The article deals with the problems of high dimension in the theory of information security management. Along with the study of mathematical Methods of cryptography (algebraic, number-theoretic, combinatorial, etc.), a new direction that can be called mathematical cryptography. Basic concepts of mathematical cryptography are a one-way function, a pseudo-random generator, and a zero knowledge proof. They allow build new mathematical models that are more adequate reflect the objectives of cryptography. In this case, purely mathematical formulations of problems work, and mathematical cryptography gets its own apparatus and its internal stimuli for development. The main tasks of mathematical cryptography are initially difficult, and some of them are essentially long-known unsolved mathematical problems. Bottom problem computational complexity estimates - serious progress in its solution will allow to substantiate the stability of mathematical models of most ciphers. Mathematical cryptography represents the science mainly of computational complexity of tasks from some special classes.

1.
A.I.
Borodin
,
Models and methods of resource allocation in networks with ordered events in project management
(
Voronezh
,
2012
).
2.
M.
Ingle
,
M.
Atique
and
S.O.
Dahad
,
International Journal of Advanced Engineering Technology
II
(
III
)
96
99
(
2011
).
3.
T.
Grobova
,
A.
Troyanov
,
V.
Antonov
and
V.
Lysov
,
CEUR Workshop Proceedings
2017
84
91
.
4.
T.A.
Grobova
,
A.V.
Pilipenko
and
I.V.
Denisenko
, Collection “
Infocommunication technologies in science, production and education (Infocom-6
)”. (
Sixth International Scientific and Technical Conference
,
2014
). pp.
96
99
.
5.
E.A.
Nekrasova
,
E.A.
Chaika
and
T.A.
Grobova
,
Collection of reports of the XXIII plenum of the FUMO VO IB and the All-Russian scientific conference “Fundamental problems of information security in the context of digital transformation” (INFOSE-2019)
. reports of the
XXIII plenum of FUMO VO IB and the All-Russian scientific conference
,
2019
. pp.
115
121
.
6.
V.S.
Zavodnov
and
T.A.
Grobova
, Collection of reports of the XXIII plenum of the FUMO VO IS and the All-Russian scientific conference “
Fundamental problems of information security in the context of digital transformation
” (
INFOSECURITY
,
2019
). pp.
79
81
.
7.
L.Y.
Trevor
,
The Handbook of Project Management: a practical guide to effective policies, techniques and processes
(
London
:
Kogan Page
,
2007
).
8.
Worldwide IT Project and Portfolio Management 2014–2018
Forecast and 2013 Vendor Shares: Continuing Growth at Lesser Levels as IT Project Complexity Drives Demand
http://www.idc.com/getdoc.jsp?containerId=253377
9.
O.
Zwikael
,
International Journal of Production Research
44
(
17
)
3433
3449
(
2016
).
10.
O.V.
Kosenko
,
E.D.
Sinyavskaya
.,
E.A.
Shestova
,
E.Yu.
Kosenko
and
S. O.
Antipin
,
Proceedings XIX IEEE International Conference on Soft Computing and Measurements
(
SCM
,
2016
) pp.
186
189
.
11.
A.
Rushton
,
Ph.
Croucher
and
P.
Baker
,
The Handbook of Logistics and Distribution Management: Understanding the Supply Chain
(
Kogan Page
,
2014
).
12.
S.P.
Anbuudayasankar
,
K.
Ganesh
,
S.
Mohapatra
,
Models for Practical Routing Problems in Logistics: Design and Practices
(
Springer International Publishing
,
Switzerland
,
2014
).
13.
B.M.
Ayyub
,
Risk Analysis in Engineering and Economics
(
N.-Y
.:
Chapman and Hall/CRC
,
2014
).
This content is only available via PDF.
You do not currently have access to this content.