Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Attack" wg kryterium: Temat


Tytuł:
Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by 2m
Autorzy:
Wroński, Michał
Powiązania:
https://bibliotekanauki.pl/articles/227051.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
small subgroups attack
side-channel attack
alternative models of elliptic curves
Opis:
Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff's curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography. Most of these models allow to use fast and complete arithmetic which is especially convenient in fast implementations that are side-channel attacks resistant. Montgomery, Edwards and twisted Edwards curves have always order of group of rational points divisible by 4. Huff's curves have always order of rational points divisible by 8. Moreover, sometimes to get fast and efficient implementations one can choose elliptic curve with even bigger cofactor, for example 16. Of course the bigger cofactor is, the smaller is the security of cryptosystem which uses such elliptic curve. In this article will be checked what influence on the security has form of cofactor of elliptic curve and will be showed that in some situations elliptic curves with cofactor divisible by 2m are vulnerable for combined small subgroups and side-channel attacks.
Źródło:
International Journal of Electronics and Telecommunications; 2019, 65, 2; 203-209
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Phase-shift Fault Analysis of Grain v1
Autorzy:
Hromada, V.
Pethö, T.
Powiązania:
https://bibliotekanauki.pl/articles/226344.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
stream ciphers
Grain v1
fault analysis
phase-shift attack
desynchronization attack
Opis:
This paper deals with the phase-shift fault analysis of stream cipher Grain v1. We assume that the attacker is able to desynchronize the linear and nonlinear registers of the cipher during the keystream generation phase by either forcing one of the registers to clock one more time, while the other register is not clocked, or by preventing one of the registers from clocking, while the other register is clocked. Using this technique, we are able to obtain the full inner state of the cipher in reasonable time (under 12 hours on a single PC) by using 150 bits of unfaulted keystream, 600 bits of faulted keystreams and by correctly guessing 28 bits of the linear register.
Źródło:
International Journal of Electronics and Telecommunications; 2018, 64, 2; 131-136
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hardware Implementation of an Enhanced Security- and Authentication-Related Automotive CAN Bus Prototype
Autorzy:
Zniti, Asmae
Ouazzani, Nabih
Powiązania:
https://bibliotekanauki.pl/articles/2200704.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
CAN
automotive security
attack
authentication
Opis:
In this paper a new security technique aiming to ensure safe and reliable communications between different nodes on an automotive Controller Area Network (CAN) is presented. The proposed method relies on a robust authentication code using Blake-3 as a hash algorithm within an adapted structure that includes a monitor node. A prototype is implemented and run effectively to perform hardware simulations of real case-based security problems of automotive embedded CAN systems. As a result, data transfer can take place on a newly enhanced CAN bus according to the standard protocol without being intercepted nor tampered with by unauthorized parties thereby highlighting the effectiveness of the proposed technique.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 1; 83--88
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Applying of security mechanisms to middle and high layers of OSI/ISO network model
Mechanizmy bezpieczeństwa w zastosowaniu śsrodkowych i górnych warstw sieciowego modelu OSI/ISO
Autorzy:
Kołodziejczyk, M.
Ogiela, M. R.
Powiązania:
https://bibliotekanauki.pl/articles/375804.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
AES
authentication
authorization
application
community string
dictionary attack
DDoS attack
DNS
DoS attack
hash function
HTTP
ICMP
IPv4
IPv6
man in the middle attack
MD5
OSI/ISO model
password
port scanning
protocol
SHA-1
sniffing
SNMP
spoofing
SYN flooding
TCP
tunnelling
UDP
Opis:
This article describes security mechanisms used by 3rd-7th layers in OSI/ISO network model. Many of commonly used protocols by these layers were designed with assumption that there are no intruders. Such assumption was true many years ago. The network situation has been changed for last few years and we should realize that some properties of existing protocols may be abused. Moreover, we should exchange some of them or create new versions. There are some methods and guidelines concerning secure programming, but there is also lack of guidelines about creating secure protocols. Authors see the necessity of such guideline and this article is an attempt at analysing existing solutions and selecting some universal and important patterns.
