Solutions to build monitoring systems to prevent the spread of infectious diseases already exist and are developing rapidly in many countries around the world. In this regard, in the means of tracking contacts as the main subsystem of population monitoring, there are practical and theoretical tasks for the mechanisms of cryptographic protection of personal data of users, providing: efficiency; objectivity of decision-making; depersonalization; generalized processing, reliability, availability of decentralized storage. This section substantiates the criteria and indicators of the effectiveness of cryptographic protection mechanisms. In particular, general theoretical information on criteria and indicators for assessing the security of symmetric cryptocurrencies, hash functions, generation of pseudo-random sequences, asymmetric cryptographic transformations, etc. is presented. This section discusses general approaches that can be used to determine the criteria and performance indicators of cryptographic protection mechanisms for users’ personal data and interoperability protocols that provide various security services when tracking contacts with system users.

Criteria and Indicators of Efficiency of Cryptographic Protection Mechanisms

Kuznetsov
;
2022-01-01

Abstract

Solutions to build monitoring systems to prevent the spread of infectious diseases already exist and are developing rapidly in many countries around the world. In this regard, in the means of tracking contacts as the main subsystem of population monitoring, there are practical and theoretical tasks for the mechanisms of cryptographic protection of personal data of users, providing: efficiency; objectivity of decision-making; depersonalization; generalized processing, reliability, availability of decentralized storage. This section substantiates the criteria and indicators of the effectiveness of cryptographic protection mechanisms. In particular, general theoretical information on criteria and indicators for assessing the security of symmetric cryptocurrencies, hash functions, generation of pseudo-random sequences, asymmetric cryptographic transformations, etc. is presented. This section discusses general approaches that can be used to determine the criteria and performance indicators of cryptographic protection mechanisms for users’ personal data and interoperability protocols that provide various security services when tracking contacts with system users.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11389/70956
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact