Development of Models and Algorithms for Improving the Reliability of Transfer of Information Based on the Application of Cryptographic Methods to the Distributed Register Technology
While all spheres of society are developing rapidly, information technology is also rapidly being implemented in all spheres. The ever-growing information flow in modern society, the diversity of information technologies, the complexity of tasks solved on a computer, have set a number of tasks for users of these technologies. Currently, due to the large number of data streams, the need to process this data in a short period is also growing. Due to a large number of data streams for their storage and processing in the shortest possible time, it is required to create automated systems. This research paper presents algorithms for solving the problem of increasing data flow by forming a distributed database. Based on this, methods for optimizing the storage and processing of data in computer networks are presented. A distributed registry and cryptographically sensitive data processed by blockchain technology are considered. The application of block cryptographic encryption methods to distributed registry technologies is investigated. A model for the use of alphabetical cryptographic methods has been developed to ensure the reliability of data transfer within network systems. The alphabet crypto-algorithm is based on Diophantine sets. Based on the analysis of previously proposed backpack models, the qualitative features of non-standard backpack systems have been identified that increase their resistance to known attacks. A mathematical model of a polyalphabetic cryptosystem is proposed, in which the algorithm for the inverse transformation of closed text is reduced to an algorithmically insoluble problem for the analyst. The advantage of a distributed database is that data is stored in a blockchain, and each copy of the data is stored in the main database. If a certain part of the data chain is damaged, this part of the chain restores its activity using the main database. If the main database is damaged, the main database restores its activity using the data contained in the data chain. Thanks to this process, it is possible to ensure the security of the database.