113

Operating systems belonging to the Linux family are somewhat more secure due
to the limited access to system files. However, because unlimited access is created when logged
in using the system administrator (root), it requires special encryption methods to keep some
data confidential. According to the level of data confidentiality, only the GOST 28147-89
standard is a highly durable encryption algorithm. Research objectives organization of data
protection in the operating system by encryption and archiving using the GOST 28147-89
algorithm, organization of encryption and decryption of system files during the initialization
process, development of software for encryption of the operating system file system and
evaluation of the efficiency of the graphics software package. The aim of the study is to develop
special methods and algorithms, as well as algorithms based on national encryption algorithms
that meet security requirements and meet the requirements of privacy standards.
In the course of the study, information security methods, the theory of algorithms,
mathematical methods, as well as ordered and object-oriented programming were used. The
practical significance of the research results lies in the development of an information security
system that meets the requirements of its own encryption algorithms GOST 28147-89 and can
be used in government or commercial institutions related to the use of its findings by
government and legal authorities to ensure the protection of confidential information. The
implementation of the results of the study will ensure the transition to a more reasonable and
targeted information security policy related to the use of user information systems and
technologies in the ministries and departments of the Republic of Uzbekistan. The practical
significance of the research results will ensure the transition to a more reasonable and targeted
information security policy related to the use of user information systems and technologies in
the ministries and departments of the Republic of Uzbekistan.
 

  • Internet ҳавола
  • DOI
  • UzSCI тизимида яратилган сана 25-04-2023
  • Ўқишлар сони 113
  • Нашр санаси 20-04-2023
  • Мақола тилиIngliz
  • Саҳифалар сони145-153
English

Operating systems belonging to the Linux family are somewhat more secure due
to the limited access to system files. However, because unlimited access is created when logged
in using the system administrator (root), it requires special encryption methods to keep some
data confidential. According to the level of data confidentiality, only the GOST 28147-89
standard is a highly durable encryption algorithm. Research objectives organization of data
protection in the operating system by encryption and archiving using the GOST 28147-89
algorithm, organization of encryption and decryption of system files during the initialization
process, development of software for encryption of the operating system file system and
evaluation of the efficiency of the graphics software package. The aim of the study is to develop
special methods and algorithms, as well as algorithms based on national encryption algorithms
that meet security requirements and meet the requirements of privacy standards.
In the course of the study, information security methods, the theory of algorithms,
mathematical methods, as well as ordered and object-oriented programming were used. The
practical significance of the research results lies in the development of an information security
system that meets the requirements of its own encryption algorithms GOST 28147-89 and can
be used in government or commercial institutions related to the use of its findings by
government and legal authorities to ensure the protection of confidential information. The
implementation of the results of the study will ensure the transition to a more reasonable and
targeted information security policy related to the use of user information systems and
technologies in the ministries and departments of the Republic of Uzbekistan. The practical
significance of the research results will ensure the transition to a more reasonable and targeted
information security policy related to the use of user information systems and technologies in
the ministries and departments of the Republic of Uzbekistan.
 

Муаллифнинг исми Лавозими Ташкилот номи
1 Ochilov N.N. researcher TUIT
Ҳавола номи
1 Q. Luo. Advancing computing, communication, control and management. “Springer Science & Business Media”, 2009. 290
2 Cryptographic conversion algorithm GOST 28147-89, IPK Standards. “Publishing House”, 1996.
3 Y. Qasmaoui., Y. Maleh., H. Abdelkrim. Secure software defined networks controller storage using Intel software guard extensions. “International journal of advanced computer science and applications”, 2020.
4 Algorithm for cryptographic transformation GOST 28147-89, IPK Standards. “Publishing House”, 1996.
5 V. Mao. Modern cryptography: theory and practice: trans. from English. “Publishing House”, 2005
6 V. Stallings. Cryptography and protection of networks: principles and practice: trans. from English. “Publishing House”, 2001.
7 N. Ferguson., B. Schneier. Practical cryptography: trans. from English. “Publishing House”, 2005.
8 K. Shannon. Communication theory in secret systems // Works on information theory and cybernetics: trans. from English. “Publishing house of foreign literature”, 1963. 333
9 B. Schneier. “Applied cryptography: protocols, algorithms, source texts in C: per. from English”, 2012.
10 GOST 28147—89 “Information processing systems. Cryptographic protection. “Algorithm for cryptographic transformation”, 2005
11 GOST R 34.13—2015 “Information technology. Cryptographic information protection. Modes of Operation of Block Ciphers ".ISO/IEC 18033-2:2006 Information technology. “Security techniques Encryption Algorithms Part 2: “Asymmetric ciphers”, 2006.
12 FIPS PUB 197. Federal Information Processing Standards Publication. “Advanced Encryption Standard (AES)”, 2001.
13 O. Andersson. “Threat, risk, and vulnerability analyses during the development of IT systems in the Swedish Armed Forces, Umeå University”, 2010.
14 R. Messier. “Operating system forensics, syngress”, 2017.
Кутилмоқда