SIMULATION MODELING OF DATA INTEGRITY VIOLATIONS IN INTELLIGENT SOCIAL SYSTEMS
DOI:
https://doi.org/10.26577/jpcsit202547Keywords:
intelligent social systems, simulation modeling, data integrity, cognitive attacks, information distortions, agent-based modelingAbstract
The article examines the issues of ensuring the integrity and confidentiality of electronic data through the use of post-quantum cryptographic algorithms Kyber and Dilithium. The rapid development of quantum computing threatens the security of traditional cryptographic systems (RSA, ECC), making the protection of digital infrastructures—such as government platforms, financial services, educational ecosystems, and intelligent social systems—an urgent priority.
The Kyber algorithm (for encryption and key exchange) and Dilithium algorithm (for digital signatures) are part of the post-quantum cryptography standards recommended by NIST. Their implementation significantly enhances resistance to quantum attacks, ensures the integrity of electronic transactions, and provides reliable authentication within digital ecosystems.
Particular attention is paid to the integration of post-quantum algorithms into trusted electronic systems, including e-voting, state registries, digital document management, and cloud storage infrastructures. Architectures based on the combination of Kyber and Dilithium guarantee not only protection from external interference but also verifiability, authenticity, and consistency of data throughout its entire life cycle.
Thus, the application of post-quantum cryptographic algorithms represents a crucial step in the development of secure digital ecosystems and the formation of a new paradigm of digital trust
