Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Constant ransomware attacks achieve to evade multiple security perimeters, because its strategy is based on the exploitation of users-the weakest link in the security chain-getting high levels of effectiveness. In this paper, an in-depth analysis of the anatomy of the ransomware is develop, and how they combine technology with manipulation, through social engineering, to meet their goals and compromise...
The urgent task of the organization of confidential calculations in crucial objects of informatization on the basis of domestic TPM technologies (Trusted Platform Module) is considered. The corresponding recommendations and architectural concepts of the special hardware TPM module (Trusted Platform Module) which is built in a computing platform are proposed and realize a so-called “root of trust”...
This work presents the proof of concept implementation for the first hardware-based design of Moving Target Defense over IPv6 (MT6D) in full Register Transfer Level (RTL) logic, with future sights on an embedded Application-Specified Integrated Circuit (ASIC) implementation. Contributions are an IEEE 802.3 Ethernet stream-based in-line network packet processor with a specialized Complex Instruction...
In this paper, we aim at sustaining the claim that curve-based cryptographic schemes over finite fields of characteristic 2 do not provide enough security. We present algorithms to find all the possible supersingular elliptic curves which can be embedded into a predefined finite field. We also consider the case of hyperelliptic curves with genus 2, including both supersingular and ordinary cases....
The information security discipline devotes immense resources to developing and protecting a core set of protocols that encode and encrypt Internet communications. However, since the dawn of human conflict, simple traffic analysis (TA) has been used to circumvent innumerable security schemes. TA leverages metadata and hard-to-conceal network flow data related to the source, destination, size, frequency,...
With the developing digital era, the users are more vulnerable to various types of security threats such as Phishing(RAT), a serious security threat to the internet users in which the intruder sends an email which looks legitimate, where the RATs are usually downloaded invisibly with a user - requested program such as game or in this case an email attachment. RATs provide a backdoor for administrative...
A configuration management system (CMS) can control large networks of computers. A modern CMS is idempotent and describes infrastructure as code, so that it uses a description of the desired state of a system to automatically correct any deviations from a defined goal. As this requires both complete control of the slave systems and unquestioned ability to provide new instructions to slaves, the private...
In our modern society, comfort became a standard. This comfort, especially in cars can only be achieved by equipping the car with more electronic devices. Some of the electronic devices must cooperate with each other and thus they require a communication channel, which can be wired or wireless. In these days, it would be hard to sell a new car operating with traditional keys. Almost all modern cars...
Point function secret sharing(PFSS)was a special kind of function secret sharing(FSS)that was a special case of secret sharing, that the shared secret was a point function instead of a value. Motivated by the reason that the PFSS has very good application in the secure multi-party computations by investigating, and the existing PFSS scheme without threshold and inefficient. A new (t, p)–PFSS scheme...
We derive a new computational algorithm for Barrett technique for modular polynomial multiplication, termed BA-P. Residue arithmetic is applied to BA-P to obtain a new Barrett algorithm for modular polynomial multiplication (BA-MPM). The work is focused on an algorithm that carries out computation using modular arithmetic without conversion to large degree polynomials. There are several parts to this...
Internet has become a global means of communication, turned our reality upside down. It has transformed communications, to the level that it is now our chosen standard of communication. Although there are many ways to protect information from undesired access, Quantum cryptography can be used to unconditionally secure data communications by applying the laws of quantum physics which overcomes the...
A card-based protocol enables parties to securely compute a desired function by using physical cards instead of computer devices. Most of the previous works have aimed to achieve protocols with a smaller number of cards for elementary functions (e.g., AND/XOR/COPY). Mizuki and Shizuya's protocols achieve the smallest numbers of cards among the existing protocols. Their XOR and COPY protocols can be...
Quantum engineering is an emerging discipline, which involves studies of materials, devices, circuits, and architectures that are necessary to develop quantum-based systems. Recently, quantum computing has received significant attention, and large investments have been made in this field. Is this interest pure hype, or should we revise our views on computing? This Panel will address this question...
Network security is often neglected even by users. This paper deals with user authentication in a network environment and offers analysis of this topic and possibilities how to increase its security by cryptographic methods. A synthetic part provides a detailed description of the design of a simple web application to authenticate users with protection against selected attacks and also its practical...
The article considers one of the most demonstrative graphical methods of quality evaluation of pseudorandom numbers generators. Existing approaches to improve this method are described. The method, which allows increasing of the amount of useful information obtained through testing, is presented. Results of increase in productivity of the test using hybrid computing technologies are considered.
For arbitrary precision numbers, reciprocal computing algorithms based on Newton iteration is asymptotically the fastest. In this work we provide a refined algorithm based on the Newton reciprocal algorithm by Brent and Zimmermann in their MCA book. The key techniques used in the refinement are D1 balancing, clear specification, remainder operation, and economical multiplication. The refined algorithm...
Barreto-Naehrig (BN) curve is a well studied pairing friendly curve of embedding degree 12, that uses arithmetic in Fpi2. Therefore the arithmetic of Fp12 extension field is well studied. In this paper, we have proposed an efficient approach of arithmetic operation over the extension field of degree 18 by towering. Fp18 extension field arithmetic is considered to be the basis of implementing the next...
Android enabled mobiles/devices are high in use by huge number of users for various purposes. Other than for just calling, most of the users are using these devices for storing and maintaining important data such as personal information, calendar schedules, photos, videos, office documents and much more. These devices are also used for chatting through various instant chat messaging and social networking...
Cryptocurrencies have emerged as important financial software systems. They rely on a secure distributed ledger data structure; mining is an integral part of such systems. Mining adds records of past transactions to the distributed ledger known as Blockchain, allowing users to reach secure, robust consensus for each transaction. Mining also introduces wealth in the form of new units of currency. Cryptocurrencies...
This research gives the impending supremacy of P2P Botnet to educated guess its belongings on the networks and hosts once it perform malicious operations. Uninflected the Botnet traffic from regular traffic makes sharing of the info doable. It uses Address anonymization will be done by Apriori conserving Anonymization algorithmic program to regulate the attack of P2P Botnet. The on top of a technique...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.