Artykuł opisuje popularne mechanizmy bezpieczeństwa stosowane w istniejących protokołach sieciowych środkowych i górnych warstw modelu OSI/ISO (od trzeciej warstwy włącznie). Wiele spośród tych protokołów zostało zaprojektowanych bardzo dawno temu i chociaż do dzisiaj są wykorzystywane i spisują się bardzo dobrze to jednak umożliwiają pewne nadużycia swojej funkcjonalności. Wiele z opisanych tutaj protokołów nie bierze pod uwagę ataków sieciowych. Autorzy postanowili wyselekcjonować pewną grupę protokołów, które mogą posłużyć do analizy zagrożeń sieciowych. Dzisiaj, mając pewne niebezpieczne rozwiązania jesteśmy bogatsi o pewne praktyczne doświadczenia z tym związane. Pozwala to analizować zagrożenie, klasyfikować je i wreszcie skutecznie im przeciwdziałać w nowych protokołach. Często są to rozwiązania lokalne, tworzone przez pewne grupy studentów lub konkretne firmy. Powstają również nowe, globalne rozwiązania. W pierwszym przypadku, nowy protokół może stanowić realne zagrożenie ze strony intruza. W drugim, należałoby poddać przynajmniej częściowej analizie formalnej nowe rozwiązanie. Istnieje wiele metod skupiających się na tworzonym oprogramowaniu, jednak często protokoły, jako rozwiązania autorskie są pomijane w analizie. Artykuł jest również próbą wstępnej klasyfikacji zagrożeń i stworzenia pewnych uniwersalnych rad dla twórców nowych rozwiązań. W pracy zarysowuje się potrzeba zmian pewnych istniejących rozwiązań, których słabości są opisane w artykule. Autorzy są przekonani, że niebezpieczny protokół nie może być użyty w bezpiecznym programie, bo jak np. można stworzyć bezpieczny program, jeśli protokół nie posiada odpowiedniego mechanizmu uwierzytelniania? Ten i wiele innych aspektów bezpieczeństwa zostało w pracy poruszonych i omówionych na przykładzie istniejących rozwiązań.
Źródło:
Theoretical and Applied Informatics; 2012, 24, 1; 95-106
1896-5334
Pojawia się w:
Theoretical and Applied Informatics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Styles of behaviour in interpersonal confl ict concept and research tool (Confl ict behaviour questionnaire)
Autorzy:
Balawajder, Krystyna
Powiązania:
https://bibliotekanauki.pl/articles/430135.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Interpersonal conflict
conflict behaviour
attack
amicable settlement
defence
yielding
Opis:
The article presents the main types of confl ict behaviour with the author’s proposal of their classifi cation. The suggested classifi cation is based on the way in which an individual deals with a partner’s adverse infl uence on his/her self-interest and welfare in a confl ict situation. Four possible ways of coping i.e. attack, amicable settlement, defence, and yielding have been distinguished. On the basis of this behaviour classifi cation, the Confl ict Behaviour Questionnaire was compiled and its reliability and validity was assessed.
Źródło:
Polish Psychological Bulletin; 2012, 43, 4; 233-243
0079-2993
Pojawia się w:
Polish Psychological Bulletin
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Improving security of lightweith SHA-3 against preimage attacks
Autorzy:
Serhii, O.
Kotulski, Z.
Powiązania:
https://bibliotekanauki.pl/articles/227343.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
hash function
SHA-3
Keccak
preimage attack
lightweight cryptography
Opis:
In this article we describe the SHA-3 algorithm and its internal permutation in which potential weaknesses are hidden. The hash algorithm can be used for different purposes, such as pseudo-random bit sequences generator, key wrapping or one pass authentication, especially in weak devices (WSN, IoT, etc.). Analysis of the function showed that successful preimage attacks are possible for low round hashes, protection from which only works with increasing the number of rounds inside the function. When the hash function is used for building lightweight applications, it is necessary to apply a small number of rounds, which requires additional security measures. This article proposes a variant improved hash function protecting against preimage attacks, which occur on SHA-3. We suggest using an additional external randomness sources obtained from a lightweight PRNG or from application of the source data permutation.
Źródło:
International Journal of Electronics and Telecommunications; 2018, 64, 2; 159-166
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Current Injection Attack against the KLJN Secure Key Exchange
Autorzy:
Chen, H.-P.
Mohammad, M.
Kish, L. B.
Powiązania:
https://bibliotekanauki.pl/articles/220991.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
KLJN
current injection attack
secure key exchange
unconditional security
privacy amplification
Opis:
The Kirchhoff-law-Johnson-noise (KLJN) scheme is a statistical/physical secure key exchange system based on the laws of classical statistical physics to provide unconditional security. We used the LTSPICE industrial cable and circuit simulator to emulate one of the major active (invasive) attacks, the current injection attack, against the ideal and a practical KLJN system, respectively. We show that two security enhancement techniques, namely, the instantaneous voltage/current comparison method, and a simple privacy amplification scheme, independently and effectively eliminate the information leak and successfully preserve the system’s unconditional security.
