Персона:
Запечников, Сергей Владимирович

Загружается...
Profile Picture
Email Address
Birth Date
Организационные подразделения
Организационная единица
Институт интеллектуальных кибернетических систем
Цель ИИКС и стратегия развития - это подготовка кадров, способных противостоять современным угрозам и вызовам, обладающих знаниями и компетенциями в области кибернетики, информационной и финансовой безопасности для решения задач разработки базового программного обеспечения, повышения защищенности критически важных информационных систем и противодействия отмыванию денег, полученных преступным путем, и финансированию терроризма.
Статус
Фамилия
Запечников
Имя
Сергей Владимирович
Имя

Результаты поиска

Теперь показываю 1 - 10 из 15
  • Публикация
    Только метаданные
    The Relevance of Using Post-quantum Cryptography on the Isogenies of Elliptic Curves for Mobile Application Protection
    (2020) Bobrysheva, J.; Zapechnikov, S.; Запечников, Сергей Владимирович
    © 2020, Springer Nature Switzerland AG.The article is a brief overview of the relevance of using cryptographic protocols on isogenies of elliptic curves in mobile applications. The article briefly describes the current situation in the field of cryptography that has arisen in connection with the development of a new generation of computer technology, namely, quantum computers. The article describes the stages of standardization of post-quantum cryptography in accordance with the NIST competition. The article contains a comparison of post-quantum algorithms in terms of cryptographic stability and speed, defines of advantages and disadvantages of protocols on isogenies of elliptic curves, and results of studies on the implementation of the protocols on isogenies of elliptic curves on mobile platforms. The main goal of the article is to consider the possibility of using protocols on the isogeny of elliptic curves for practical purposes to protect confidential information in mobile systems and applications.
  • Публикация
    Только метаданные
    Protocols for Secure Management of Multidimensional Data Arrays
    (2019) Gorlatykh, A.; Zapechnikov, S.; Запечников, Сергей Владимирович
    Popular technologies such as data mining and online analytical processing are widely known as technologies heavy-based on the usage of multidimensional data structures. However, at the same time, development of the security countermeasures leaves much to be desired. Currently, there is no complex multidimensional data processing system capable to ensure proper security levels exist. In the paper, we propose security protocols which formed the basis of our solution aimed to provide security for multidimensional data storage and processing. We describe basic protocols for data read and write operations adopted for the features of multidimensional data structures and security assumptions.
  • Публикация
    Только метаданные
    Techniques for Private Transactions in Corporate Blockchain Networks
    (2021) Konkin, A.; Zapechnikov, S.; Запечников, Сергей Владимирович
    © 2021 IEEE.Blockchain platforms are generally applied to automate operations using a trusted environment with broadcast messaging and distributed data storing. At the same time corporates still have business requirements to also send confidential peer-to-peer messages or private transactions. Mainly these requirements derive from the law obligations (bank secrecy, GDPR, etc.) and the necessity to protect competitive market advantages. Blockchain platforms for public networks ignore requirements for private transactions due to user anonymity and the absence of personal data in blockchain networks. Enterprise blockchain platforms for corporate networks mostly address confidential issues by transferring private data through trusted third parties (TTP) or intermediaries, and off-chain peer-to-peer messaging. However, these approaches miss core blockchain advantages of a trusted environment-immutability and integrity of private data. This article introduces a new technique and its implementation of private transactions in a blockchain that is based on both off-chain peer-to-peer messaging with confidential data and broadcast transactions that contain hashes of private data to verify immutability and integrity. The article provides technical details of the method, also performance issues are discussed.
  • Публикация
    Только метаданные
    Post-quantum Group Key Agreement Scheme
    (2021) Bobrysheva, J.; Zapechnikov, S.; Запечников, Сергей Владимирович
    © 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG.Progress in quantum technologies forces the development of new cryptographic primitives that are resistant to attacks of an adversary with a quantum computer. A large number of key establishment schemes have been proposed for two participants, but the area of group post-quantum key establishment schemes has not been studied a lot. Not so long ago, an isogeny-based key agreement scheme was proposed for three participants, based on a gradual increase in the degree of the key. We propose another principle for establishing a key for a group of participants using a tree-structure. The proposed key establishment scheme for four participants uses isogeny of elliptic curves as a mathematical tool.
  • Публикация
    Только метаданные
    Post-quantum Secure Group Messaging
    (2021) Bobrysheva, J.; Zapechnikov, S.; Запечников, Сергей Владимирович
    © 2021 IEEE.Due to development in quantum computing, we need to create and implement new cryptographic protocols, which are resistant to attacks using a quantum computer, in all practical cases. Last years humans became using messengers to transfer far more important information than earlier, so it is necessary to create new post-quantum secure messaging protocols for peer-to-peer and group communications. In this article, we describe needed security properties, existing ways for the creation of group chats, and our suggestions. We described ways and needed primitives for the creation of a group key establishment scheme based on isogenies of elliptic curves. We describe such protocol as an extended Double Ratchet protocol.
  • Публикация
    Только метаданные
    Secure multi-party computations for privacy-preserving machine learning
    (2022) Zapechnikov, S.; Запечников, Сергей Владимирович
  • Публикация
    Только метаданные
    Post-quantum security of communication and messaging protocols: Achievements, challenges and new perspectives
    (2019) Bobrysheva, J.; Zapechnikov, S.; Запечников, Сергей Владимирович
    © 2019 IEEE Widely used communication and messaging protocols, e.g., TLS 1.3 and Signal, are insecure against an adversary with a quantum computer. We expect that post-quantum security will become mandatory for a new generation of cryptographic protocols in the nearest 10-15 years. The analysis of existing post-quantum secure cryptographic tools for key exchange, encryption and message authentication based on hard problems in codes, lattices, ring learning with errors and elliptic curve isogenies revealed their advantages and drawbacks. In particular, we conclude, that the main threat to communication and messaging protocols is only pre-quantum security of currently used Diffie-Hellman key exchange protocols. We summarize efficiency and safety results for each class of post-quantum cryptographic schemes and present an experimental implementation of isogeny-based Diffie-Hellman-like key exchange protocol as an illustration of their applicability.
  • Публикация
    Только метаданные
    Prоtоcоls fоr secure management оf multidimensiоnal data arrays
    (2019) Gorlatykh, A.; Zapechnikov, S.; Запечников, Сергей Владимирович
    © 2019 IEEE Pоpular technоlоgies such as data mining and online analytical prоcessing are widely knоwn as technоlоgies heavy-based оn the usage оf multidimensiоnal data structures. Hоwever, at the same time, develоpment оf the security cоuntermeasures leaves much tо be desired. Currently, there is nо cоmplex multidimensiоnal data prоcessing system capable tо ensure prоper security levels exist. In the paper, we prоpоse security prоtоcоls which fоrmed the basis оf оur sоlutiоn aimed tо prоvide security fоr multidimensiоnal data stоrage and prоcessing. We describe basic prоtоcоls fоr data read and write оperatiоns adоpted fоr the features оf multidimensiоnal data structures and security assumptiоns.
  • Публикация
    Только метаданные
    Zero knowledge proof and ZK-SNARK for private blockchains
    (2023) Konkin, A.; Zapechnikov, S.; Запечников, Сергей Владимирович
  • Публикация
    Только метаданные
    Post-quantum security of messengers: secure group chats and continuous key distribution protocols
    (2023) Bobrysheva, J.; Zapechnikov, S.; Запечников, Сергей Владимирович
    Secure group chats in messengers are usually created in two ways: using pairwise channels with continuous key agreement according to the Double Ratchet scheme or using special cryptographic protocols, for example, based on a tree-like scheme for group keys generating. In the first case, each pair of users generates a common key, and the group is formed by the system tools. In the second case, all users of the group collectively generate an iteratively updated shared secret. Both methods have their advantages and disadvantages. If the first method is characterized by high overhead costs for storing and transferring key information, then in the second case, it is not possible to achieve such important security properties for instant messengers as post-compromise security and forward secrecy. However, the post-quantum resistance of these protocols remains unexplored. The article analyzes the existing group chat protocols for classical and post-quantum security. This work identifies the cryptographic primitives and protocol organization methods leading to decreasing cryptographic resistance to attacks using a quantum computer. The article proposes protocols resistant to adversary attacks with a quantum computer and discusses the possibilities of their application. The adversary model and the attack model are expanded and formally described considering attacks using a quantum computer. The main results of the work are secure group messaging protocols secure against attacks using a quantum computer, based on modifications of the tree-like schemes of continuous key agreement. The paper provides the specifications of the developed protocols. Possible technical difficulties in the implementation of post-quantum-resistant group messengers are identified, and directions for further research are outlined. © 2022, The Author(s), under exclusive licence to Springer-Verlag France SAS, part of Springer Nature.