Персона:
Запечников, Сергей Владимирович

Загружается...
Profile Picture
Email Address
Birth Date
Организационные подразделения
Организационная единица
Институт интеллектуальных кибернетических систем
Цель ИИКС и стратегия развития - это подготовка кадров, способных противостоять современным угрозам и вызовам, обладающих знаниями и компетенциями в области кибернетики, информационной и финансовой безопасности для решения задач разработки базового программного обеспечения, повышения защищенности критически важных информационных систем и противодействия отмыванию денег, полученных преступным путем, и финансированию терроризма.
Статус
Фамилия
Запечников
Имя
Сергей Владимирович
Имя

Результаты поиска

Теперь показываю 1 - 5 из 5
  • Публикация
    Открытый доступ
    Systematization of knowledge: privacy methods and zero knowledge proofs in corporate blockchains
    (2023) Konkin, A.; Zapechnikov, S.; Запечников, Сергей Владимирович
    Nowadays enterprises implement blockchain technology in various industries, including finance, logistics, and other sectors. While the core idea behind blockchain is to decentralize storage, enterprises need to address privacy issues of replicated data. One of the methods to solve privacy in the blockchain is to adjust zero-knowledge-proof protocols. We comprehensively review blockchain privacy techniques employing zero-knowledge proofs and other cryptographic techniques and discuss the World and Russian standardization processes in blockchain privacy techniques.
  • Публикация
    Открытый доступ
    Historical notes on Russian cryptography
    (2023) Epishkina, A.; Zapechnikov, S.; Belozubova, A.; Епишкина, Анна Васильевна; Белозубова, Анна Игоревна; Запечников, Сергей Владимирович
    The article is devoted to the main milestones in the development of encryption techniques and mathematical methods of cryptography in Russia from the period of ancient Russia up to the nowadays. We break down the history of Russian cryptography into several periods and highlight the periods of cryptography development, analyze the most notable achievements and summarize the main results and applications of each period. The review of scientific research and standardization of cryptography in modern Russia is given. The progress of related areas is briefly analyzed: steganography and protection against falsification of documents.
  • Публикация
    Только метаданные
    Protocols for Secure Management of Multidimensional Data Arrays
    (2019) Gorlatykh, A.; Zapechnikov, S.; Запечников, Сергей Владимирович
    Popular technologies such as data mining and online analytical processing are widely known as technologies heavy-based on the usage of multidimensional data structures. However, at the same time, development of the security countermeasures leaves much to be desired. Currently, there is no complex multidimensional data processing system capable to ensure proper security levels exist. In the paper, we propose security protocols which formed the basis of our solution aimed to provide security for multidimensional data storage and processing. We describe basic protocols for data read and write operations adopted for the features of multidimensional data structures and security assumptions.
  • Публикация
    Только метаданные
    Prоtоcоls fоr secure management оf multidimensiоnal data arrays
    (2019) Gorlatykh, A.; Zapechnikov, S.; Запечников, Сергей Владимирович
    © 2019 IEEE Pоpular technоlоgies such as data mining and online analytical prоcessing are widely knоwn as technоlоgies heavy-based оn the usage оf multidimensiоnal data structures. Hоwever, at the same time, develоpment оf the security cоuntermeasures leaves much tо be desired. Currently, there is nо cоmplex multidimensiоnal data prоcessing system capable tо ensure prоper security levels exist. In the paper, we prоpоse security prоtоcоls which fоrmed the basis оf оur sоlutiоn aimed tо prоvide security fоr multidimensiоnal data stоrage and prоcessing. We describe basic prоtоcоls fоr data read and write оperatiоns adоpted fоr the features оf multidimensiоnal data structures and security assumptiоns.
  • Публикация
    Только метаданные
    Post-quantum security of communication and messaging protocols: Achievements, challenges and new perspectives
    (2019) Bobrysheva, J.; Zapechnikov, S.; Запечников, Сергей Владимирович
    © 2019 IEEE Widely used communication and messaging protocols, e.g., TLS 1.3 and Signal, are insecure against an adversary with a quantum computer. We expect that post-quantum security will become mandatory for a new generation of cryptographic protocols in the nearest 10-15 years. The analysis of existing post-quantum secure cryptographic tools for key exchange, encryption and message authentication based on hard problems in codes, lattices, ring learning with errors and elliptic curve isogenies revealed their advantages and drawbacks. In particular, we conclude, that the main threat to communication and messaging protocols is only pre-quantum security of currently used Diffie-Hellman key exchange protocols. We summarize efficiency and safety results for each class of post-quantum cryptographic schemes and present an experimental implementation of isogeny-based Diffie-Hellman-like key exchange protocol as an illustration of their applicability.