systems, while the Benaloh scheme is more complex and computationally more time-consuming.
  • Keywords: homomorphic encryption, Paillier cryptosystem, Benaloh cryptosystem, electronic voting system.


Zhuk R.orcid-id
Method for Determining the Potential of an Information Security Intruder and Realizable Software VulnerabilitiesЖурнала ТУЗС - Том 7, №2, 2021

  • Abstract:Currently, many methodological documents have been developed that regulate approaches to the development of models of threats to information security. for information systems that process information of a different nature. There are different methods of threat development and intruder model building proposed by information security regulators, depending on the direction of their activity. To support decision-making in the process of threat modeling, a databank of information security threats has been developed. However, there are a number of contradictions in existing approaches, while the methods for identifying threats and building a model of an intruder, in most cases, involve the involvement of experts to assess the factors and conditions for the emergence of threats. In the existing methods, there is no relationship between the violator of information security. and software vulnerabilities in information systems, which does not allow building an adequate threat model without the involvement of qualified experts. The purpose of this work is to determine the potential of an information security violator. depending on its capabilities and assessing the impact of this potential on the implementation of software vulnerabilities in information systems.
  • Keywords: potential, information security intruder, opportunity, vulnerability, software, unauthorized access.


Korzhik V.orcid-id, Starostin V., Flaksman D.orcid-id
Elaboration of Digital Watermarking Method for a Protection of Cloning Attack on Paper Certificates.Журнала ТУЗС - Том 7, №2, 2021

  • Abstract: Paper (or plastic) certificates are considered as a means against different forgery of product quality and brand falsification. It is commonly to use barcodes or data matrices to solve this problem. However such approach does not work usually against such sophisticated attacks as cloning of certificate copies. In the current paper we propose to use a digital watermarking and estimation of inner noises of scanners and printers in order to detect cloning attack effectively. Algorithm of cloning attack detecting is presented. The probabilities of attack missing and false alarm are proved.
  • Keywords: certificate of product, cloning attack, digital watermarking, the probabilities of attack missing and false alarm.


Moldovyan D.orcid-id, Fahrutdinov R., Mirin A., Kostina A.
Digital Signature Scheme with Hidden Group Possessing Two-Dimensional CyclicityЖурнала ТУЗС - Том 7, №2, 2021

  • Abstract: A method is proposed for constructing digital signature schemes based on the hidden discrete logarithm problem, which meet ageneral criterion of post-quantum resistance. The method provides a relatively small size of the public key and signature. Based on the method, a practical digital signature scheme has been developed, in which the exponentiation operation in a hidden group with two-dimensional cyclicity is the basic cryptographic primitive. The algebraic support of a cryptoscheme is a four-dimensional finite non-commutative algebra with associative multiplication operation. By specifying algebra using abasis vector multiplication table with half of empty cells, the performance of signature generation and authentication procedures is improved. A public key is a triple of four-dimensional vectors calculated as images of elements of a hidden group which are mapped using two types of masking operations: 1) mutually commutative with the exponentiation operation and 2) not having this property.
  • Keywords: information protection, computer security, cryptography, digital signature, post-quantum cryptoscheme, discrete logarithm problem, finite associative algebra, non-commutative algebra, hidden group.


Bobrovskiy A.orcid-id
Theoretical Foundations Development of Space Adaptive Video Information Systems SynthesisЖурнала ТУЗС - Том 7, №2, 2021

  • Abstract: The main provisions and principles of the synthesis of adaptive video information systems designed for recording and analyzing images of dynamic scenes at the stages of long-range detection of artificial space objects, ballistic and controlled approach to them in the middle and near zone of cooperation are considered. Based on the principle of dominant information, it is shown that the basis for the development of methods and algorithms for processing video information in on-board surveillance systems is the joint adaptive processing of video information in photodetector matrices and in digital processors in order to maximize the quality of information issued to the consumer by suppressing background and noise information by adaptive hysteresis control of the frame frequency, frame resolution and signal accumulation time in the photodetector matrix, as well as the use of parametric neural network detectors-classifiers.
  • Keywords: synthesis, video information system, adaptation, dominant, background and noise information, frame rate, resolution, accumulation time, encoding, parametric optimization.