<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2021-7-4-78-84</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-213</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ И ТЕЛЕКОММУНИКАЦИИ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>INFORMATION TECHNOLOGIES AND TELECOMMUNICATION</subject></subj-group></article-categories><title-group><article-title>Система поддержки принятия решений для выбора оптимального постквантового механизма инкапсуляции ключей. Часть 2. Оценка прототипа</article-title><trans-title-group xml:lang="en"><trans-title>Decision Support System for Finding an Optimal Postquantum Key Encapsulation Mechanism. Part 2. Prototype Evaluation</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-4134-4980</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Власенко</surname><given-names>А. В.</given-names></name><name name-style="western" xml:lang="en"><surname>Vlasenko</surname><given-names>A.</given-names></name></name-alternatives><bio xml:lang="ru"><p>кандидат технических наук, профессор, заведующая кафедрой «Компьютерных технологий и информационной безопасности» Кубанского государственного технологического университета</p><p>Краснодар, 350072, Российская Федерация</p></bio><bio xml:lang="en"><p>Krasnodar, 350072, Russian Federation</p></bio><email xlink:type="simple">alex_vlasenko@list.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Евсюков</surname><given-names>М. В.</given-names></name><name name-style="western" xml:lang="en"><surname>Evsyukov</surname><given-names>M.</given-names></name></name-alternatives><bio xml:lang="ru"><p>аспирант кафедры «Компьютерных технологий и информационной безопасности» Кубанского государственного технологического университета</p><p>Краснодар, 350072, Российская Федерация</p></bio><bio xml:lang="en"><p>Krasnodar, 350072, Russian Federation</p></bio><email xlink:type="simple">michael.evsyukov@gmail.com</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-9974-7144</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Путято</surname><given-names>М. М.</given-names></name><name name-style="western" xml:lang="en"><surname>Putyato</surname><given-names>M.</given-names></name></name-alternatives><bio xml:lang="ru"><p>кандидат технических наук, доцент, доцент кафедры «Компьютерных технологий и информационной безопасности» Кубанского государственного технологического университета</p><p>Краснодар, 350072, Российская Федерация</p></bio><bio xml:lang="en"><p>Krasnodar, 350072, Russian Federation</p></bio><email xlink:type="simple">putyato.m@gmail.com</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-1801-6137</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Макарян</surname><given-names>А. С.</given-names></name><name name-style="western" xml:lang="en"><surname>Makaryan</surname><given-names>A.</given-names></name></name-alternatives><bio xml:lang="ru"><p>кандидат технических наук, доцент, доцент кафедры «Компьютерных технологий и информационной безопасности» Кубанского государственного технологического университета</p><p>Краснодар, 350072, Российская Федерация</p></bio><bio xml:lang="en"><p>Krasnodar, 350072, Russian Federation</p></bio><email xlink:type="simple">msanya@yandex.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Кубанский государственный технологический университет<country>Россия</country></aff><aff xml:lang="en">Kuban State Technological University<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2021</year></pub-date><pub-date pub-type="epub"><day>29</day><month>12</month><year>2021</year></pub-date><volume>7</volume><issue>4</issue><fpage>78</fpage><lpage>84</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Власенко А.В., Евсюков М.В., Путято М.М., Макарян А.С., 2021</copyright-statement><copyright-year>2021</copyright-year><copyright-holder xml:lang="ru">Власенко А.В., Евсюков М.В., Путято М.М., Макарян А.С.</copyright-holder><copyright-holder xml:lang="en">Vlasenko A., Evsyukov M., Putyato M., Makaryan A.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/213">https://tuzs.sut.ru/jour/article/view/213</self-uri><abstract><p>В заключительной части цикла статей, посвященного разработке системы поддержки принятия решений для выбора оптимального постквантового механизма инкапсуляции ключей, произведено обоснование и оценка эффективности предложенной методики выбора оптимальной реализации постквантового криптографического алгоритма. Показана экономическая целесообразность предложенного подхода и продемонстрировано его положительное влияние на качество функционирования подсистемы криптографической защиты информации. Проведено сравнение эффективности разработанного прототипа системы поддержки принятия решений с существующими программными продуктами, направленными на поддержку принятия решений в области информационной безопасности. Выполнена проверка согласованности результатов работы прототипа системы поддержки принятия решений с выводами аналитических исследований в области постквантовой криптографии.