Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cryptographic security" wg kryterium: Temat


Wyświetlanie 1-7 z 7
Tytuł:
Implementation of modified additive lagged Fibonacci generator
Autorzy:
Mandrona, M. M.
Maksymovych, V. M.
Harasymchuk, O. I.
Kostiv, Y. M.
Powiązania:
https://bibliotekanauki.pl/articles/115530.pdf
Data publikacji:
2016
Wydawca:
Fundacja na Rzecz Młodych Naukowców
Tematy:
generator of pseudorandom bit sequence
additive lagged Fibonacci generator
cryptographic security
operation speed
statistical characteristics
generator liczb pseudolosowych
generator Fibonacciego
bezpieczeństwo kryptograficzne
szybkość operacji
parametry statystyczne
Opis:
Generator of pseudorandom bit sequence with increased cryptographic security, which is based on additive lagged Fibonacci generator, is developed. The generator structure circuit and it work principle are described in the paper. There are also given two variants of it construction that are formed on programmable logic device developed by Xilinx company. The main generator characteristics are researched, in particular: recurrence period, fastacting, statistical characteristics. In relation to the last the statistical portrait is presented, that was built with the help of NIST tests.
Źródło:
Challenges of Modern Technology; 2016, 7, 1; 3-6
2082-2863
2353-4419
Pojawia się w:
Challenges of Modern Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Theoretical and Experimental Analysis of Cryptographic Hash Functions
Autorzy:
Tchórzewski, Jacek
Jakóbik, Agnieszka
Powiązania:
https://bibliotekanauki.pl/articles/309020.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cryptographic hash functions
hashing metod
security
Opis:
The paper presents a theoretical introduction to the cryptographic hash function theory and a statistical experimental analysis of selected hash functions. The definition of hash functions, differences between them, their strengths and weaknesses are explained as well. Different hash function types, classes and parameters are described. The features of hash functions are analyzed by performing statistical analysis. Experimental analysis is performed for three certified hash functions: SHA1-160, SHA2-512 and SHA3-512. Such an analysis helps understand the behavior of cryptographic hash functions and may be very helpful for comparing the security level of the hashing method selected. The tests may serve as a basis for examination of each newly proposed hash function. Additionally, the analysis may be harness as a method for comparing future proposals with the existing functions.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 1; 125-133
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Secured Workstation to Process the Data of Different Classification Levels
Autorzy:
Zieliński, Z.
Furtak, J.
Chudzikiewicz, J.
Stasiak, A.
Brudka, M.
Powiązania:
https://bibliotekanauki.pl/articles/309351.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cryptographic protection
multilevel security
software design
UML
virtualization
Opis:
The paper presents some of the results obtained within the ongoing project related with functional requirements and design models of secure workstation for special applications (SWSA). SWSA project is directed toward the combination of the existing hardware and software virtualization with cryptography and identification technologies to ensure the security of multilevel classified data by means of some formal methods. In the paper the requirements for SWSA, its hardware and software architecture, selected security solution for data processing and utilized approach to designing secure software are presented. The novel method for secure software design employs dedicated tools to verify the confidentiality and the integrity of data using Unified Modeling Language (UML) models. In general, the UML security models are embedded in and simulated with the system architecture models, thus the security problems in SWSA can be detected early during the software design. The application of UML topology models enables also to verify the fundamental requirement for MLS systems, namely the hardware isolation of subjects from different security domains.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 3; 5-12
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Is it possible to decide whether a cryptographic protocol is secure or not?
Autorzy:
Comon, H.
Shmatikov, V.
Powiązania:
https://bibliotekanauki.pl/articles/309417.pdf
Data publikacji:
2002
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
protokół kryptograficzny
kryptografia
bezpieczeństwo
cryptographic protocols
decision procedures
logic
security
Opis:
We consider the so called "cryptographic protocols" whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives. Even if it is assumed that the cryptographic primitives are perfect, the security goals may not be achieved: the protocol itself may have weaknesses which can be exploited by an attacker. We survey recent work on decision techniques for the cryptographic protocol analysis.
Źródło:
Journal of Telecommunications and Information Technology; 2002, 4; 5-15
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Generation of random keys for cryptographic systems
Autorzy:
Borowski, M.
Leśniewicz, M.
Wicik, R.
Grzonkowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/106303.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
cryptographic systems
information security
SGCL-100M generator
random sequence
Opis:
Military and government institutions need security services for storing and exchanging classified information among them. Security of such information is important for independence of the State. At present, cryptography provides a lot of methods for information security. A one-time pad cipher may be used to ensure perfect (unconditional) security. There are many ciphers and other cryptographic transformations, which are not perfect, but ensure conditional security adequate to needs. All cryptosystems require keys and other crypto materials. These keys should satisfy numerous conditions. The basic is randomness. One of the best sources of random bit sequences used in the production of keys for special cryptosystems is a hardware generator. Now we have an electronic device, where it is possible to generate binary random sequences with the potential output rate of 100 Mbit/s. It gives us the capability of building an efficient key generation equipment for the cryptosystems to rely on the one-time pad cipher, where we need very long keys and for those based on symmetric or asymmetric transformations where many relatively short keys are needed.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 3; 75-87
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Real-time GNSS spoofing detection in maritime code receivers
Autorzy:
Zalewski, P.
Powiązania:
https://bibliotekanauki.pl/articles/359992.pdf
Data publikacji:
2014
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
GNSS
GPS
signal spoofing
transport security
non-cryptographic defence
satellite compass
Opis:
The paper presents an overview of methods for detecting the spoofing of GNSS open service code signals illustrated with the example of C/A GPS signals. GNSS signal spoofing is an attack method where a signal is transmitted that appears authentic but it induces the receiver under attack to compute an erroneous navigation solution, time, or both. Usage of commercially available satellite compasses and two antennas systems for the detection of such threat is described in detail.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2014, 38 (110); 118-124
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Application of modular computing technology to nonlinear encryption in cryptographic systems of informational security
Autorzy:
Selianinau, M.
Powiązania:
https://bibliotekanauki.pl/articles/121997.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Humanistyczno-Przyrodniczy im. Jana Długosza w Częstochowie. Wydawnictwo Uczelniane
Tematy:
zastosowanie komputerów modułowych
systemy kryptograficzne
bezpieczeństwo
application of modular computer
cryptographic systems
security
Opis:
In the present paper, we deal with the methodology of nonlinear encryption on the basis of parallel modular computing structures. The use of the minimal redundant modular number system and the interval-modular form of representation of an integer number defined by its modular code creates the computer-arithmetical basis of a cryptographic procedure under consideration. The proposed encryption algorithm is based on the index method of realization of the modular multiplicative operations.
Źródło:
Scientific Issues of Jan Długosz University in Częstochowa. Mathematics; 2016, 21; 123-133
2450-9302
Pojawia się w:
Scientific Issues of Jan Długosz University in Częstochowa. Mathematics
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-7 z 7

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies