2022
Постійне посилання на фонд
Переглянути
Перегляд 2022 за Ключові слова "004.056.5"
Зараз показуємо 1 - 3 з 3
Результатів на сторінці
Налаштування сортування
Документ Відкритий доступ Fast secure calculation of the open key cryptography procedures for IoT in clouds(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Mirataei, Alireza; Markovskyi, Oleksandr; Haidukevych, MariaThe article proposes a method for accelerating the implementation of cryptographic data protection mechanisms on embedded IoT terminal microcontrollers, the basic operation of which is the modular exponentiation of high-capacity numbers. The method is based on the use of remote computer systems to speed up calculations and provides protection against the reconstruction of the secret keys of cryptosystems from data transmitted to the cloud. It has been theoretically and experimentally proven that the method allows, on average, 50 times, to speed up the implementation of cryptographic data protection protocols in IoT while providing a level of security sufficient for most practical applications.Документ Відкритий доступ Modern information systems security means(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Klymenko, Iryna Anatoliivna; Verner, A. I.The article provides a thorough review of current research on information security means available for the endpoint protection. In the first chapter, categories and features of types of threats to information security are considered. The second chapter provides a general description of threat analysis methods, compares static, dynamic, hybrid malware analysis methods and highlights the advantages and disadvantages of each of them. The third chapter considers the modern methods of detecting and mitigating threats to information systems, as well as the peculiarities of their implementation. The purpose of this article is to provide a general overview of the current state of information security and existing modern methods of protecting information systems from possible threats.Документ Відкритий доступ Organization of fast exponentiation on galois fields for cryptographic data protection systems(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Halil, Al-Mrayt Ghassan Abdel Jalil; Markovskiy, Oleksandr; Stupak, AlonaThe article proposes the organization of accelerated execution of the basic operation of a wide range of cryptographic algorithms with a public key - exponentiation on finite Galois fields GF(2n ). Acceleration of the computational implementation of this operation is achieved by organizing the processing of several bits of the code at once during squaring on Galois fields. This organization is based on the use of polynomial squared properties, Montgomery group reduction, and extensive use of previous calculations. Procedures for performing basic operations of exponentiation on Galois fields are developed in detail, the work of which is illustrated by numerical examples. It has been proved that the proposed organization can increase the computational speed of this operation by 2.4 times, which is significant for cryptographic applications.