The article deals with the problems of high dimension in the theory of information security management. Along with the study of mathematical Methods of cryptography (algebraic, number-theoretic, combinatorial, etc.), a new direction that can be called mathematical cryptography. Basic concepts of mathematical cryptography are a one-way function, a pseudo-random generator, and a zero knowledge proof. They allow build new mathematical models that are more adequate reflect the objectives of cryptography. In this case, purely mathematical formulations of problems work, and mathematical cryptography gets its own apparatus and its internal stimuli for development. The main tasks of mathematical cryptography are initially difficult, and some of them are essentially long-known unsolved mathematical problems. Bottom problem computational complexity estimates - serious progress in its solution will allow to substantiate the stability of mathematical models of most ciphers. Mathematical cryptography represents the science mainly of computational complexity of tasks from some special classes.
Skip Nav Destination
Article navigation
22 June 2022
PROCEEDINGS OF THE II INTERNATIONAL CONFERENCE ON ADVANCES IN MATERIALS, SYSTEMS AND TECHNOLOGIES: (CAMSTech-II 2021)
29–31 July 2021
Krasnoyarsk, Russian Federation
Research Article|
June 22 2022
Solution of the problem of distribution of resources allocated to ensure the information security of the enterprise by methods of iterative aggregation
T. Grobova;
T. Grobova
a)
1
Federal State Autonomous Educational Institution of Higher Education North-Caucasus Federal University
, Stavropol, Russia
Search for other works by this author on:
N. Kononova;
N. Kononova
b)
1
Federal State Autonomous Educational Institution of Higher Education North-Caucasus Federal University
, Stavropol, Russia
b)Corresponding author: [email protected]
Search for other works by this author on:
Ya. Agakhanova;
Ya. Agakhanova
c)
2
Moscow Institute of physics and technology
, Moscow, Russia
Search for other works by this author on:
S. Grobova;
S. Grobova
d)
1
Federal State Autonomous Educational Institution of Higher Education North-Caucasus Federal University
, Stavropol, Russia
Search for other works by this author on:
Z. Laipanova
Z. Laipanova
e)
3
Karachay-Cherkess State University named after U. D. Aliyev
, Karachayevsk, Russia
Search for other works by this author on:
b)Corresponding author: [email protected]
AIP Conf. Proc. 2467, 060045 (2022)
Citation
T. Grobova, N. Kononova, Ya. Agakhanova, S. Grobova, Z. Laipanova; Solution of the problem of distribution of resources allocated to ensure the information security of the enterprise by methods of iterative aggregation. AIP Conf. Proc. 22 June 2022; 2467 (1): 060045. https://doi.org/10.1063/5.0092544
Download citation file:
Pay-Per-View Access
$40.00
Sign In
You could not be signed in. Please check your credentials and make sure you have an active account and try again.
16
Views
Citing articles via
Inkjet- and flextrail-printing of silicon polymer-based inks for local passivating contacts
Zohreh Kiaee, Andreas Lösel, et al.
Effect of coupling agent type on the self-cleaning and anti-reflective behaviour of advance nanocoating for PV panels application
Taha Tareq Mohammed, Hadia Kadhim Judran, et al.
Students’ mathematical conceptual understanding: What happens to proficient students?
Dian Putri Novita Ningrum, Budi Usodo, et al.
Related Content
Modeling the adsorption of fluorine by a carbon polymer surface
AIP Conference Proceedings (June 2022)
Application of optimization methods during construction of info communication systems
AIP Conf. Proc. (March 2024)
An investigation and analysis of methods and applications of skein mining
AIP Conference Proceedings (July 2021)
Implementation of marker-based tracking for Lontar Prasi balinese character recognition in augmented reality
AIP Conf. Proc. (March 2024)
Comparative study of the phases of ethical hacking and the phases of cyber kill chain
AIP Conf. Proc. (January 2023)