Formation of a New Conception and a Paradigm of Constructing Cybersecurity Systems

  • PDF / 85,504 Bytes
  • 5 Pages / 594 x 792 pts Page_size
  • 64 Downloads / 157 Views

DOWNLOAD

REPORT


FORMATION OF A NEW CONCEPTION AND A PARADIGM OF CONSTRUCTING CYBERSECURITY SYSTEMS

V. V. Khilenko

UDC 004.4

Abstract. A new conception and a paradigm are formulated for constructing cybersecurity systems adequate to the threats of unauthorized decoding with existing and predicted capacities of supercomputers and neural networks. The need is substantiated for transition to constructing and using cybersecurity systems that in modern conditions satisfy the formulated principles and provisions. Keywords: cybersecurity, conception, paradigm, supercomputer, neural network.

The existing ideology of constructing cybersecurity systems and the paradigm of creating the corresponding mathematical, technical, and technological implementations of this class of systems took shape more than 35 years ago, in the time, which can be conditionally called the “pre-computer era.” The publication of the Diffie–Hellman technology [1] in 1976 and the emergence of the asymmetric RSA encryption protocol stipulated the construction of first cyber protection systems implementing the following ideology proposed in [1]: the formation of a private key (whose determination is a laborious problem) without its transmission through an open communication channel. The obtained scientific and technical results and the need for increasing cryptostrength predetermined the further development of cyber protection systems in the direction of increasing the amount of computations necessary for unauthorized decoding of information. One of the most well-known approaches to increasing the cryptostrength of the encryption methods being used is the increase in the length of key. The corresponding technological changes were made at some time intervals of maintenance of cyber protection systems in definite correlation with increasing the performance of hardware tools destined for “cracking” ciphers with the refinement “in reasonable time.” Another frequently used technological operation for increasing the cryptostrength of systems for protection of electronic information consists of changing (with a definite time interval) the encryption key (or the cipher) used in the process of transmission of confidential information. Note that the mentioned methods that improve cryptostrength and considerably increase the amount of computational operations required for unauthorized access to confidential information influence only the quantitative increase in the workload of hackers and, hence, must ensure an increase in decoding time until the moment when the transmitted coded information loses its value. This logic of increasing the cryptostrength of encryption systems was adequate to the period that can be conditionally called the period of “uniformly accelerated development” of computing facilities. However, the exponential acceleration occurred in recent years in developing the performance of computer systems casts doubt on the expediency of further construction of cyber protection systems based on the approaches mentioned earlier. The validity of such an inference is c