</p></abstract><trans-abstract xml:lang="en"><p>This is the final part of the series of articles devoted to the development of a decision support system for choosing the optimal post-quantum key encapsulation mechanism. Efficiency of the methodology proposed for choosing the optimal implementation of the post-quantum cryptographic algorithm is evaluated and substantiated. The economic feasibility of approach is shown and its positive impact on the quality of the cryptographic information protection subsystem is demonstrated. Efficiency comparison of the prototype of the decision support system with existing software products aimed at supporting decision-making in the field of information security is carried out. The consistency of prototype’s recommendations with the conclusions of analytical studies in the field of post-quantum cryptography is checked.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>квантовый компьютер</kwd><kwd>информационная безопасность</kwd><kwd>постквантовая криптография</kwd><kwd>механизм инкапсуляции ключей</kwd><kwd>принятие решений</kwd><kwd>оценка эффективности</kwd><kwd>веб-приложение</kwd></kwd-group><kwd-group xml:lang="en"><kwd>quantum computer</kwd><kwd>information security</kwd><kwd>postquantum cryptography</kwd><kwd>key encapsulation mechanism</kwd><kwd>decision making</kwd><kwd>efficiency estimation</kwd><kwd>web-application</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Гринштейн Д., Зайонц А. Квантовый вызов. Современные исследования оснований квантовой механики. М.: Изд-во Интеллект, 2012. 432 с.</mixed-citation><mixed-citation xml:lang="en">Grinshteyn D., Zayonz А. Quantum Challenge. Modern Research of Quantum Mechanic’s Basics. Moscow: Intellect Publ.; 2012. 432 p. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Shor P. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer // SIAM Journal on Scienticand Statistical Computing. 1997. Vol. 26. Iss. 5. PP. 1484–1509. DOI:10.1137/S0097539795293172</mixed-citation><mixed-citation xml:lang="en">Shor P. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal on Scienticand Statistical Computing. 1997;5(26):1484–1509. DOI:10.1137/S0097539795293172</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Шнайер Б. Прикладная криптография. Протоколы, алгоритмы, исходные тексты на языке Си. М.: Изд-во Три-умф, 2002. 815 с.</mixed-citation><mixed-citation xml:lang="en">Schneier B. Applied Cryptography. Protocols, Algorthms, and Source Code. Moscow: Triumph Publ.; 2002. 815 p. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">NIST Report. Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standartization Process. Gaithersburg: NIST, 2016. 25 p.</mixed-citation><mixed-citation xml:lang="en">NIST Report. Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standartization Process. Gaithersburg: NIST; 2016. 25 p.</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Alagic G., Alperin-Sheriff J., Apon D., et al. Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process. Gaithersburg: NIST, 2020. 39 p.</mixed-citation><mixed-citation xml:lang="en">Alagic G., Alperin-Sheriff J., Apon D.et al. Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process. Gaithersburg: NIST; 2020. 39 p.</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Alagic G., Alperin-Sheriff J., Apon D., et al. Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process. Gaithersburg: NIST, 2019. 27 p.</mixed-citation><mixed-citation xml:lang="en">Alagic G., Alperin-Sheriff J., Apon D.et al. Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process. Gaithersburg: NIST; 2019. 27 p.</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Власенко А.В., Евсюков М.В., Путято М.М., Макарян А.С. Система поддержки принятия решений для выбора оптимального постквантового механизма инкапсуляции ключей. Часть 1. Алгоритм принятия решений // Труды учебных заведений связи. 2020. Т. 6. № 4. С. 70‒79. DOI:10.31854/1813-324X-2020-6-4-70-79</mixed-citation><mixed-citation xml:lang="en">Vlasenko A., Evsyukov M., Putyato M., Makaryan A. Decision Support System for Finding an Optimal Postquantum Key Encapsulation Mechanism. Part 1. Decision Making Algorithm. Proc. of Telecom. Universities. 2020;6(4):70‒79. (in Russ.) DOI:10.31854/1813-324X-2020-6-4-70-79</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Larson E., Gray C. Project Management: The Managerial Process. NY: McGraw-Hill Education, 2017. 688 p.</mixed-citation><mixed-citation xml:lang="en">Larson E., Gray C. Project Management: The Managerial Process. NY: McGraw-Hill Education; 2017. 688 p.</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Wetzstein B., Karastoyanova D., Leymann F. Towards Management of SLA-Aware Business Processes Based on Key Performance Indicators // Proceedings of the 9th Workshop on Business Process Modeling Development and Support (BPMDS’08 Montpellier, France, 16‒17 June 2008). URL: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.623. 3105&amp;rep=rep1&amp;type=pdf (дата обращения 14.05.2021)</mixed-citation><mixed-citation xml:lang="en">Wetzstein B., Karastoyanova D., Leymann F. Towards Management of SLA-Aware Business Processes Based on Key Performance Indicators. Proceedings of the 9th Workshop on Business Process Modeling Development and Support, BPMDS’08, 16‒17 June 2008, Montpellier, France. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.623.3105&amp; rep=rep1&amp;type=pdf [Accessed 14 May 2021]</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Almeida L., Respicio A. Decision support for selecting information security controls // Journal of Decision Systems. 2018. Vol. 27. No. S1. PP. 173‒180. DOI:10.1080/12460125.2018.1468177</mixed-citation><mixed-citation xml:lang="en">Almeida L., Respicio A. Decision support for selecting information security controls. Journal of Decision Systems. 2018;27(S1):173‒180. DOI:10.1080/12460125.2018.1468177</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Рагозин Ю.Н. Система поддержки принятия управленческих решений при выборе вариантов информационной безопасности. М.: ГОУ МГИУ, 2011. 23 с.</mixed-citation><mixed-citation xml:lang="en">Ragozin Y. Management Decision Support System for Choosing Information Security Options. Moscow: Moscow State Industrial University Publ.; 2011. 23 p. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Рахимов Е.А. Модели и методы поддержки принятия решений в интеллектуальной системе защиты информации. Уфа: УГАТУ, 2006. 21 с.</mixed-citation><mixed-citation xml:lang="en">Rahimov E. Models and Methods of Decision Support in an Intelligent Information Security System. Ufa: Ufa State Aviation Technical University Publ.; 2006. 21 p. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">OpenSSL. Cryptography and SSL/TLS Toolkit. URL: https://www.openssl.org (дата обращения 14.11.2021)</mixed-citation><mixed-citation xml:lang="en">OpenSSL. Cryptography and SSL/TLS Toolkit. Available from: https://www.openssl.org/ [Accessed 14th November 2021]</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Луценко М.С., Киян А.С., Кузнецова Т.Ю., Кузнецов А.А. Анализ и сравнительные исследования кодовых схем инкапсуляции ключей, представленные на конкурсе NIST PQC // Всеукраинский межведомственный научно-технический сборник «Радиотехника». 2018. № 193. URL: https://nure.ua/wp-content/uploads/2018/Scientific_editions/rvmnts_ 2018_193_8.pdf (дата обращения 14.11.2021)</mixed-citation><mixed-citation xml:lang="en">Lucenko M.S., Kiyan A.S., Kuznetsova T.U., Kuznetsov A.A. Analysis and Comparative Studies of Key Encapsulation Code Schemes Presented at the NIST PQC Competition. All-Ukrainian Interdepartmental Scientific and Technical Collection "Radiotekhnika". 2018;193. (in Russ.) Available from: https://nure.ua/wp-content/uploads/2018/Scientific_editions/rvmnts_ 2018_193_8.pdf [Accessed 14th November 2021]</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Moody D. Round2 of the NIST PQC “Competition” what was NIST thinking? // The 10th International Conference on Post-Quantum Cryptography (PQCrypto 2019), Chongqing, China, 8‒10 May 2019. URL: https://csrc.nist.gov/CSRC/media/ Presentations/Round-2-of-the-NIST-PQC-Competition-What-was-NIST/images-media/pqcrypto-may2019-moody.pdf (дата обращения 03.11.2020)</mixed-citation><mixed-citation xml:lang="en">Moody D. Round2 of the NIST PQC “Competition” what was NIST thinking? // The 10th International Conference on Post-Quantum Cryptography (PQCrypto 2019), Chongqing, China, 8‒10 May 2019. URL: https://csrc.nist.gov/CSRC/media Presentations/Round-2-of-the-NIST-PQC-Competition-What-was-NIST/images-media/pqcrypto-may2019-moody.pdf [Accessed 3rd November 2020]</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Baan H., Bhattacharya S., Fluhrer S., et al. Round5: KEM and PKE based on (Ring) Learning with Rounding // Round 5. URL: https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-2-Submissions (дата обращения 14.11.2021)</mixed-citation><mixed-citation xml:lang="en">Baan H., Bhattacharya S., Fluhrer S. et al. Round5: KEM and PKE based on (Ring) Learning with Rounding // Round 5. Available from: https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-2-Submissions [Accessed 14th November 2021]</mixed-citation></citation-alternatives></ref><ref id="cit17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">Власенко А.В., Евсюков М.В., Путято М.М., Макарян А.С. Исследование реализации механизмов инкапсуляции ключей постквантовых криптографических методов // Прикаспийский журнал: управление и высокие технологии. 2019. № 4. C. 121‒127. DOI:10.21672/2074-1707.2019.48.4.121-127</mixed-citation><mixed-citation xml:lang="en">Vlasenko A.V., Evsyukov M.V., Putyato М.М., Makaryan A.S. Research of Key Encapsulation Mechanisms Based on Postquantum Cryptographic Algorithms. Caspian journal: Management and High Technologies. 2019;4(48):121‒127. (in Russ.) DOI:10.21672/2074-1707.2019.48.4.121-127</mixed-citation></citation-alternatives></ref><ref id="cit18"><label>18</label><citation-alternatives><mixed-citation xml:lang="ru">Nist software perfomance tests // SAFEcrypto. URL: https://www.safecrypto.eu/pqclounge (дата обращения 14.11.2021)</mixed-citation><mixed-citation xml:lang="en">Nist software perfomance tests. SAFEcrypto. Available from: https://www.safecrypto.eu/pqclounge [Accessed 14th November 2021]</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