Źródło:
Metrology and Measurement Systems; 2016, 23, 2; 173-181
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Power equalization of AES FPGA implementation
Autorzy:
Strachacki, M.
Szczepański, S.
Powiązania:
https://bibliotekanauki.pl/articles/199907.pdf
Data publikacji:
2010
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
AES
FPGA
cryptography
side channel attack
DPA
power analysis
power equalization
Opis:
This paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis (DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorial circuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) device using the standard and power-equalized methods. Power traces for DPA have been collected using XPower tool. Simulation results show that standard AES implementation can be broken after N=500 encryptions, while power-equalized counterpart shows no correlation between power consumption and the cipher key after N=2000 encryptions.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2010, 58, 1; 125-128
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of thermo-hydraulic performance of a solar air heater tube with modern obstacles
Autorzy:
Menni, Younes
Chamkha, Ali J.
Zidani, Chafika
Benyoucef, Boumédiène
Powiązania:
https://bibliotekanauki.pl/articles/240666.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
turbulence
heat transfer
friction loss
flow attack
solar air heater tube
Opis:
This paper presents a numerical analysis on turbulent flow and forced-convection characteristics of rectangular solar air heater tube fitted with staggered, transverse, V-shape, modern obstacles on the heated walls. Air, whose Prandtl number is 0.71, is the working fluid used, and the Reynolds number considered equal to 6×10 3. The governing flow equations are solved using a finite volume approach and the semi-implicit pressure linked equation (SIMPLE) algorithm. With regard to the flow characteristics, the quadratic upstream interpolation for convective kinetics differencing scheme (QUICK) was applied, and a second-order upwind scheme (SOU) was used for the pressure terms. The dynamic thermo-energy behavior of the V-shaped baffles with various flow attack angles, i.e., 50°, 60°, 70°, and 80° are simulated, analyzed, and compared with those of the conventional flat rectangular baffles with attack value of 90°. In all situations, the thermal transfer rate was found to be much larger than unity; its maximum value was around 3.143 for the flow attack angle of 90° and y = H/2.
Źródło:
Archives of Thermodynamics; 2020, 41, 3; 33-56
1231-0956
2083-6023
Pojawia się w:
Archives of Thermodynamics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Tabu Search Against Permutation Based Stream Ciphers
Autorzy:
Polak, I.
Boryczka, M.
Powiązania:
https://bibliotekanauki.pl/articles/227111.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
tabu search
TS
cryptanalysis
RC4
VMPC
stream cipher
state recovery attack
Opis:
Encryption is one of the most effective methods of securing data confidentiality, whether stored on hard drives or transferred (e.g. by e-mail or phone call). In this paper a new state recovery attack with tabu search is introduced. Based on research and theoretical approximation it is shown that the internal state can be recovered after checking 2⁵² internal states for RC4 and 2¹⁸⁰ for VMPC.
Źródło:
International Journal of Electronics and Telecommunications; 2018, 64, 2; 137-145
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Effect of Angle of Attack and Flow Conditions on Turbulent Boundary Layer Noise of Small Wind Turbines
Autorzy:
Afanasieva, N.
Powiązania:
https://bibliotekanauki.pl/articles/177922.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
wind turbine
airfoil self-noise
turbulent boundary layer
flow conditions
angle of attack
Opis:
The article aims to solve the problem of noise optimization of small wind turbines. The detailed analysis concentrates on accurate specification and prediction of the turbulent boundary layer noise spectrum of the blade airfoil. The angles of attack prediction for a horizontal axis wind turbine (HAWT) and the estimation based on literature data for a vertical axis one (VAWT), were conducted, and the influence on the noise spectrum was considered. The 1/3-octave sound pressure levels are obtained by semi-empirical model BPM. Resulting contour plots show a fundamental difference in the spectrum of HAWT and VAWT reflecting the two aerodynamic modes of flow that predefine the airfoil self-noise. Comparing the blade elements with a local radius of 0.875 m in the HAWT and VAWT conditions the predicted sound pressure levels are the 78.5 dB and 89.8 dB respectively. In case of the HAWT with predicted local angle of attack ranging from 2.98º to 4.63º, the acoustic spectrum will vary primarily within broadband frequency band 1.74–20 kHz. For the VAWT with the local angle of attack ranging from 4º to 20º the acoustic spectrum varies within low and broadband frequency bands 2 Hz – 20 kHz.
Źródło:
Archives of Acoustics; 2017, 42, 1; 83-91
0137-5075
Pojawia się w:
Archives of Acoustics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Markov Model of Cyber Attack Life Cycle Triggered by Software Vulnerability
Autorzy:
Hoffmann, Romuald
Powiązania:
https://bibliotekanauki.pl/articles/1844613.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Markov model
cyber-attack
vulnerability
life cycle
homogenous Markov process
continuous time Markov chain
Opis:
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be consequently exploited for their own purpose. The vulnerability may be exploited by cyber-criminals at any time while it is not patched. Cyber-attacks on organizations by exploring vulnerabilities are usually conducted through the processes divided into many stages. These cyber-attack processes in literature are called cyber-attack live cycles or cyber kill chains. The both type of cycles have their research reflection in literature but so far, they have been separately considered and modeled. This work addresses this deficiency by proposing a Markov model which combine a cyber-attack life cycle with an idea of software vulnerability life cycles. For modeling is applied homogeneous continuous time Markov chain theory.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 1; 35-41
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Secondary metabolites in the response of model Brassicaceae species to Plectosphaerella cucumerina
Autorzy:
Kulak, K.
Bednarek, P.
Powiązania:
https://bibliotekanauki.pl/articles/80369.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
conference
secondary metabolite
Brassicaceae
environmental stress
pathogen attack
tryptophan
indole glucosinolate
necrotrophic pathogen
Plectosphaerella cucumerina
Źródło:
BioTechnologia. Journal of Biotechnology Computational Biology and Bionanotechnology; 2013, 94, 3
0860-7796
Pojawia się w:
BioTechnologia. Journal of Biotechnology Computational Biology and Bionanotechnology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Heat transfer and friction factor correlation for inclined spherical ball roughened solar air heater
Autorzy:
Murmu, Ramesh
Kumar, Parmanand
Singh, Hari N.
Powiązania:
https://bibliotekanauki.pl/articles/240765.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
renewable energy
spherical ball
relative roughness pitch
relative roughness height
nusselt number
friction factor
angle of attack
Opis:
Flow mechanism under roughened solar air heater is quite complex. This paper is an effort towards determining the governing equations for heat transfer and friction factor for inclined spherical balls roughened ducts. With the availability of these equations, it is easier to predict the thermal and thermohydraulic performance of such roughened solar air heaters. The governing equations are derived based on the experimental data generated under actual outdoor condition at the test rig designed and fabricated at the terrace of the Mechanical Engineering Department, the National Institute of Technology Jamshedpur in India, in terms of roughness and flow parameters. Maximum augmentation in Nusselt number and friction factor for varying relative roughness pitch, relative roughness height, spherical ball height to diameter ratio, and angle of attack was respectively found to be of the order of 2.1 to 3.54 times, 1.87 to 3.21 times, 2.89 to 3.27 times and 1.74 to 3.56 times for Nusselt number and 0.84 to 1.79 times, 1.46 to 1.91 times, 1.67 to 2.34 times and 1.21 to 2.67 times for friction factor in comparison to non-roughened duct. The optimum roughness parameters under present investigation have been found.
Źródło:
Archives of Thermodynamics; 2020, 41, 2; 3-34
1231-0956
2083-6023
Pojawia się w:
Archives of Thermodynamics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Evaluation of probability of bridge damage as a result of terrorist attack
Autorzy:
Duchaczek, A.
Skorupka, D.
Powiązania:
https://bibliotekanauki.pl/articles/231301.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
metoda AHP
zarządzanie kryzysowe
ocena ryzyka
most
uszkodzenie
atak terrorystyczny
AHP method
crisis management
risk evaluation
bridge
damage
terrorist attack
Opis:
The paper presents an approach for evaluation of the likelihood of damage to the transportation infrastructure in the context of the terrorist attacks on the example of a number of bridges located in Wrocław (Poland). Assuming that there will be only one bridge destroyed in a given area, in order to determine the probability of damage to one of the objects, there was one of multi-criteria optimization methods used, i.e. the method of Analytical Hierarchy Process (AHP). The main advantage of the analysis carried out was that the accepted hierarchy of decision-making options could be easily explained in a scientific manner, not only with reference to personal knowledge, experience, and intuition.
Źródło:
Archives of Civil Engineering; 2013, 59, 2; 215-227
1230-2945
Pojawia się w:
Archives of Civil Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies