• Title/Summary/Keyword: Security technologies

Search Result 1,856, Processing Time 0.022 seconds

Improved Differential Fault Analysis on Block Cipher PRESENT-80/128 (PRESENT-80/128에 대한 향상된 차분 오류 공격)

  • Park, Se-Hyun;Jeong, Ki-Tae;Lee, Yu-Seop;Sung, Jae-Chul;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.33-41
    • /
    • 2012
  • A differential fault analysis(DFA) is one of the most important side channel attacks on block ciphers. Most block ciphers, such as DES, AES, ARIA, SEED and so on., have been analysed by this attack. PRESENT is a 64-bit block cipher with 80/128-bit secret keys and has a 31-round SP-network. So far, several DFAs on PRESENT have been proposed. These attacks recovered 80, 128-bit secret keys of PRESENT with 8~64 fault injections. respectively. In this paper, we propose an improved DFA on PRESENT-80/128. Our attack can reduce the complexity of exhaustive search of PRESENT-80(resp. 128) to on average 1.7(resp. $2^{22.3}$) with 2(resp. 3) fault injections, From these results, our attack results are superior to known DFAs on PRESENT.

Truncated Differential Cryptanalysis on PP-1/64-128 (블록 암호 PP-1/64-128에 대한 부정 차분 공격)

  • Hong, Yong-Pyo;Lee, Yus-Sop;Jeong, Ki-Tae;Sung, Jae-Chul;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.35-44
    • /
    • 2011
  • The PP-1/64-128 block cipher support variety data block and secret key size. Also, it is suitable for hardware implementation and can much easier to apply Concurrent Error Detection(CED) for cryptographic chips compared to other block ciphers, because it has same encryption and decryption process. In this paper, we proposed truncated differential cryptanalysis of PP-1/64-128. the attack on PP-1/64-128 block cipher requires $2^{50.16}$ chosen plaintexts, $2^{46.16}$ bytes memory spaces and $2^{50.45}$ PP-1/64-128 encryption to retrieve secret key. This is the best result of currently known PP-1/64-128 differential cryptanalysis.

Digital Forensic Methodology of IaaS Cloud Computing Service (IaaS 유형의 클라우드 컴퓨팅 서비스에 대한 디지털 포렌식 연구)

  • Jeong, Il-Hoon;Oh, Jung-Hoon;Park, Jung-Heum;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.55-65
    • /
    • 2011
  • Recently, use of cloud computing service is dramatically increasing due to wired and wireless communications network diffusion in a field of high performance Internet technique. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. In a view of digital forensic investigation, it is difficult to obtain data from cloud computing service environments. therefore, this paper suggests analysis method of AWS(Amazon Web Service) and Rackspace which take most part in cloud computing service where IaaS formats presented for data acquisition in order to get an evidence.

U.S. FUEL CYCLE TECHNOLOGIES R&D PROGRAM FOR NEXT GENERATION NUCLEAR MATERIALS MANAGEMENT

  • Miller, M.C.;Vega, D.A.
    • Nuclear Engineering and Technology
    • /
    • v.45 no.6
    • /
    • pp.803-810
    • /
    • 2013
  • The U.S. Department of Energy's Fuel Cycle Technologies R&D program under the Office of Nuclear Energy is working to advance technologies to enhance both the existing and future fuel cycles. One thrust area is in developing enabling technologies for next generation nuclear materials management under the Materials Protection, Accounting and Control Technologies (MPACT) Campaign where advanced instrumentation, analysis and assessment methods, and security approaches are being developed under a framework of Safeguards and Security by Design. An overview of the MPACT campaign's activities and recent accomplishments is presented along with future plans.

