Expression #1 of SELECT list is not in GROUP BY clause and contains nonaggregated column 'n.id' which is not functionally dependent on columns in GROUP BY clause; this is incompatible with sql_mode=only_full_group_by
Expression #1 of SELECT list is not in GROUP BY clause and contains nonaggregated column 'n.id' which is not functionally dependent on columns in GROUP BY clause; this is incompatible with sql_mode=only_full_group_by PROBLEMS OF FORMATION OF THE NATIONAL CRYPTOGRAPHY POLICY IN THE INFORMATION SOCIETY (azerb.) - İTP Jurnalı
AZERBAIJAN NATIONAL ACADEMY OF SCIENCES
PROBLEMS OF FORMATION OF THE NATIONAL CRYPTOGRAPHY POLICY IN THE INFORMATION SOCIETY (azerb.)
Yadigar N. Imamverdiyev

Cryptographic methods of information protection play an important role in the technological components of ensuring of information security in information society. In this paper, we study the problem of formation of national cryptography policy in information society, analyze the experience of developed countries in this field, as well as the current state of research in the field of cryptography based on the experience of international cryptography competitions. As a result, the main directions of the model cryptography policy for developing countries are defined, and recommendations are developed to address some of the problems anticipated in the practical implementation of this policy. (pp. 12-23)

Keywords:information society; information security; cryptography; cryptanalysis; cryptography policy
References
  • Əliquliyev R. M., İmamverdiyev Y. N. Rəqəmsal imza texnologiyası. Bakı: Elm, 2003, 132s.
  • Əliquliyev R. M., İmamverdiyev Y. N. Kriptoqrafiya tarixi. Bakı: İnformasiya Texnologiyaları, 2006, 192 s.
  • Əliquliyev R. M., İmamverdiyev Y. N. Kriptoqrafiyanın əsasları. Bakı: İnformasiya Texnologiyaları, 2006, 698 s.
  • Diffie W., LandauS. The Export of Cryptography in the 20th and the 21st Centuries. Karl de Leeuw, Jan Bergstra, ed. The history of information security. A comprehensive handbook. Elsevier, 2007, pp. 725-737.
  • Dam K.W., Lin H.S. Cryptography's role in securing the information society. Washington, DC: National Academy of Sciences, 1996, pp. 1-688.
  • Gallery E., Mitchell C.J. Trusted Computing: Security and Applications // Cryptologia, 2008, Vol. 33, No. 3, pp. 217-245.
  • Green L. Trusted Computing Platform Alliance: The Mother(board) of all Big Brothers. 2002, https://www.cypherpunks.to/TCPA_DEFCON_10.pdf
  • Global Internet Liberty Campaign. An International Survey of Encryption Policy. 1998, http://gilc.org/crypto/crypto-survey.html
  • OECD Guidelines for Cryptography Policy, 1997, http://www.oecd.org
  • Government of Canada: A Cryptography Policy Framework for Electronic Commerce: Building Canada's Information Economy and Society, 1998, 42 p., http://www.strategis.ic.gc.ca/crypto
  • Herson D. The changing face of international cryptography policy Part 2 — The United Kingdom // Computer Fraud & Security, 1999, Vol. 1999, No. 7, pp. 10–11.
  • İmamverdiyev Y.N., Kang T.W. Əşyaların İnterneti üçün yüngülçəkili kriptoqrafiya / Azərbaycan xalqının ümummilli lideri Heydər Əliyevin 90 illik yubileyinə həsr olunmuş “İnformasiya təhlükəsizliyi problemləri üzrə I respublika elmi-praktiki konfransı”nın materialları, 2013,  137-140.
  • Zimmermann Ph. PGP Source Code and Internals. MIT Press. 1995, 933 p.
  • Imamverdiyev Y.N., Teoh A.B.J., Kim J. Biometric cryptosystem based on discretized fingerprint texture descriptors // Expert Systems with Applications, 2013, .vol. 40, 5, pp. 1888–1901.
  • Имамвердиев Я. Н., Гаджирагимова М. Ш. Архитектура инфраструктуры доверия электронным документам в среде электронного государства // Телекоммуникации, 2011, № 11, c. 18-26.
  • Ахадова З. М. Актуальные вопросы совершенствования стандарта FIPS 140-2 // Вопросы защиты информации, 2006, N 4, c. 6-11.
  • İmamverdiyev Y. N. QOST-28147-89 standartında əvəzetmə bloklarının generasiyası / “İnformasiya texnologiyaları və telekommunikasiya” (IT&TC’2007), 3-cü Beynəlxalq elmi-praktiki konfrans, 2007.
  • Information and Communications Technologies (H2020-ICT-2014-1), Topic: Cybersecurity, Trustworthy ICT (ICT-32-2014), http://www.ec.europa.eu