Next Article in Journal
Two Variables Shivley’s Matrix Polynomials
Next Article in Special Issue
Relativistic Neutron Stars: Rheological Type Extensions of the Equations of State
Previous Article in Journal
Laplace Adomian Decomposition Method for Multi Dimensional Time Fractional Model of Navier-Stokes Equation
Previous Article in Special Issue
The Ambiguity in the Definition and Behavior of the Gravitational and Cosmological ‘Coupling Constants’ in the Theory of Induced Gravity
Article Menu
Issue 2 (February) cover image

Export Article

Open AccessArticle
Symmetry 2019, 11(2), 150; https://doi.org/10.3390/sym11020150

Information Security Methods—Modern Research Directions

Department of Security, Tomsk State University of Control Systems and Radioelectronics, 40 Lenina Prospect, 634050 Tomsk, Russia
*
Author to whom correspondence should be addressed.
Received: 11 December 2018 / Revised: 16 January 2019 / Accepted: 18 January 2019 / Published: 29 January 2019
(This article belongs to the Special Issue Symmetry: Anniversary Feature Papers 2018)
Full-Text   |   PDF [1626 KB, uploaded 29 January 2019]   |  

Abstract

In Tomsk University of Control Systems and Radioelectronics (TUSUR) one of the main areas of research is information security. The work is carried out by a scientific group under the guidance of Professor Shelupanov. One of the directions is the development of a comprehensive approach to assessing the security of the information systems. This direction includes the construction of an information security threats model and a protection system model, which allow to compile a complete list of threats and methods of protection against them. The main directions of information security tools development are dynamic methods of biometrics, methods for generating prime numbers for data encryption, steganography, methods and means of data protection in Internet of Things (IoT) systems. The article presents the main results of research in the listed areas of information security. The resultant properties in symmetric cryptography are based on the properties of the power of the generating functions. The authors have obtained symmetric principles for the development of primality testing algorithms, as discussed in the Appendix. View Full-Text
Keywords: symmetry; model of information security system; threat model; biometric authentication; neural networks; encryption; primes; digital object authenticity; steganography; automated control systems; secure communication channels symmetry; model of information security system; threat model; biometric authentication; neural networks; encryption; primes; digital object authenticity; steganography; automated control systems; secure communication channels
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Shelupanov, A.; Evsyutin, O.; Konev, A.; Kostyuchenko, E.; Kruchinin, D.; Nikiforov, D. Information Security Methods—Modern Research Directions. Symmetry 2019, 11, 150.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Symmetry EISSN 2073-8994 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top