Infocommunication Technologies In Education: Problems Of Implementation

  • Rebenok, Vadym;Al-Namri, Roza;Butko, Oleksandr;Fedorenko, Viktoriia;Tereshchenko, Olha;Tsimokh, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.41-44
    • /
    • 2021
  • This article proposes to consider the experience of using information and communication technologies in educational processes and social practices of Ukrainian universities. The history of the introduction of information and communication technologies in the development of the higher education system is considered, the system of organizing the information space of universities is investigated. The distinctive features of the structure of a single information space, as well as distance e-learning technologies are highlighted. Empirical material obtained in the course of sociological research is used to discuss specific examples of the use of ICT in universities.

Information Technologies In Teaching: The Basis Of Students' Knowledge

  • Morska, Nataliia;Fedorenko, Olena;Davydova, Olha;Andreev, Vitaly;Bohatyryova, Galina;Shcherbakova, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.44-53
    • /
    • 2021
  • The paper proposes to consider information technologies and their application in the educational process as a preparation of presentation material for students of higher educational institutions. The definition and place of information technologies in the educational space are considered. The object of research of this work is the pedagogical technology of presentation of educational information, which substantiates the pedagogical technology of visualization of educational information in higher education, as well as determine its composition and structure. The practical side of pedagogical technology of educational information presentation is considered.

Application Of Innovative Technologies In Higher Education Institutions Of Ukraine: Forms And Methods

  • Dovgal, Olena;Havrylova, Olena;Potryvaieva, Natalia;Tolstova, Natalia;Ostapchuk, Taras;Onyshchenko, Nataliіa
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.43-47
    • /
    • 2021
  • In the course of this article, the concept of "innovation" was considered and analyzed, which is considered not only as a subject, something new, but also as a process. The process of introducing something new into life, and in our case, into the educational process. Innovative educational technologies are varied and plentiful. In this article, the most commonly used. Among them: the use of ICT, game techniques, the portfolio method, personality-oriented, information support of the learning process, educational and health-saving technologies, and others.

Features Of The Implementation Of Distance Education Institutions Of Higher Education In Ukraine

  • Soroka, Maryna;Shtefiuk, Valeriia;Tatarenko, Maryna;Babchenko, Yanina;Ivashchenko, Irina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.266-270
    • /
    • 2021
  • The article clarifies and divorces the concepts of distance learning systems "distance learning", "distance education", "distance technologies", "open education". The central concept of the DO system is "distance learning"; - an assessment of the use of distance technologies in the system of higher professional education in Ukraine was carried out, which showed that the dominant teaching technology at the moment is the technology of teaching using cases (case technology on paper and electronic media). It is determined that distance technologies based on the active use of technical teaching aids (network technologies, telecommunication technologies) find little use in the system of higher professional education in Ukraine.

Application Of Electronic Information And Educational Environment In Innovative Educational Activities

  • Taranenko, Yuliia;Buhaiets, Nataliia;Kyrychenko, Rymma;Cherniak, Daryna;Mnozhynska, Ruslana;Paskevska, Iuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.366-370
    • /
    • 2022
  • The article deals with the theoretical and methodological foundations of innovative approaches in the modern education system. The issues of introducing computerized and telecommunication technologies are characterized, which allow switching to distance learning (DL), which is a promising form of the system of open education support in the modern educational process. Special attention is paid to the study of practical technologies of vocational training and the activities of a teacher and innovative areas of vocational training of students.

The Role of Computer Technologies in Contemporary Jewelry

  • Romanenkova, Julia;Bratus, Ivan;Gnatiuk, Liliia;Zaitseva, Veronika;Karpenko, Olga;Misko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.71-76
    • /
    • 2022
  • The article aims to consider the role of computer technologies in contemporary jewelry art. The importance of computer programming, 3D-modeling and 3D-printing for the process of jewelry creating, its advertising and sales is emphasized. Both the positive features of the possibility of using computer technologies in jewelry and their shortcomings are considered. The process of changing the nature of jewelry design after the start of the use of digital technologies is highlighted. The issue of changing the perception and evaluation of a work of jewelry art, the creation of which uses mechanization, has been updated.