№2, 2024

JUSTIFICATION OF ENCRYPTION ALGORITHM FOR SYSTEMS MONITORING PERSONNEL CONDITION OF CRITICAL INFORMATIZATION OBJECTS

Olga Boiprav, Oleg Zelmanski, Mehman Hasanov, Ekaterina Makarenya

The necessity of developing of systems for monitoring the physical condition of personnel at critical informatization objects is substantiated. It is shown that one of the technical problems that must be solved when developing such systems is ensuring the confidentiality and integrity of information processed within these systems. The solution to this problem is based on the selection and implementation of an encryption algorithm characterized by high performance. The encryption algorithm for systems for monitoring the physical condition of personnel at critical informatization objects must be characterized by high performance due to the need to minimize the impact of the functioning of these systems on the processes implemented within these objects. In this regard, the authors of the article conducted research aimed at determining the performance of the encryption algorithms Mars, AES (Rijndel), and Twofish, as well as their RSA add-ons. The dependence of the performance of the listed algorithms on the size and extension of the files encrypted using them, as well as the characteristics of the platform on which the encryption is performed, has been established. Recommendations have been made for the use of the studied algorithms in systems for monitoring the physical condition of personnel at critical informatization objects (pp.3-8).

Keywords: Encryption, Access control, Critical informatization object, Physical condition indicator, Blood alcohol content, Pulse Saturation
References

Altigani, A., Hasan, S., Shamsuddin, S. M., & Barry, B. (2019). A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite. Journal of Information Security and Applications, 46, 210-221. https://doi.org/10.1016/j.jisa.2019.03.013

Ahmed, F., & Elkamchouchi, D. H. (2022). A new modified MARS cryptosystem based on niho exponent with an enhanced S-box generation. Electronics, 11(15), 2318. https://doi.org/10.3390/electronics11152318.

Assa-Agyei, K., & Olajide, F. (2023). A comparative study of Twofish, Blowfish, and Advanced Encryption Standard for secured data transmission. International Journal of Advanced Computer Science and Applications, 14 (3), 393-398.

Ghosh, A. (2020). Comparison of encryption algorithms: AES, Blowfish and Twofish for security of wireless networks. International Research Journal of Engineering and Technology, 07(06), 4656-4659.

Gautam, S., Singh, S., & Singh, H. (2019). A comparative study and analysisof cryptographic algorithms: RSA, DES, AES, Blowfish, 3-DES, and Twofish. International Journal of Research in Electronics and Computer Engineering, 7 (1), 2019.

Khan, A. A., & Por, L. Y. (2024). Special issue on information security and cryptography: the role of advanced digital technology. Applied Sciences, 14(5), 2045. https://doi.org/10.3390/app14052045.

Manthey, J., Hassan, S. A., Carr, S., Kilian, C., Kuitunen-Paul, S., Rehm, J. (2021). What are the economic costs to society attributable to alcohol use? A systematic review and modelling study. Pharmacoeconomics, 39, 809-822. https://doi.org/10.1007/s40273-021-01031-8.

Ryabko, B. Y. (2018). Cryptography in the information world. Moscow, 302 p. (In Russian)

Saieed, A. H., & Hattab, A. A. (2023). Modifications and improvements to the Twofish encryption algorithm: a review. AIP Conference Proceedings, 2834, 050007. https://doi.org/10.1063/5.0161502.

Stoklosa, I., Więckiewicz, G., Stoklosa, M., Piegza, M., Pudlo, R., Gorczyca, P. (2023) Medications for the treatment of alcohol dependence-current state of knowledge and future perspectives from a public health perspective. International Journal of Environmental Research and Public Health, 20(3), 1870. https://doi.org/10.3390/ijerph20031870.

Wahid, M. N. A., Ali, A., Esparham, B., & Marwan, M. (2018). A comparison of cryptographic algorithms: DES,  3DES, AES, RSA and Blowfish for Guessing Attacks Prevention. Journal of Computer Science Applications and Information Technology, 3(2), 1-7.

Xing, B., Wang, D. D., Yang, Y., Wei, Z., Wu, J., & He, C. (2021). Accelerating DES and AES algorithms for a heterogeneous many-core processor. International Journal Parallel Programming, 49 (3), 463-486. https://doi.org/10.1007/s10766-021-00692-4.

Zelmanski, O. B. (2024). System for remote monitoring and management of mobile and stationary objects and controlling of alcohol content in the blood of the personnel of these objects Medicine and High Technologies, 2, 22-29. (In Russian) https://doi.org/10.34219/2306-3645-2024-14-2-22-29

Zelmanski, O. B. (2023). Technical support for the application of the normoxic therapeutic compression method in drug treatment practice Medicine and High Technologies, 4, 34-39. (In Russian) https://doi.org/10.34219/2306-3645-2023-13-4-34-39

Zelmanski, O. B. (2017). Device for measuring oxygen saturation of human arterial hemoglobin and heart rate Official Bulletin, 2(115), 174. (In Russian)