Персона:
Запечников, Сергей Владимирович

Загружается...
Profile Picture
Email Address
Birth Date
Организационные подразделения
Организационная единица
Институт интеллектуальных кибернетических систем
Цель ИИКС и стратегия развития - это подготовка кадров, способных противостоять современным угрозам и вызовам, обладающих знаниями и компетенциями в области кибернетики, информационной и финансовой безопасности для решения задач разработки базового программного обеспечения, повышения защищенности критически важных информационных систем и противодействия отмыванию денег, полученных преступным путем, и финансированию терроризма.
Статус
Фамилия
Запечников
Имя
Сергей Владимирович
Имя

Результаты поиска

Теперь показываю 1 - 2 из 2
  • Публикация
    Только метаданные
    Methods and Algorithms for Detecting Compromise of Secret Keys
    (2020) Kuzmicheva, S.; Kiryakina, M.; Zapechnikov, S.; Запечников, Сергей Владимирович
    © 2020, Springer Nature Switzerland AG.It is not uncommon for a single user to use multiple devices to access applications, such as messengers. The legitimacy of using client devices and access rights should be monitored to ensure the necessary level of information security. In the paper authors analyze and discuss some approaches to detect unauthorized usage of cryptographic keys. The first approach is known as trace-independent inconsistency, the second approach is an observation of contradiction, the third approach called an observation of acausality. All three approaches are based on the additional dedicated audit service to the application under protection. The main result of our investigation is the technique for applying these principles to the secure communication and messaging protocols. In the paper authors suggest a cryptographically protocol for detecting compromise of secret keys based on blockchain technology.
  • Публикация
    Только метаданные
    A Technique of Protocol Construction for Detecting Compromises of Secret Keys
    (2020) Kiryakina, M.; Kuzmicheva, S.; Zapechnikov, S.; Запечников, Сергей Владимирович
    © 2020 IEEE.Currently a single user often utilizes multiple devices to get access to applications, for example, messengers. A way to provide the necessary level of information security is monitoring the legitimacy of using client devices according to a set of access rights. In this paper, we suggest a cryptographic protocol for detecting compromises of secret keys based on blockchain technology. In contrast with currently available solutions, the blockchain-based protocol allows controlling usage of all long-term cryptographic keys, as well as every key in a chain of short-term keys. Besides that, an additional audit service can be used for monitoring secure messaging protocols. Moreover, the protocol includes an authentication service for users. All these techniques make the idea of blockchain-based protocol promising.