Encoding as a means of protecting information in systems of access control using time-logic functions in the form of polynomials and biometric data of subjects

One of the main elements of the integrated information security system is the subsystem of access’s control to information resources. Recently, more attention is attracted by biometrics as one of the newest information technologies that use the unique characteristics of object identification and ver...

Повний опис

Збережено в:
Бібліографічні деталі
Дата:2018
Автор: Sachaniuk-Kavets’ka, N. V.
Формат: Стаття
Мова:Ukrainian
Опубліковано: Інститут проблем реєстрації інформації НАН України 2018
Теми:
Онлайн доступ:http://drsp.ipri.kiev.ua/article/view/142912
Теги: Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!
Назва журналу:Data Recording, Storage & Processing

Репозитарії

Data Recording, Storage & Processing
id drspiprikievua-article-142912
record_format ojs
institution Data Recording, Storage & Processing
baseUrl_str
datestamp_date 2019-12-27T06:41:24Z
collection OJS
language Ukrainian
topic time-logic functions
А-interval
polynomial
cyclic code
key
spellingShingle time-logic functions
А-interval
polynomial
cyclic code
key
Sachaniuk-Kavets’ka, N. V.
Encoding as a means of protecting information in systems of access control using time-logic functions in the form of polynomials and biometric data of subjects
topic_facet time-logic functions
А-interval
polynomial
cyclic code
key
логико-временная функция
А-интервал
полином
циклический код
ключ
логіко-часова функція
А-інтервал
поліном
циклічний код
ключ
format Article
author Sachaniuk-Kavets’ka, N. V.
author_facet Sachaniuk-Kavets’ka, N. V.
author_sort Sachaniuk-Kavets’ka, N. V.
title Encoding as a means of protecting information in systems of access control using time-logic functions in the form of polynomials and biometric data of subjects
title_short Encoding as a means of protecting information in systems of access control using time-logic functions in the form of polynomials and biometric data of subjects
title_full Encoding as a means of protecting information in systems of access control using time-logic functions in the form of polynomials and biometric data of subjects
title_fullStr Encoding as a means of protecting information in systems of access control using time-logic functions in the form of polynomials and biometric data of subjects
title_full_unstemmed Encoding as a means of protecting information in systems of access control using time-logic functions in the form of polynomials and biometric data of subjects
title_sort encoding as a means of protecting information in systems of access control using time-logic functions in the form of polynomials and biometric data of subjects
title_alt Кодирование как средство защиты информации в системах контроля доступа с использованием логико-временных функций в форме полиномов и биометрических данных субъектов
Кодування як засіб захисту інформації у системах контролю доступу з використанням логіко-часових функцій у формі поліномів і біометричних даних суб’єктів
description One of the main elements of the integrated information security system is the subsystem of access’s control to information resources. Recently, more attention is attracted by biometrics as one of the newest information technologies that use the unique characteristics of object identification and verification. Therefore, the question of the protection of information resources from unauthorized administrative actions and access by unauthorized persons or programs to computer data is important.Relevant is the preservation of confidentiality of information processed or stored in computer systems. External influences generally oppose using a variety of software and hardware protection methods. The content of the methods of the protective transformations is that the information stored in the system and is transmitted by communication channels, is turns into a cryptogram — a closed (encrypted) text or graphic image documents. The basis for the encryption is based on two elements: a cryptographic algorithm and key. The security of generic algorithms is determined by the key length. In asymmetric algorithms, the encryption and decryption can be performed with different keys. Such algorithms require significantly more computation time, but do not create problems during key distribution. The most promi-sing data protection systems today are considered an asymmetric system with a public key. The last deca-de a great attention of scientists in the field of information security pay biometric. A biometric system can operate in modes of verification and identification. All of these approaches protect the information easy enough to implement in the time-logic environment, making all the settings required for message transform on the time-logic functions.The possibility of cyclic encoding and the rules for constructing key asymmetric crypto algorithm on the basis of the identification time-logic functions, which contain all the important characteristics of transmitted messages, is analyzed. Available for the formal description of this encoding and the rules of construction keys used in the representation of time-logic functions in the form of polynomials.
publisher Інститут проблем реєстрації інформації НАН України
publishDate 2018
url http://drsp.ipri.kiev.ua/article/view/142912
work_keys_str_mv AT sachaniukkavetskanv encodingasameansofprotectinginformationinsystemsofaccesscontrolusingtimelogicfunctionsintheformofpolynomialsandbiometricdataofsubjects
AT sachaniukkavetskanv kodirovaniekaksredstvozaŝityinformaciivsistemahkontrolâdostupasispolʹzovaniemlogikovremennyhfunkcijvformepolinomovibiometričeskihdannyhsubʺektov
AT sachaniukkavetskanv koduvannââkzasíbzahistuínformacííusistemahkontrolûdostupuzvikoristannâmlogíkočasovihfunkcíjuformípolínomívíbíometričnihdanihsubêktív
first_indexed 2025-07-17T10:57:04Z
last_indexed 2025-07-17T10:57:04Z
_version_ 1850411247052259328
spelling drspiprikievua-article-1429122019-12-27T06:41:24Z Encoding as a means of protecting information in systems of access control using time-logic functions in the form of polynomials and biometric data of subjects Кодирование как средство защиты информации в системах контроля доступа с использованием логико-временных функций в форме полиномов и биометрических данных субъектов Кодування як засіб захисту інформації у системах контролю доступу з використанням логіко-часових функцій у формі поліномів і біометричних даних суб’єктів Sachaniuk-Kavets’ka, N. V. time-logic functions А-interval polynomial cyclic code key логико-временная функция А-интервал полином циклический код ключ логіко-часова функція А-інтервал поліном циклічний код ключ One of the main elements of the integrated information security system is the subsystem of access’s control to information resources. Recently, more attention is attracted by biometrics as one of the newest information technologies that use the unique characteristics of object identification and verification. Therefore, the question of the protection of information resources from unauthorized administrative actions and access by unauthorized persons or programs to computer data is important.Relevant is the preservation of confidentiality of information processed or stored in computer systems. External influences generally oppose using a variety of software and hardware protection methods. The content of the methods of the protective transformations is that the information stored in the system and is transmitted by communication channels, is turns into a cryptogram — a closed (encrypted) text or graphic image documents. The basis for the encryption is based on two elements: a cryptographic algorithm and key. The security of generic algorithms is determined by the key length. In asymmetric algorithms, the encryption and decryption can be performed with different keys. Such algorithms require significantly more computation time, but do not create problems during key distribution. The most promi-sing data protection systems today are considered an asymmetric system with a public key. The last deca-de a great attention of scientists in the field of information security pay biometric. A biometric system can operate in modes of verification and identification. All of these approaches protect the information easy enough to implement in the time-logic environment, making all the settings required for message transform on the time-logic functions.The possibility of cyclic encoding and the rules for constructing key asymmetric crypto algorithm on the basis of the identification time-logic functions, which contain all the important characteristics of transmitted messages, is analyzed. Available for the formal description of this encoding and the rules of construction keys used in the representation of time-logic functions in the form of polynomials. Рассмотрена возможность циклического кодирования и правила построения ключей ассиметричного криптоалгоритма на основе идентификационных логико-временных функций, содержащих все важные характеристики переданных сообщений. Для формального описания такого кодирования и правил построения ключей использовано представление логико-временных функций в форме полиномов. Розглянуто можливість циклічного кодування та правила побудови ключів асиметричного криптоалгоритму на базі ідентифікаційних логіко-часових функцій, що містять усі важливі характеристики переданих повідомлень. Для доступного формального опису такого кодування та правил побудови ключів використано подання логіко-часових функційу формі поліномів. Інститут проблем реєстрації інформації НАН України 2018-06-19 Article Article application/pdf http://drsp.ipri.kiev.ua/article/view/142912 10.35681/1560-9189.2018.20.2.142912 Data Recording, Storage & Processing; Vol. 20 No. 2 (2018); 60–67 Регистрация, хранение и обработка данных; Том 20 № 2 (2018); 60–67 Реєстрація, зберігання і обробка даних; Том 20 № 2 (2018); 60–67 1560-9189 uk http://drsp.ipri.kiev.ua/article/view/142912/140359 Авторське право (c) 2021 Реєстрація, зберігання і обробка даних