Solutions to build monitoring systems to prevent the spread of infectious diseases already exist and are developing rapidly in many countries around the world. In this regard, in the means of tracking contacts as the main subsystem of population monitoring, there are practical and theoretical tasks for the mechanisms of cryptographic protection of personal data of users, providing: efficiency; objectivity of decision-making; depersonalization; generalized processing, reliability, availability of decentralized storage. This section substantiates the criteria and indicators of the effectiveness of cryptographic protection mechanisms. In particular, general theoretical information on criteria and indicators for assessing the security of symmetric cryptocurrencies, hash functions, generation of pseudo-random sequences, asymmetric cryptographic transformations, etc. is presented. This section discusses general approaches that can be used to determine the criteria and performance indicators of cryptographic protection mechanisms for users’ personal data and interoperability protocols that provide various security services when tracking contacts with system users.
Criteria and Indicators of Efficiency of Cryptographic Protection Mechanisms
Kuznetsov
;
2022-01-01
Abstract
Solutions to build monitoring systems to prevent the spread of infectious diseases already exist and are developing rapidly in many countries around the world. In this regard, in the means of tracking contacts as the main subsystem of population monitoring, there are practical and theoretical tasks for the mechanisms of cryptographic protection of personal data of users, providing: efficiency; objectivity of decision-making; depersonalization; generalized processing, reliability, availability of decentralized storage. This section substantiates the criteria and indicators of the effectiveness of cryptographic protection mechanisms. In particular, general theoretical information on criteria and indicators for assessing the security of symmetric cryptocurrencies, hash functions, generation of pseudo-random sequences, asymmetric cryptographic transformations, etc. is presented. This section discusses general approaches that can be used to determine the criteria and performance indicators of cryptographic protection mechanisms for users’ personal data and interoperability protocols that provide various security services when tracking contacts with system users.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.