Theoretical and applied cybersecurity最新文献

筛选
英文 中文
Quantum Distinguishing Attacks on Generalized Feistel Schemes 广义Feistel方案的量子区分攻击
Theoretical and applied cybersecurity Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.279992
Andrii Fesenko, Anastasiia Zvychaina
{"title":"Quantum Distinguishing Attacks on Generalized Feistel Schemes","authors":"Andrii Fesenko, Anastasiia Zvychaina","doi":"10.20535/tacs.2664-29132023.1.279992","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.279992","url":null,"abstract":"","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135109033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposing of suggestive influence detection and classification method based on fuzzy logic and feature driven analysis 提出了一种基于模糊逻辑和特征驱动分析的暗示性影响检测与分类方法
Theoretical and applied cybersecurity Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.283565
Yuliia Nakonechna
{"title":"Proposing of suggestive influence detection and classification method based on fuzzy logic and feature driven analysis","authors":"Yuliia Nakonechna","doi":"10.20535/tacs.2664-29132023.1.283565","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.283565","url":null,"abstract":"This research proposes an approach to identify and classify tools utilized in information operations that aim to exert suggestive influence. The proposed method combines fuzzy sets theory and fuzzy inference methods with a feature-based analysis approach. By employing this approach, the study focuses on identifying and categorizing tools such propaganda, fake, disinformation, manipulation, and artificial narrative. This framework provides a comprehensive and nuanced understanding of the various tactics employed in information operations, allowing for improved analysis and mitigation strategies.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135108163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Frequency Analysis of Russian Propaganda Telegram Channels 俄罗斯宣传电报频道频率分析
Theoretical and applied cybersecurity Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.277647
Kyrylo Kiforchuk
{"title":"Frequency Analysis of Russian Propaganda Telegram Channels","authors":"Kyrylo Kiforchuk","doi":"10.20535/tacs.2664-29132023.1.277647","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.277647","url":null,"abstract":"On 24 February 2022 Russia launched a full-scale invasion of Ukraine. In addition to large-scale military operations against Ukraine, many information attacks were organized. These attacks began before the invasion: for several months, Russia has been actively paving the way for the war by launching different types of information operations in cyberspace. As an example, Russian propaganda media were promoting the idea of “Russian world”, which calls into a question the existence of Ukraine as an independent state and justifies Russian military aggression. In this work, Russian propaganda Telegram channels were analyzed using term frequency analysis with bag-of-words technique. For this analysis, text data from Telegram propaganda channels was collected and processed. The obtained results revealed different patterns in Russian propaganda against Ukraine via Telegram channels.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135109032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Forgery Attack on the Post-Quantum AJPS-2 Cryptosystem and Modification of the AJPS-2 Cryptosystem by Changing the Class of Numbers Used as a Module 后量子AJPS-2密码系统的伪造攻击及AJPS-2密码系统的修改
Theoretical and applied cybersecurity Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.286166
Dariya Yadukha
{"title":"The Forgery Attack on the Post-Quantum AJPS-2 Cryptosystem and Modification of the AJPS-2 Cryptosystem by Changing the Class of Numbers Used as a Module","authors":"Dariya Yadukha","doi":"10.20535/tacs.2664-29132023.1.286166","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.286166","url":null,"abstract":"In recent years, post-quantum (quantum-resistant) cryptography has been actively researched, in particular, due to the National Institute of Standards and Technology's (NIST) Post-Quantum Cryptography Competition (PQC), which has been running since 2017. One of the participants in the first round of the competition is the Mersenne-756839 key encapsulation mechanism based on the AJPS-2 encryption scheme. The arithmetic modulo Mersenne number is used to construct the cryptoprimitives of the AJPS family. In this paper, we propose a forgery attack on the AJPS-2 cryptosystem using an active eavesdropper, and two modifications of the post-quantum AJPS-2 cryptosystem, namely, the modification of AJPS-2 using the arithmetic modulo generalized Mersenne number and Crandall number. Moreover, new algebraic problems are defined, on the complexity of which the security of the created modifications is based. The advantages of these modifications are the extension of the number class used as a module in the cryptosystem and the security against the forgery attack with the active eavesdropper, which was successful in the original AJPS-2.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135108151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Analysis Template Attacks on AES-128 Hardware Implementations and Protection Against Them AES-128硬件实现的功耗分析模板攻击及防范
Theoretical and applied cybersecurity Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.281307
Mykola Graivoronskyi, Andrii Dehtyariov
{"title":"Power Analysis Template Attacks on AES-128 Hardware Implementations and Protection Against Them","authors":"Mykola Graivoronskyi, Andrii Dehtyariov","doi":"10.20535/tacs.2664-29132023.1.281307","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.281307","url":null,"abstract":"The purpose of this work is to research AES-128 power analysis template attack and propose a practical way to mitigate such kind of side-channel attacks. The research includes a review of power analysis side-channel attacks, an experiment with the collection of Atmega328PU chip power samples using Hantek 6022BE oscilloscope, processing collected data, and modeling – building a statistical template of the device and analyzing parameters of the side-channel attack.The work is focused on preparation and carrying out the experiment. The experimental bench layout and procedures for collecting and processing the data are considered in detail. The result of this work is the confirmation of the effectiveness of power analysis template attacks on AES-128 for Arduino Uno hardware, and a mechanism for mitigating such kind of attacks on the particular hardware and software implementation. Research materials described in the current work could be used for developing other side-channel template attack mitigation mechanisms for other cryptographic implementations.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135108160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信