
REDUCED INPUT REDUNDANCY WHILE PROVIDING THE STABILITY OF INFORMATION-ANALYTICAL SYSTEMS IN COMPENSATING THE EFFECTS CAUSED BY ATTACKER’S DESTRUCTIVE ACTIONS
Author(s) -
Sergei A. Dichenko,
Finko
Publication year - 2020
Publication title -
avtomatizaciâ processov upravleniâ
Language(s) - English
Resource type - Journals
ISSN - 1991-2927
DOI - 10.35752/1991-2927-2020-4-62-38-48
Subject(s) - hash function , computer science , redundancy (engineering) , secure hash algorithm , data redundancy , data integrity , cryptography , data mining , cryptographic hash function , computer security , database , sha 2 , operating system
The article describes the information and analytical systems (IAS), the main function of which is processing of large multidimensional arrays of information under conditions of destructive effects caused by attacker. Such conditions require the management of secure data storage. It ensures the data sent for storage by operator is identical to the one used by a decision-maker upon request. The authors propose the subsystem of data integrity control that uses cryptographic hash functions. The applied hash functions are based on the rules for constructing Pascal’s triangle. The paper shows that a distinguishing feature of the subsystem is reducing the input redundancy of control information at a given security level of data processed in the IAS, as well as ensuring new properties, such as the ability to control the integrity of not only the data to be secured, but also the reference hash codes. The article also gives a comparative assessment of the developed subsystem with known methods of data integrity control.