Ograniczanie wyników
Czasopisma help
Autorzy help
Lata help
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 152

Liczba wyników na stronie
first rewind previous Strona / 8 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  cryptography
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 8 next fast forward last
PL
Artykuł porusza zagadnienia związane z cyberbezpieczeństwem we współczesnym świecie, ukazując zarówno pozytywne, jak i negatywne aspekty nowoczesnych technologii. Autorzy opisują główne zagrożenia w cyberprzestrzeni, takie jak złośliwe oprogramowanie, ataki hakerskie, naruszenia prywatności oraz technologie deepfake. Przedstawiono przykłady technologii, które mogą być wykorzystywane w sposób zarówno konstruktywny, jak i destrukcyjny. Podkreślono znaczenie rozwoju sztucznej inteligencji i uczenia maszynowego w doskonaleniu środków bezpieczeństwa, jednocześnie zwracając uwagę na nowe wyzwania, jakie te technologie przynoszą. Artykuł akcentuje także konieczność edukacji oraz zwiększania świadomości w zakresie cyberbezpieczeństwa, zwłaszcza w kontekście współpracy międzysektorowej i adaptacji programów nauczania do dynamicznie zmieniających się wymagań rynku. Przedstawiono rolę zaawansowanych technologii, takich jak blockchain i kryptografia kwantowa, w kontekście przyszłych zagrożeń oraz potrzebę wprowadzenia nowych, odpornych na ataki systemów zabezpieczeń. Autorzy podkreślają również, że kluczowe jest znalezienie równowagi między środkami bezpieczeństwa a prawem do prywatności oraz nieustanne dostosowywanie strategii ochrony do szybko ewoluującego krajobrazu zagrożeń technologicznych i geopolitycznych.
EN
The article discusses issues related to cybersecurity in the modern world, highlighting both the positive and negative aspects of contemporary technologies. The authors describe major threats in cyberspace, such as malware, hacking attacks, privacy breaches, and deepfake technologies. Examples of technologies that can be used in both constructive and destructive ways are presented. The importance of the development of artificial intelligence and machine learning in improving security measures is emphasized, while also noting the new challenges these technologies bring. The article also underscores the necessity of education and raising awareness in the field of cybersecurity, especially in the context of cross-sector collaboration and the adaptation of educational programs to the dynamically changing market demands. The role of advanced technologies such as blockchain and quantum cryptography in the context of future threats and the need for implementing new, attack-resistant security systems is discussed. The authors also stress that it is crucial to find a balance between security measures and the right to privacy, as well as to continuously adapt protection strategies to the rapidly evolving landscape of technological and geopolitical threats.
EN
Wireless Body Area Networks (WBANs) are based on connected and dedicated sensor nodes for patient monitoring in the healthcare sector. The sensor nodes are implanted inside or outside the patient’s body for sensing the vital signs and transmitting the sensed data to the end devices for decision-making. These sensor nodes use advanced communication technologies for data communication. However, they have limited capabilities in terms of computation power, battery life, storage, and memory, and these constraints make networks more vulnerable to security breaches and routing challenges. Important and sensitive information is exchanged over an unsecured channel in the network. Several devices are involved in handling the data in WBANs, including sink nodes, coordinator, or gateway nodes. Many cryptographic schemes have been introduced to ensure security in WBANs by using traditional confidentiality and key-sharing strategies. However, these techniques are not suitable for limited resource-based sensor nodes. In this paper, we propose a Lightweight Hybrid Cryptography Algorithm (LWHCA) that uses cryptographicbased techniques for WBAN networks to improve network security, minimize network overhead and delay issues, and improve the healthcare monitoring processes. The proposed solution is evaluated in a simulation scenario and compared with state-of-the-art schemes in terms of energy consumption, and ciphertext size.
PL
We współczesnych sieciach komputerowych bezpieczeństwo przesyłania informacji jest jednym z priorytetów. Z tego względu kwantowa dystrybucja klucza – rozwiązanie odporne na ataki z użyciem komputera kwantowego – zyskuje coraz większą popularność. Usprawnienie działania sieci za to odpowiedzialnych jest obecnie tematem intensywnych badań. W artykule przedstawiono możliwe zastosowania uczenia maszynowego w sieciach kwantowych. Opisano możliwe scenariusze, wyzwania oraz możliwości jakie otwiera ten kierunek badań.
EN
In modern computer networks, the security of information transmission is one of the priorities. For this reason, quantum key distribution – a solution resistant to quantum computer attacks – is gaining popularity. Improving the performance of the networks responsible for this is currently a topic of intense research. The article presents possible applications of machine learning in quantum networks. Possible scenarios, challenges and opportunities opened up by this direction of research are described.
EN
In this article we present a procedure that allows to synthesize optimal circuit representing any reversible function within reasonable size limits. The procedure allows to choose either the NCT or the MCT gate set and specify any number of ancillary qubits to be used in the circuit. We will explore efficacy of this procedure by synthesizing various sources of nonlinearity used in contemporary symmetric ciphers and draw conclusions about properties of those transformations in quantum setting. In particular we will try to synthesize optimal circuit representing ASCON cipher SBOX which recently won NIST competition for Lightweight Cryptography standard.
EN
This paper delves into the expansive world of cellular automata (CA), abstract models of computation comprised of cells that interact based on predefined rules. Originating from John von Neumann’s work in the 1940s, CA has evolved into a multidisciplinary field with applications ranging from mathematical concepts to complex simulations of biological, physical, computer science, material science, and social systems. The paper reviews its historical development, emphasizing John Conway’s influential Game of Life and Burk’s seminar collection. The authors categorize and explore a myriad of CA topics, including self-replicating automata, the universality of computation, compromises in CA, variants, applications in biological systems, fault-tolerant computation, pattern recognition, CA games, fractals, dynamic properties, complexity, image processing, cryptography, bioinformatics, materials modeling, probabilistic automata, and contemporary research. The significance of cellular automata for materials modeling cannot be overstated and considerable attention has been devoted to the issues of modeling nucleation and recrystallization. The review aims to provide a comprehensive resource for both beginners and experts in the field, shedding light on cellular automata’s dynamic and diverse applications in various aspects of life and scientific inquiry.
EN
The factorization problem belongs to a group of problems important in the security of information systems and cryptography. The article describes a new number factorization algorithm designed based on numerical experiments. We present an extension of number factorization using triangular numbers features. The described algorithm can be used to increase the security of key generation for the RSA algorithm.
PL
Kryptografia z wykorzystaniem sieci neuronowych to nowy trend w cyberbezpieczeństwie. Sieci typu Tree Parity Machine oferują alternatywę dla powszechnie stosowanych protokołów uzgodnienia klucza kryptograficznego. Celem tego artykułu jest analiza zależności pomiędzy parametrami sieci TPM, a czasem synchronizacji oraz jej bezpieczeństwem.
EN
Neural cryptography is a new trend in cybersecurity. Tree Parity Machine (TPM) networks offer an alternative to commonly used cryptographic key agreement protocols. The purpose of this article is to analyze the relationship between TPM network parameters and the synchronization time and its security.
PL
Szybki rozwój urządzeń Internetu Rzeczy przekłada się na ogromny wzrost liczby produkowanych urządzeń. Tak gwałtowny rozwój tej dziedziny pociąga za sobą konieczność rozwijania aspektów towarzyszących takich jak kryptografia. Obecnie nie ma standardu, który określałby w jaki sposób zabezpieczać urządzenia IoT dlatego w tej pracy zostały poddane analizie główne prymitywy kryptograficzne. Następnie poruszone były aspekty różnych rozwiązań lightweight na podstawie których wybrane zostały takie, które mogą być używane w systemach Internetu Rzeczy.
EN
The rapid development of Internet of Things devices translates into a huge increase in the number of manufactured devices. Such rapid development of this field implies the need to develop accompanying aspects such as cryptography. Currently, there is no standard that defines how to secure IoT devices therefore in this work the main cryptographic primitives have been analyzed. Then the aspects of different lightweight solutions were addressed based on which the ones that can be used in Internet of Things systems were selected.
EN
Nowadays, information security management systems are important parts of managing a system for better handling of the information security. In scenarios and situations where safety management is done by managing protection of malwares, it is important to manage security issues properly. Cryptography is an approach which makes possible for a recipient to encrypt and decrypt the information. A combination of two different strategies for encryption and decryption in the text encoding will be transformed into the used all content. The encryption and decryption key of the content decryption key is used. There are different types of information. A number, such as finding two large prime numbers with that product. The number, the size of the RSA key is large enough to make, it's hard to pinpoint these numbers. The key, known as the RSA public key, is the most prominent open encryption. Calculations were used for information exchange. In this paper, we created a program for simulation and testing of apply cryptography of Advance Encryption Standard (AES) algorithm with Rivest-Shamir-Adleman (RSA) algorithm for better performance. In this study, this program is an application of a new algorithm to be the AES&RSA principle of using a public key instead of a private key for cryptography, and the testing of encryption and decryption for the AES&RSA algorithm resulted in time is no different on the AES algorithm and more secure encryption and decryption. The results indicated that the time needed for encoding and decoding of AES&RSA algorithm has been reduced (i.e., efficiency has been improved).
EN
In this paper we investigate groups which admit the existence of weighted consistent approximations for pairwise comparisons matrices. These approximations are defined by extending the classical matrix projection for R_{+} to abstract weighted projections on the non-linear sets of transitive group-valued matrices. It is of interest that all of them are represented by general explicit formulae dependent on an abstract logarithmic function. This general approach is applied to the groups Z^{∗}_{p} and F^{∗}_{2m} which are of fundamental importance in in cryptography. Finally, we use our unified mathematical model of pairwise comparisons for continuous one-parameter unitary groups, which play a fundamental role in physics.
PL
W ostatnich latach pojawiło się wiele informacji na temat ataków na wielkie korporacje i koncerny. W wielu przypadkach atak taki nie polegał na próbie wyprowadzenia wrażliwych danych z sieci firmowej, lecz na szyfrowaniu zawartości dysków wraz z żądaniem okupu w celu umożliwienia deszyfracji. W taki właśnie sposób działa ransomware, którego przykłady wykorzystania zostały przedstawione w niniejszym artykule. W celu pełnego zrozumienia sposobu działania ransomware omówiono również jego przemianę i rozwój na przestrzeni lat od początków w postaci ataków na pojedynczych użytkowników kończąc na atakach na wielkie korporacje. Zaprezentowane zostały także wraz z omówieniem największe ataki, które miały miejsce w ostatnim czasie oraz przedstawiono kluczowy i jeden z najważniejszych składników ransomware, czyli metody kryptograficzne, które są wykorzystywane w celu szyfrowania zawartości dysków. W artykule zebrano również porady jak się bronić przed atakami oraz jak działać, jeśli dojdzie już do takiego ataku.
EN
In recent years, a lot of information has appeared on attacks on large corporations and concerns. In many cases, such an attack was not an attempt to lead sensitive data out of the corporate network but encryption of the contents of disks together with a ransom demand to enable decryption. This is how ransomware works, examples of which are shown in this article. To fully understand how ransomware works, its transformation and development over the years, from its inception in the form of attacks on single users to attacks on large corporations, are also discussed. The most significant attacks that have taken place recently were also presented along with a discussion and the key and one of the essential components of ransomware, i.e. cryptographic methods used to encrypt the content of disks. The article also collects advice on how to defend yourself against attacks and how to act in the event of an attack.
EN
The Automatic Identification System (AIS) offers automatic traffic control and collision avoidance services to the maritime transportation sector worldwide. Because AIS lacks security mechanisms, it is vulnerable to misuse and exploitation by unlawful adversaries (e.g. sea-pirates, terrorists, smugglers). To address the security issues of the AIS, in an earlier paper [1], we proposed the deployment of a Maritime Certificate-less Identity-Based (mIBC) public-key cryptography infrastructure that enhances AIS with on-demand anonymity, authentication, and encryption capabilities. In this paper we address implementation aspects of that infrastructure. In particular, we propose to use the Sakai-Kasahara Identity-Based Encryption (IBE) approach to implement the mIBC infrastructure, following the IEEE 1363.3-2013 standard for Identity-Based Cryptography.
EN
The Automatic Identification System (AIS) provides situational awareness for vessels at sea. AIS has a number of known security vulnerabilities that can lead to a several types of attacks on AIS, including the ability to create ghost vessels, false warning or meteorological messages, or bogus virtual aids-to-navigation (AtoN). A number of methods, with varying levels of complexity, have been proposed to better secure AIS and, indeed, emerging AIS protocols will implement some of these mechanisms. Nevertheless, little has been done to secure the current standards, which will remain in use for some time. This paper presents Protected AIS (pAIS), a demonstration of capability implementation using public-key cryptography methods to address several AIS security vulnerabilities, maintain backward compatibility, and be able to interoperate with non-pAIS devices.
EN
Currently, the Republic of Kazakhstan is developing a new standard for symmetric data encryption. One of the candidates for the role of the standard is the Qamal encryption algorithm developed by the Institute of Information and Computer Technologies (Almaty, Republic of Kazakhstan). The article describes the algorithm. Differential properties of the main operations that make up the Qamal cypher are considered in the questions of stability. We have shown that for a version with a 128-bit data block and the same secret key size for three rounds of encryption it is difficult to find the right pairs of texts with a probability of 2–120, which makes differential cryptanalysis not applicable to the Qamal cypher.
EN
Protecting the confidentiality, integrity and availability of information is very important in any telecommunications system. Information protection requires use of necessary physical, personal, information and communication technologies and above all – electromagnetic and cryptographic security measures. Equipment and tools for cryptographic protection should be examined and assessed in terms of resistance to known threats. Additional requirements are put on information protection for radio communication, especially military, where radio transmission is characterized by uncertainty of establishing and maintaining connections, bit rates are relatively low, often without full duplex. All this has an impact on the methods of cryptographic synchronization and implementation of cryptographic functions. A different approach to information protection is required by classic narrowband radio communications, a different one in time-division multi-access modes, and another one in broadband packet data transmission. Systems designed for information protection in radio communications implement appropriate operating modes of operation for cryptographic algorithms and protocols. Latest threats from quantum computers pose new challenges, especially in systems using public-key cryptography, because there are algorithms that can be used to attack these schemes with polynomial complexity.
16
EN
Integer factorization is one of the oldest mathematical problems. Initially, the interest in factorization was motivated by curiosity about be­haviour of prime numbers, which are the basic building blocks of all other integers. Early factorization algorithms were not very efficient. However, this dramatically has changed after the invention of the well-known RSA public-key cryptosystem. The reason for this was simple. Finding an efficient fac­toring algorithm is equivalent to breaking RSA. The work overviews development of integer factoring algorithms. It starts from the classical sieve of Eratosthenes, covers the Fermat algorithm and explains the quadratic sieve, which is a good representative of modern fac­toring algorithms. The progress in factoring is illustrated by examples of RSA challenge moduli, which have been factorized by groups of mathemati­cians and cryptographers. Shor's quantum factorization algorithm with poly­nomial complexity is described and the impact on public-key encryption is discussed.
PL
System łączności bezprzewodowej jest budowany z wykorzystaniem szerokopasmowych radiostacji definiowanych programowo, których zadaniem jest tworzenie ad-hoc sieci szkieletowych IP dla użytkowników poruszających się na pojazdach. System zapewnia ochronę informacji w warstwach transmisji, sieci i komunikacji, gdzie zastosowano mechanizmy kryptograficzne dedykowane na potrzeby budowania różnych domen. Podsystem zarządzania radiostacjami i kryptografią umożliwia planowanie, zarządzanie i zbieranie doświadczeń z misji.
EN
The wireless communication system is built with wide band software defined radios (SDR) in order to create ad-hoc IP network for users moving on vehicles (MANET). This system provides TRANSEC, NETSEC and COMSEC protection with cryptographic mechanisms dedicated to national, allied and coalition needs. The radio and cryptography management subsystem enables planning, management and collecting mission experiences.
PL
W pracy zaproponowano zastosowanie modelu uczenia maszynowego do realizacji zadania faktoryzacji liczb całkowitych na iloczyn liczb pierwszych. Podano dwa algorytmy faktoryzacji oraz zaprezentowano model procesora analogowego realizującego powyższe zadanie. Efektywne metody faktoryzacji mają istotne znaczenie w łamaniu szyfrów opartych na systemie kryptograficznym RSA.
EN
In this paper a model for factorization of integer numbers on the product of prime numbers is presented. Two algorithms of factorization and a model of analog processor accomplishing the task of factorization are provided. Effective factoring methods are important in breaking codes on the RSA cryptographic system.
PL
W artykule omówiono sposób wyseparowania oraz wykorzystania zmiennych globalnych w czasie, które w przyszłości pozwolą stworzyć unikalny klucz szyfrujący oraz układ szyfrowania danych. Polega on na ciągłej analizie losowego rozkładu zmienności częstotliwości oraz rozwinięciu algorytmów szyfrowania o dodatkowe zabezpieczenie, jakim jest zmieniający się czasie klucz szyfrujący. Celem sprawdzenia, czy opisane rozwiązanie jest możliwe do wykonania, przeprowadzono pomiar napięć w dwóch różnych lokacjach w Polsce. Otrzymany sygnał został wstępnie przefiltrowany celem wygładzenia jego powierzchni. Następnie ustalono dokładne miejsca przecięcia na osi oX metodą przybliżania rozwiązań układów nieokreślonych, po czym otrzymane wartości zostały po raz kolejny przefiltrowane, a otrzymane wyniki poddane analizie, na podstawie której sformułowano wnioski końcowe.
EN
The article discusses the way of separating and using global variables in time, which in the future will create a unique encryption key and data encryption system. It is based on continuous analysis of the random distribution of frequency variability and the development of encryption algorithms with the additional security, which is the changing time key encryption. In order to check whether the described solution is feasible, voltage measurements were carried out in two different locations in Poland. The received signal was pre-filtered to smooth its surface. Then the exact intersection points were determined on the oX axis by the method of approximation of solutions of indeterminate systems, after which the obtained values were once again filtered and the results obtained were analyzed, on the basis of which final conclusions were formulated.
EN
Data integration and fast effective data processing are the primary challenges in today’s high-performance computing systems used for Big Data processing and analysis in practical scenarios. Blockchain (BC) is a hot, modern technology that ensures high security of data processes stored in highly distributed networks and ICT infrastructures. BC enables secure data transfers in distributed systems without the need for all operations and processes in the network to be initiated and monitored by any central authority (system manager). This paper presents the background of a generic architectural model of a BC system and explains the concept behind the consensus models used in BC transactions. Security is the main aspect of all defined operations and BC nodes. The paper presents also specific BC use cases to illustrate the performance of the system in practical scenarios.
first rewind previous Strona / 8 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.