1 research outputs found
ΠΠ΅ΡΠΎΠ΄ΠΈ ΠΏΠΎΡΡΠΊΠ²Π°Π½ΡΠΎΠ²ΠΎΡ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΡΡ ΠΏΡΠΈ ΠΏΠ΅ΡΠ΅Π΄Π°Π²Π°Π½Π½Ρ Π΄Π°Π½ΠΈΡ Ρ ΠΌΠ΅ΡΠ΅ΠΆΠ°Ρ
ΠΠΎΡΡΠ½ΡΠ²Π°Π»ΡΠ½Π° Π·Π°ΠΏΠΈΡΠΊΠ° ΠΌΠ°Π³ΡΡΡΠ΅ΡΡΡΠΊΠΎΡ Π΄ΠΈΡΠ΅ΡΡΠ°ΡΡΡ ΡΠΊΠ»Π°Π΄Π°ΡΡΡΡΡ Π· ΡΠΎΡΠΈΡΡΠΎΡ
ΡΠΎΠ·Π΄ΡΠ»ΡΠ², ΠΌΡΡΡΠΈΡΡ 23 ΡΠΈΡΡΠ½ΠΊΠΈ, 24 ΡΠ°Π±Π»ΠΈΡΡ, 2 Π΄ΠΎΠ΄Π°ΡΠΊΠΈ ΡΠ° 98 Π΄ΠΆΠ΅ΡΠ΅Π».
ΠΠ±`ΡΠΊΡ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ:
ΡΠΈΡΡΠ΅ΠΌΠΈ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΡΡΠ½ΠΎΠ³ΠΎ Π·Π°Ρ
ΠΈΡΡΡ.
ΠΠ΅ΡΠ° Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ:
ΠΏΡΠ΄Π²ΠΈΡΠ΅Π½Π½Ρ ΡΠ²ΠΈΠ΄ΠΊΠΎΠ΄ΡΡ ΠΌΠ΅ΡΠ΅ΠΆΠ΅Π²ΠΈΡ
ΠΏΡΠΎΡΠΎΠΊΠΎΠ»ΡΠ², ΡΠΎ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΡΡΡΡ Π·Π°Ρ
ΠΈΡΡ Π΄Π°Π½ΠΈΡ
Π²ΡΠ΄ Π°ΡΠ°ΠΊ, ΡΠΎ ΡΠ΅Π°Π»ΡΠ·ΠΎΠ²Π°Π½Ρ Π·Π²ΠΈΡΠ°ΠΉΠ½ΠΈΠΌΠΈ ΡΠ° ΠΊΠ²Π°Π½ΡΠΎΠ²ΠΈΠΌΠΈ ΠΊΠΎΠΌΠΏ'ΡΡΠ΅ΡΠ°ΠΌΠΈ, ΠΏΡΠΈ ΠΏΠ΅ΡΠ΅Π΄Π°Π²Π°Π½Π½Ρ Π΄Π°Π½ΠΈΡ
ΠΌΠ΅ΡΠ΅ΠΆΠ΅Ρ, Π· Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½ΡΠΌ ΠΏΠΎΡΡΠΊΠ²Π°Π½ΡΠΎΠ²ΠΈΡ
ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΡΡΠ½ΠΈΡ
ΠΏΡΠΈΠΌΡΡΠΈΠ²ΡΠ².
ΠΡΠ°ΠΊΡΠΈΡΠ½Π° ΡΡΠ½Π½ΡΡΡΡ:
ΡΠΎΠ·ΡΠΎΠ±Π»Π΅Π½ΠΎ Ρ ΠΏΡΠΎΡΠ΅ΡΡΠΎΠ²Π°Π½ΠΎ ΠΊΠΎΠΌΡΠ½ΡΠΊΠ°ΡΡΠΉΠ½ΠΈΠΉ ΠΏΡΠΎΡΠΎΠΊΠΎΠ», ΡΠΎ ΠΏΡΠ°ΡΡΠ²Π°ΡΠΈΠΌΠ΅ ΡΠΊ Π·Ρ Π·Π²ΠΈΡΠ°ΠΉΠ½ΠΈΠΌΠΈ ΠΊΡΠΈΠΏΡΠΎΠ°Π»Π³ΠΎΡΠΈΡΠΌΠ°ΠΌΠΈ, ΡΠ°ΠΊ Ρ Π· ΠΏΠΎΡΡΠΊΠ²Π°Π½ΡΠΎΠ²ΠΈΠΌΠΈ Π±Π΅Π·ΠΏΠ΅ΠΊΠΎΠ²ΠΈΠΌΠΈ Π°Π»Π³ΠΎΡΠΈΡΠΌΠ°ΠΌΠΈ, ΠΏΠ΅ΡΠ΅ΠΊΠΈΠ΄Π°Ρ ΠΌΡΡΡΠΎΠΊ Π²ΡΠ΄ ΠΏΠΎΡΠΎΡΠ½ΠΎΡ Π΅ΡΠΈ ΡΡΠ°Π΄ΠΈΡΡΠΉΠ½ΠΎΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ Ρ ΠΏΠΎΡΡΠΊΠ²Π°Π½ΡΠΎΠ²Ρ Π΄ΠΎΠ±Ρ, Π΄Π΅ Π²ΡΠ΅ Π±ΡΠ»ΡΡΡ ΡΠΎΠ»Ρ ΡΡΠ°Π½ΡΡΡ Π³ΡΠ°ΡΠΈ ΠΊΠ²Π°Π½ΡΠΎΠ²Ρ ΠΊΠΎΠΌΠΏ'ΡΡΠ΅ΡΠΈ, ΡΠΎ Π½Π΅ΡΡΡΡ Π·Π°Π³ΡΠΎΠ·Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΡΠΉ Π±Π΅Π·ΠΏΠ΅ΡΡ Π·Π° ΡΠ°Ρ
ΡΠ½ΠΎΠΊ ΡΡΡΡΡΠ²ΠΎ Π·ΡΠΎΡΠ»ΠΎΡ ΠΏΡΠΎΠ΄ΡΠΊΡΠΈΠ²Π½ΠΎΡΡΡ.The explanatory note of the master's dissertation consists of four sections and includes 23 figures, 24 tables, 2 appendices, and 98 references.
The object of the research:
cryptographic protection systems.
The objective of the research:
to increase the speed of network protocols that provide data protection against attacks implemented by both classical and quantum computers during data transmission over the network using post-quantum cryptographic primitives.
Practical value:
developed and tested a communication protocol that will work with both conventional cryptographic algorithms and post-quantum security algorithms. It bridges the gap from the current era of traditional info security to the post-quantum era, where quantum computers will increasingly play a significant role. These quantum computers pose a threat to info security due to their significantly increased computing power