|

Data encryption in telecommunication networks

Authors: Dolova A.A., Konstantinidi A.Yu.
Published in issue: #5(34)/2019
DOI: 10.18698/2541-8009-2019-5-484


Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics

Keywords: encryption, telecommunications, networks, algorithm, RSA, AES, data, protection
Published: 06.06.2019

This article reviews the problems of hacking and interception of data transmitted over telecommunications networks. The main approaches to data encryption are summarized. The principles of operation of simple asynchronous encryption algorithms AES and RSA are described. A step-by-step practical technique for implementing the above algorithms in a high-level cross-platform programming language Java is proposed, which is a solution to the problem of protecting data transmitted using modern communication tools based on the use of telecommunication technologies. According to the research results, recommendations on the cryptographic value of each algorithm are given, their advantages and disadvantages and examples of the preferred use of each option are described.


References

[1] Asoskov A.V., Ivanov M.A., Mirskiy A.A., et al. Potochnye shifry [Stream ciphers]. Moscow, Kudits-obraz Publ., 2003 (in Russ.).

[2] Ryabko B.Ya., Fionov A.N. Kriptograficheskie metody zashchity informatsii [Cryptographic methods of information protection]. Moscow, Goryachaya liniya –Telekom Publ., 2005 (in Russ.).

[3] Arkhangel’skaya A.V., Zapechnikov S.V. Properties of effective application area of stream encryption methods for traffic protection in telecommunication systems. Informatsionnoe protivodeystvie ugrozam terrorizma, 2005, no. 4, pp. 183–186 (in Russ.).

[4] Shnayer B. Prikladnaya kriptografiya. Protokoly, algoritmy, iskhodnye teksty na yazyke Si [Applied cryptography. Protocols, algorithms, source codes in C language]. Moscow, Triumf Publ., 2002 (in Russ.).

[5] Babenko L.K, Ishchukova E.A. Differential cryptanalysis of stream ciphers. Izvestiya YuFU. Tekhnicheskie nauki [Izvestiya SFedU. Engineering Sciences], 2009, no. 11, pp. 232–238 (in Russ.).

[6] Bazhenov R.I. Informatsionnaya bezopasnost’ i zashchita informatsii [Information safety and information protection]. Birobidzhan, DGSGA Publ., 2011 (in Russ.).

[7] Bikmaeva E.V., Bazhenov R.I. The optimal choice of the system to protect information from unauthorized access. APRIORI. Seriya: Estestvennye i tekhnicheskie nauki, 2014, no. 6. URL: http://www.apriori-journal.ru/index.php/journal-estesvennie-nauki/id/414 (in Russ.).

[8] Konovalenko D.A., Bazhenov R.I. Development of laboratory practical works on steganography and cryptography methods to protect the information in the subject "Information security". Sovremennaya pedagogika [Modern pedagogy], 2014, no. 11(24), pp. 27–33 (in Russ.).

[9] Irzaev G.Kh. The expert method of safety audit of the information systems. Vestnik Dagestanskogo gosudarstvennogo tekhnicheskogo universiteta. Tekhnicheskie nauki [Herald of Daghestan State Technical University. Technical Sciences], 2011, vol. 1, no. 20, pp. 11–15 (in Russ.).

[10] Abakarova O.G., Irzaev G.Kh. Method of integral assessment of the quality of information systems of law enforcement agencies. Nauchnoe obozrenie [Science Review], 2014, no. 2, pp. 180–184 (in Russ.).

[11] Demin A.A., Karpunin A.A., Ganev Yu.M. Verification and validation methods for complex software systems. Programmnye produkty i sistemy [Software & Systems], 2014, no. 4, pp. 229–233 (in Russ.).

[12] Sel’vesyuk N.I., Ostrovskiy A.S., Gladkikh A.A., et al. Object-oriented design of a neural network to automate the process of computer architecture determination in the information security problems. Nauchnyy vestnik NGTU [Scientific Bulletin of NSTU], 2016, no. 1(62), pp. 133–145 (in Russ.).

[13] Vlasov A.I., Koloskov S.V., Pakilev A.E. [Neural network methods and attack detecting equipment at network level]. Neyroinformatika-2000. 2-ya Vseross. nauch.- tekh. konf. Sb. nauch. tr. Ch. 1 [Neuroinformatics-2000. Proc. 2nd Russ. Sci.-Tech. Conf. Vol. 1]. Moscow, MEPhI Publ., 2000, pp. 30–40 (in Russ.).

[14] Pugachev E.K., Lapina N.A. Engineering approach to renovation mechanism of rule database for attack detection system. Tekhnologii inzhenernykh i informatsionnykh system [Technologies of Engineering and Information Systems], 2018, no. 3, pp. 110–114 (in Russ.).

[15] Karpunin A.A., Ganev Yu.M., Chernov M.M. Quality assurance methods in complex program systems design. Nadezhnost’ i kachestvo slozhnykh system [Reliability & Quality of Complex Systems], 2015, no. 2(10), pp. 78–84 (in Russ.).