Study of Cryptographic Security of Computer Networks

Keywords: cryptography, computer networks, symmetric encryption, asymmetric encryption, quantum cryptography, hash functions

Abstract

The article examines modern aspects of cryptographic protection of computer networks, which are critically important in the context of growing information threats and cyberattacks, in particular in the context of military operations in Ukraine. The key tasks related to ensuring the confidentiality, integrity, and availability of information, as well as the challenges facing cryptographic systems in the context of the rapid development of computing power and attack methods, are considered. The article contains an analysis of the historical development of cryptography, starting from its fundamental principles laid down by Claude Shannon, to modern methods such as symmetric and asymmetric encryption, hash functions, digital signatures, and public key infrastructure (PKI). Classical algorithms, including DES, 3DES, AES, RSA, ECC, as well as standards that demonstrate high efficiency in ensuring information security, are considered. A comparative analysis of these algorithms is conducted, their strengths and weaknesses are identified, in particular, taking into account modern challenges such as attacks based on machine learning and the development of quantum computing. Particular attention is paid to the latest threats, including Side-channel and Fault injection attacks that exploit side information or errors in cryptographic systems. These threats are becoming especially relevant for resource-intensive and embedded systems, as well as Internet of Things (IoT) devices. The article emphasizes the importance of developing post-quantum cryptographic algorithms that can provide protection against attacks that exploit the capabilities of quantum computers. It also discusses the need to improve symmetric and asymmetric encryption mechanisms, hash functions, and security protocols to increase their resistance to modern attacks. Based on the analysis, recommendations are proposed for developers of information protection systems aimed at increasing the effectiveness of computer network protection. Particular attention is paid to the implementation of integrated solutions that combine symmetric and asymmetric encryption, digital signatures, and modern cryptographic protocols to ensure multi-level security

References

1. Stallings W. (2016) Cryptography and Network Security: Principles and Practice. Pearson; 7th edition.
2. Phillips D.T. & Garcia-Diaz A. (1981) Fundamentals of Network Analysis. Prentice-Hall, Inc., Englewood Cliffs, N.J.
3. Dymova, H. (2021). Analiz metodiv otsinky efektyvnosti system fizychnoho zakhystu [Analysis of methods for assessing the effectiveness of physical protection systems]. Computer-Integrated Technologies: Education, Science, Production, (45), 12-18.
4. Dymova H. (2024) Development of a Software Application Algorithm for Solving Computer Network Optimization Problems. Débats scientifiques et orientations prospectives du développement scientifique: c avec des matériaux de la VI conférence scientifique et pratique internationale, Paris, 1er Mars 2024. Paris-Vinnytsia: La Fedeltà & UKRLOGOS Group LLC.
5. Dymova, H. (2023). Application of Fast Fourier Transform to the Speech Signals Scrambling. Computer-Integrated Technologies: Education, Science, Production, (53), 44-49.

Abstract views: 42
PDF Downloads: 21
Published
2025-02-13
How to Cite
Dymova , H. (2025). Study of Cryptographic Security of Computer Networks. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (57), 15-19. https://doi.org/10.36910/6775-2524-0560-2024-57-02
Section
Computer science and computer engineering