Tenzor Methods in Cyber Security

dc.contributor.authorГригор’єва Тетяна Ігорівна
dc.contributor.authorHryhorieva, Tetiana I.
dc.contributor.authorGrygoryeva Tetyana
dc.contributor.authorЙона Лариса Григорівна
dc.contributor.authorЙона, Л. Г.
dc.contributor.authorYona Larysa
dc.contributor.authorMazur Anna
dc.contributor.authorМазур Ганна Дмитрівна
dc.date.accessioned2024-03-27T10:30:02Z
dc.date.available2024-03-27T10:30:02Z
dc.date.issued2023
dc.descriptionHryhorieva T. Tenzor Methods in Cyber Security / T. Hryhorieva T., L. Yona, A. Mazur // Information and Communication Technologies and Sustainable Development. Advanced Approaches and Innovations in Up-to-Date Networks and Systems. Lecture Notes in Networks and Systems. - Springer Nature Switzerland AG. - LNNS 809, 2023. - P. 291–299. https://doi.org/10.1007/978-3-031-46880-3_18
dc.description.abstractThe development of information technology and intensive use of the Internet has revealed problems related to information security. The issues of protecting information transmitted through communication channels and requiring long-term storage become relevant; the need for authentication procedures for users and messages; improving system performance and reliability. Various tasks ofmodern information security are solvedwith the help of cryptographic protocols. Various sections of higher mathematics are successfully used in information protection tasks. In this article to increase the effectiveness of information protection means, it is proposed to use such a mathematical apparatus as tensor analysis. The possibility of using tensor methods in solving various problems of cryptographic protection of information is shown. As a result of tensor analysis operations, this article shows the possibility of encrypting messages and decrypting cryptograms. The possibility of using tensor analysis in the construction of hash functions is shown additionally. In order to increase the effectiveness of means of protecting confidential information, it is proposed to encrypt messages using tensor analysis operations. At the same time, there is an increase in the speed of the process of ensuring the protection of confidential information in the implementation of document flow.
dc.identifier.citationHryhorieva T., Yona L., Mazur A. Tenzor Methods in Cyber Security // Information and Communication Technologies and Sustainable Development. Advanced Approaches and Innovations in Up-to-Date Networks and Systems. Lecture Notes in Networks and Systems. Springer Nature Switzerland AG. LNNS 809, 2023. P. 291–299. https://doi.org/10.1007/978-3-031-46880-3_18
dc.identifier.otherhttps://doi.org/10.1007/978-3-031-46880-3_18
dc.identifier.urihttps://hdl.handle.net/11300/27648
dc.language.isoen
dc.publisherSpringer Nature Switzerland AG
dc.subjectCyber Security
dc.subjectCryptographic Protection
dc.subjectEncryption Key
dc.subjectTensor Methods
dc.subjectHash Function
dc.titleTenzor Methods in Cyber Security
dc.typeArticle

Файли

Контейнер Original
Зараз відображається 1 - 1 з 1
Завантаження...
Ескіз
Name:
Hryhorieva T., Yona L., Mazur A. Tenzor Methods in Cyber Security.pdf
Size:
620.63 KB
Format:
Adobe Portable Document Format
Контейнер License
Зараз відображається 1 - 1 з 1
Без Ескізу
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: