• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site
  • HSE University
  • Publications of HSE
  • Book chapters
  • An Architecture Model for Active Cyber Attacks on Intelligence Info-communication Systems:Application Based on Advance System Encryption(AES-512) Using Pre-Encrypted Search Table and Pseudo-Random Functions(PRFs)

Book chapter

An Architecture Model for Active Cyber Attacks on Intelligence Info-communication Systems:Application Based on Advance System Encryption(AES-512) Using Pre-Encrypted Search Table and Pseudo-Random Functions(PRFs)

P. 1-5.
Nazarov A., Alireza Nik Aein K.

Recently, obtaining security in info-communication systems becoming the most globally used method of data security for communications through unprotected channels. Although however, cyber-security is one of the most critical economic and national security challenges. Life has become more subjected on Internet-based tools, and there is a growing demand for a cyber-security centre to gain safe structure, and cyber-space development. Information is a principal element in the info-communication system, where trusted service providers have a security system in place to prevent, support and protect their data against malicious attack or theft of information. To encrypt data with the larger size, mostly symmetric key encryption is using like advanced encryption standard (AES). This paper, is dealing first, with the characteristics of data that can be addressed to the cyber attacks. Secondly, a formal definition model is applied to improve the performance of the application where session keys are used to communicate using a pre-encrypted search table approach. The approach is suitable for programs that communicate in session mode and the key does not change frequently.