{"id":1580,"date":"2021-01-16T18:02:17","date_gmt":"2021-01-16T16:02:17","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=1580"},"modified":"2021-05-17T14:37:22","modified_gmt":"2021-05-17T11:37:22","slug":"%d0%bc%d0%b5%d1%82%d0%be%d0%b4-%d0%ba%d0%be%d0%bd%d1%82%d1%80%d0%be%d0%bb%d1%8e-%d1%86%d1%96%d0%bb%d1%96%d1%81%d0%bd%d0%be%d1%81%d1%82%d1%96-%d0%ba%d0%be%d0%bd%d1%84%d1%96%d0%b4%d0%b5%d0%bd%d1%86","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=1580","title":{"rendered":"\u041c\u0435\u0442\u043e\u0434 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044e \u0446\u0456\u043b\u0456\u0441\u043d\u043e\u0441\u0442\u0456 \u043a\u043e\u043d\u0444\u0456\u0434\u0435\u043d\u0446\u0456\u0439\u043d\u0438\u0445 \u0434\u0430\u043d\u0438\u0445 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0456 \u0444\u0443\u043d\u043a\u0446\u0456\u0439 \u0445\u0435\u0448\u0443\u0432\u0430\u043d\u043d\u044f"},"content":{"rendered":"<p style=\"text-align: center;\">\u041c\u0415\u0422\u041e\u0414 \u041a\u041e\u041d\u0422\u0420\u041e\u041b\u042e \u0426\u0406\u041b\u0406\u0421\u041d\u041e\u0421\u0422\u0406 \u041a\u041e\u041d\u0424\u0406\u0414\u0415\u041d\u0426\u0406\u0419\u041d\u0418\u0425 \u0414\u0410\u041d\u0418\u0425 \u041d\u0410 \u041e\u0421\u041d\u041e\u0412\u0406 \u0424\u0423\u041d\u041a\u0426\u0406\u0419 \u0425\u0415\u0428\u0423\u0412\u0410\u041d\u041d\u042f<\/p>\n<p style=\"text-align: center;\">METHOD FOR CONTROL INTEGRITY OF CONFIDENTIAL DATA BASED ON HASH FUNCTIONS<\/p>\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/32-7.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" \/><\/a> <strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 7-11. \u041d\u043e\u043c\u0435\u0440: \u21164, 2019 (275)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438: <\/strong><br \/>\n\u041e.\u0412. \u041e\u0413\u041d\u0404\u0412\u0418\u0419, \u041e.\u0406. \u0410\u041a\u0410\u0422\u041e\u0412, \u0412.\u041f. \u041d\u0415\u0417\u0414\u041e\u0420\u041e\u0412\u0406\u041d<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nO.V. OHNIEVYI, O.I. AKATOV, V.P. NEZDOROVIN<br \/>\nKhmelnytskyi National University<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2019-275-4-7-11\">https:\/\/www.doi.org\/10.31891\/2307-5732-2019-275-4-7-11<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 05.06.2019 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 17.07.2019 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412\u0456\u0434\u043c\u043e\u0432\u0438 \u0430\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0456 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f, \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0456\u043e\u043d\u043e\u0432\u0430\u043d\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f, \u0445\u0430\u043a\u0435\u0440\u0441\u044c\u043a\u0456 \u0430\u0442\u0430\u043a\u0438 \u2013 \u0446\u0435 \u0442\u0456 \u0437\u0430\u0433\u0440\u043e\u0437\u0438, \u0434\u043b\u044f \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0432\u0456\u0434 \u044f\u043a\u0438\u0445 \u043f\u0440\u0438\u043a\u043b\u0430\u0434\u0430\u044e\u0442\u044c\u0441\u044f \u0432\u0435\u043b\u0438\u043a\u0456 \u0437\u0443\u0441\u0438\u043b\u043b\u044f. \u0414\u043b\u044f \u0432\u0438\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044f \u043c\u043e\u0436\u043b\u0438\u0432\u043e\u0441\u0442\u0456 \u0431\u0435\u0437\u0441\u043b\u0456\u0434\u043d\u043e\u0457 \u0437\u043c\u0456\u043d\u0438 \u0437\u0430\u0434\u043d\u0456\u043c \u0447\u0438\u0441\u043b\u043e\u043c \u0430\u0431\u043e \u0432\u0438\u0434\u0430\u043b\u0435\u043d\u043d\u044f \u0437\u0430\u0440\u0435\u0454\u0441\u0442\u0440\u043e\u0432\u0430\u043d\u043e\u0457 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457, \u0432 \u0440\u043e\u0431\u043e\u0442\u0456 \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u043e \u0456 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043e \u043c\u0435\u0442\u043e\u0434 \u0434\u043b\u044f \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044e \u0446\u0456\u043b\u0456\u0441\u043d\u043e\u0441\u0442\u0456 \u0437\u0430\u0440\u0435\u0454\u0441\u0442\u0440\u043e\u0432\u0430\u043d\u043e\u0457 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457. \u041f\u0456\u0434 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0435\u043c \u0446\u0456\u043b\u0456\u0441\u043d\u043e\u0441\u0442\u0456 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0440\u043e\u0437\u0443\u043c\u0456\u0454\u0442\u044c\u0441\u044f \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0442\u043e\u0442\u043e\u0436\u043d\u043e\u0441\u0442\u0456 \u0441\u0438\u043c\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u0440\u044f\u0434\u043a\u0430 \u043f\u0435\u0440\u0435\u0432\u0456\u0440\u043e\u0447\u043d\u043e\u0457 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u043d\u043e\u043c\u0443 \u0440\u044f\u0434\u043a\u0443 \u0437\u0430\u0440\u0435\u0454\u0441\u0442\u0440\u043e\u0432\u0430\u043d\u043e\u0457 \u0440\u0430\u043d\u0456\u0448\u0435 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457. \u041c\u0435\u0442\u0430 \u043f\u043e\u043b\u044f\u0433\u0430\u0454 \u0432 \u0440\u043e\u0437\u0432\u0438\u0442\u043a\u0443 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0456\u0432, \u0449\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0443\u044e\u0442\u044c \u043f\u0440\u043e\u0441\u0442\u0438\u0439, \u0437\u0430\u0433\u0430\u043b\u044c\u043d\u043e\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0438\u0439 \u0456 \u043d\u0430\u0434\u0456\u0439\u043d\u0438\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0446\u0456\u043b\u0456\u0441\u043d\u043e\u0441\u0442\u0456 \u043a\u043e\u043d\u0444\u0456\u0434\u0435\u043d\u0446\u0456\u0439\u043d\u043e\u0457 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457. \u0414\u043b\u044f \u0434\u043e\u0441\u044f\u0433\u043d\u0435\u043d\u043d\u044f \u0437\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043e\u0457 \u043c\u0435\u0442\u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043e \u0442\u0430\u043a\u0456 \u0437\u0430\u0432\u0434\u0430\u043d\u043d\u044f: \u0440\u043e\u0437\u0432\u0438\u0442\u043e\u043a \u043c\u0435\u0442\u043e\u0434\u0443 \u043e\u0431&#8217;\u0454\u043a\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044e \u0446\u0456\u043b\u0456\u0441\u043d\u043e\u0441\u0442\u0456 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457, \u0437\u0430\u0441\u043d\u043e\u0432\u0430\u043d\u043e\u0433\u043e \u043d\u0430 \u0444\u043e\u0440\u043c\u0443\u0432\u0430\u043d\u043d\u0456 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0438 \u043e\u0431\u2019\u0454\u0434\u043d\u0430\u043d\u0438\u0445 \u0445\u0435\u0448\u0456\u0432, \u0456 \u0440\u043e\u0437\u0440\u043e\u0431\u043a\u0430 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0456\u0432 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044e \u0456 \u0432\u0456\u0434\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f \u0446\u0456\u0454\u0457 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0438 \u0437 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f\u043c \u0440\u043e\u0437\u043f\u043e\u0434\u0456\u043b\u0435\u043d\u043e\u0433\u043e \u0437\u0431\u0435\u0440\u0456\u0433\u0430\u043d\u043d\u044f; \u0440\u043e\u0437\u0440\u043e\u0431\u043a\u0430 \u0442\u0430 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0456\u0432 \u0445\u0435\u0448\u0443\u0432\u0430\u043d\u043d\u044f \u0434\u043b\u044f \u043e\u043f\u0442\u0438\u043c\u0456\u0437\u0430\u0446\u0456\u0457 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044e \u0446\u0456\u043b\u0456\u0441\u043d\u043e\u0441\u0442\u0456 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u043f\u0440\u0438 \u0437\u0431\u0435\u0440\u0456\u0433\u0430\u043d\u043d\u0456 \u0456 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0456. \u0421\u0443\u0442\u044c \u043c\u0435\u0442\u043e\u0434\u0443 \u043f\u043e\u043b\u044f\u0433\u0430\u0454 \u0432 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u0456 \u043f\u0440\u043e\u0441\u0442\u043e\u0442\u0438, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u0456, \u043d\u0430\u0434\u0456\u0439\u043d\u043e\u0441\u0442\u0456 \u0442\u0430 \u043f\u0440\u043e\u0437\u043e\u0440\u043e\u0441\u0442\u0456 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044e \u0446\u0456\u043b\u0456\u0441\u043d\u043e\u0441\u0442\u0456 \u0434\u0430\u043d\u0438\u0445 \u0432 \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u044f\u0445 \u0431\u0435\u0437\u043f\u0430\u043f\u0435\u0440\u043e\u0432\u043e\u0433\u043e \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u043e\u043e\u0431\u0456\u0433\u0443, \u0432 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u0456 \u0430\u0432\u0442\u043e\u0440\u0441\u044c\u043a\u0438\u0445 \u0442\u0430 \u0456\u043d\u0448\u0438\u0445 \u043f\u0440\u0430\u0432, \u0434\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u043d\u043e\u0432\u0438\u0445 \u0432\u0438\u0434\u0456\u0432 \u0431\u0430\u043d\u043a\u0456\u0432\u0441\u044c\u043a\u043e\u0433\u043e \u043e\u0431\u0441\u043b\u0443\u0433\u043e\u0432\u0443\u0432\u0430\u043d\u043d\u044f, \u0430 \u0442\u0430\u043a\u043e\u0436 \u0434\u043b\u044f \u0432\u0438\u0440\u0456\u0448\u0435\u043d\u043d\u044f \u0456\u043d\u0448\u0438\u0445 \u0437\u0430\u0432\u0434\u0430\u043d\u044c.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0456 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0457, \u0437\u0430\u0445\u0438\u0441\u0442 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457, \u043a\u043e\u043d\u0444\u0456\u0434\u0435\u043d\u0446\u0456\u0439\u043d\u0456\u0441\u0442\u044c \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457, \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0446\u0456\u043b\u0456\u0441\u043d\u043e\u0441\u0442\u0456 \u0434\u0430\u043d\u0438\u0445.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>Failure of hardware and software, unauthorized access, hacker attacks are threats for the defence of which put great effort. In order to exclude the possibility of a consequent change or the delete of the registered information, in this work is proposed and investigated\u00a0 a method to control the integrity of the registered information. Control of the integrity of information is the control of the identity of the character string of the checking information to the corresponding line of previously registered information. The purpose is to develop algorithms that provide a simple, public and reliable control of the integrity of confidential information. To achieve this goal the following tasks are set: development of the method of objective control of the integrity of information based on the formation of the structure of mixed hashes, and the development of algorithms for control and restoration of this structure using distributed storage; development and research of hashing algorithms for optimization of information integrity control during storage and transmission. The essence of the method is to ensure the simplicity, accessibility, reliability and transparency of controlling the integrity of the data in the organizations of paperless circulation of documents, in providing copyright and other rights, software for new types of banking services, as well as for other tasks.<br \/>\n<strong>Key words:<\/strong> information of technologies, security information, confidentiality of information, data integrity control.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Petrov A. A. Kompyuternaya bezopasnost. Kriptograficheskie metody zashity \/ A. A. Petrov. \u2013 Moskva, 2013. \u2013 S. 448\u2013452.<\/li>\n<li>Lyovin V.Yu. O povyshenii kriptostojkosti odnonapravlennyh hesh-funkcij. Fundamentalnaya i prikladnaya matematika \/ Lyovin V.Yu. \u2013 Moskva, 2010. \u2013 S. 171\u2013179.<\/li>\n<li>Fergyuson N. Prakticheskaya kriptografiya \/ Fergyuson N., Shnajer B. \u2013 Moskva : Izdatelskij dom \u00abVilyams\u00bb, 2011. \u2013 S. 101\u2013114.<\/li>\n<li>Panasenko S.P. Slovarnye ataki na hesh-funkcii. Mir i bezopasnost \/ Panasenko S.P. \u2013 Sankt-Peterburg, 2010. \u2013 C. 24\u201331.<\/li>\n<li>Yashenko V.V. Vvedenie v kriptografiyu \/ Yashenko V.V. \u2013 Moskva : MCNMO, 2012. \u2013 C. 348\u2013350.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>\u041c\u0415\u0422\u041e\u0414 \u041a\u041e\u041d\u0422\u0420\u041e\u041b\u042e \u0426\u0406\u041b\u0406\u0421\u041d\u041e\u0421\u0422\u0406 \u041a\u041e\u041d\u0424\u0406\u0414\u0415\u041d\u0426\u0406\u0419\u041d\u0418\u0425 \u0414\u0410\u041d\u0418\u0425 \u041d\u0410 \u041e\u0421\u041d\u041e\u0412\u0406 \u0424\u0423\u041d\u041a\u0426\u0406\u0419 \u0425\u0415\u0428\u0423\u0412\u0410\u041d\u041d\u042f METHOD FOR CONTROL INTEGRITY OF CONFIDENTIAL DATA BASED ON HASH FUNCTIONS \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 7-11. \u041d\u043e\u043c\u0435\u0440: \u21164, 2019 (275) \u0410\u0432\u0442\u043e\u0440\u0438: \u041e.\u0412. \u041e\u0413\u041d\u0404\u0412\u0418\u0419, \u041e.\u0406. \u0410\u041a\u0410\u0422\u041e\u0412, \u0412.\u041f. \u041d\u0415\u0417\u0414\u041e\u0420\u041e\u0412\u0406\u041d \u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 O.V. OHNIEVYI, O.I. AKATOV, V.P. NEZDOROVIN Khmelnytskyi National University DOI: https:\/\/www.doi.org\/10.31891\/2307-5732-2019-275-4-7-11 \u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review : 05.06.2019 \u0440. \u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed : 17.07.2019 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[17],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1580"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1580"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1580\/revisions"}],"predecessor-version":[{"id":6400,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1580\/revisions\/6400"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}