CASPIAN JOURNAL
MANAGEMENT AND HIGH TECHNOLOGIES
ANALYSIS OF CRYPTOGRAPHIC SECRET SHARING SCHEMES FOR BACKING UP KEY INFORMATION
Read | Nosirov Zafarzhon A., Shcherbinina Oksana V. ANALYSIS OF CRYPTOGRAPHIC SECRET SHARING SCHEMES FOR BACKING UP KEY INFORMATION // Caspian journal : management and high technologies. — 2019. — №2. — pp. 126-134. |
Nosirov Zafarzhon A. - undergraduate student, ORCID https://orcid.org/0000-0001-6858-1241, https://elibrary.ru/author_profile.asp?authorid=964195, Astrakhan State University, nosirovzafar@outlook.com
Shcherbinina Oksana V. - Cand. Sci. (Engineering), Assistant Professor, https://elibrary.ru/author_items.asp?authorid=159547, Astrakhan State University, oksana@asu.edu.ru
Modern information systems of organizations store and process a large amount of data, which protection involves the used key information. In most cases, different passwords, PIN codes, etc., are used as key information. If they are lost, access to information systems may be lost. Therefore, the tasks of safe storage/recovery are relevant. The article describes the main ways to solve problems related to the loss key information: backup and storage copies in various places; confidential storage of key information by several subscribers; use cryptographic secret sharing protocols. It was revealed that the most effective solution to the problem under consideration is the use of cryptographic secret sharing protocols. Considered modern types of computer attacks on these protocols. Also analyzed threshold secret sharing schemes, which are the basis of cryptographic secret sharing protocols. The analysis of threshold schemes was carried out on the basis parameters as: perfect, ideal, resource-intensive, and an estimate of the complexity algorithm. It is revealed that the threshold scheme of Shamir is perfect, ideal and less resource-intensive in comparison with other options.
Key words: схемы разделения секрета, разделение ключей, пороговые схемы разделения секрета, ключевая информация, восстановление ключевой информации, схема Шамира, secret sharing schemes, keys sharing, threshold secret sharing schemes, key information, backing up key