Theoretical and Applied Cybersecurity
Постійне посилання на фонд
ISSN 2708-1397 (Online), ISSN 2664-2913 (Print)
Періодичність: 4 рази на рік
Рік заснування: 2018
Тематика: теоретичні та криптографічні проблеми кібернетичної безпеки; математичні методи, моделі та технології дослідження безпечного функціонування кіберпростору; алгоритми та методи запобігання і протидії кібератакам; безпека промислових систем та систем критичної інфраструктури; кібербезпека Інтернету речей; інтелектуальні методи забезпечення кібербезпеки; проблемні питання сервісів анонімізації; дослідження вразливостей програмного коду і розробка безпечних програм; соціальний інжиніринг та методи протидії деструктивним впливам на свідомість у кіберпросторі; державна політика у сфері кібернетичної безпеки.
Офіційний сайт: https://tacs.ipt.kpi.ua/
Рік заснування: 2018
Тематика: теоретичні та криптографічні проблеми кібернетичної безпеки; математичні методи, моделі та технології дослідження безпечного функціонування кіберпростору; алгоритми та методи запобігання і протидії кібератакам; безпека промислових систем та систем критичної інфраструктури; кібербезпека Інтернету речей; інтелектуальні методи забезпечення кібербезпеки; проблемні питання сервісів анонімізації; дослідження вразливостей програмного коду і розробка безпечних програм; соціальний інжиніринг та методи протидії деструктивним впливам на свідомість у кіберпросторі; державна політика у сфері кібернетичної безпеки.
Офіційний сайт: https://tacs.ipt.kpi.ua/
Переглянути
Перегляд Theoretical and Applied Cybersecurity за Ключові слова "001.8"
Зараз показуємо 1 - 7 з 7
Результатів на сторінці
Налаштування сортування
Документ Відкритий доступ Comparative Analysis of the Cybersecurity Indices and Their Applications(Igor Sikorsky Kyiv Polytechnic Institute, 2019) Kravets, V. M.Документ Відкритий доступ Features of Ensuring Cybersecurity of the Critical Infrastructure of the State(Igor Sikorsky Kyiv Polytechnic Institute, 2020) Danyk, Yuriy; Briggs, Chad; Maliarchuk, TamaraДокумент Відкритий доступ Methodical and Applied Aspects of Creation and Application of Cyber Ranges(Igor Sikorsky Kyiv Polytechnic Institute, 2019) Danyk, YuriyДокумент Відкритий доступ On Multivariate Algorithms of Digital Signatures Based on Maps of Unbounded Degree Acting on Secure El Gamal Type Mode(Igor Sikorsky Kyiv Polytechnic Institute, 2022) Ustimenko, V. O.Multivariate cryptography studies applications of endomorphisms of K[x1 x2, …, xn] where K is a finite commutative ring given in the standard form xi →f1 (x1, x2,…, xn), i=1, 2,…, n. The importance of this direction for the constructions of multivariate digital signatures systems is well known. Close attention of researchers directed towards studies of perspectives of efficient quadratic unbalanced rainbow oil and vinegar system (RUOV) presented for NIST postquantum certification. Various cryptanalytic studies of these signature systems were completed. During Third Round of NIST standardisation projects ROUV digital signature system were rejected. Recently some options to seriously modify theses algorithms as well as all multivariate signature systems which alow to avoid already known attacks were suggested. One of the modifications is to use protocol of noncommutative multivariate cryptography based on platform of endomorphisms of degree 2 and 3. The secure protocol allows safe transfer of quadratic multivariate map from one correspondent to another. So the quadratic map developed for digital signature scheme can be used in a private mode. This scheme requires periodic usage of the protocol with the change of generators and the modification of quadratic multivariate maps. Other modification suggests combination of multivariate map of unbounded degree of size O(n) and density of each fi of size O(1). The resulting map F in its standard form is given as the public rule. We suggest the usage of the last algorithm on the secure El Gamal mode. It means that correspondents use protocols of Noncommutative Cryptography with two multivariate platforms to elaborate safely a collision endomorphism G: xi → gi of linear unbounded degree such that densities of each gi are of size O(n2 ). One of correspondents generates mentioned above F and sends F+G to his/her partner. The security of the protocol and entire digital signature scheme rests on the complexity of NP hard word problem of finding decomposition of given endomorphism G of K[x1,x2,…,xn] into composition of given generators 1G, 2G, …tG, t>1 of the semigroup of End(K[x1,x2,…,xn]). Differently from the usage of quadratic map on El Gamal mode the case of unbounded degree allows single usage of the protocol because the task to approximate F via interception of hashed messages and corresponding signatures is unfeasible in this case.Документ Відкритий доступ On the cryptosystems based on two Eulerian transformations defined over the commutative rings Z2s, s>1(Igor Sikorsky Kyiv Polytechnic Institute, 2024) Ustimenko, VasylWe suggest the family of ciphers sEn, n = 2, 3, ... with the space of plaintexts (Z2^s)^n, s > 1, such that the encryption map is the composition of kinds G = G1 A1 G2 A2, where Ai are the affine transformations from AGLn(Z2^s) preserving the variety (Z*2^s)^n. Eulerian endomorphisms Gi, i = 1, 2, of K[x1, x2, ..., xn] move xi to the monomial term M x1^d(1) x2^d(2) ... xn^d(n), M in Z2^s, and act on (Z2^s)^n as bijective transformations. The cipher is converted to a protocol-supported cryptosystem. Protocols of Noncommutative Cryptography implemented on the platform of Eulerian endomorphisms are used for the delivery of Gi and Ai from Alice to Bob. One can use twisted Diffie-Hellman protocols, which security rests on the complexity of the Conjugacy Power problem, or the hidden tame homomorphism protocol, which security rests on the word decomposition problem. Instead of delivering Gi, Alice and Bob can elaborate these transformations via the inverse twisted Diffie-Hellman protocol, implemented on the platform of tame Eulerian transformations of (Z*2^s)^n. The cost of a single protocol is O(n^3), and the cost of computing the reimage of the used nonlinear map is O(n^2). So, the verification of nt, t ≥ 1, signatures takes time O(nt + 2). Instead of the inverse twisted Diffie-Hellman protocol, correspondents can use the inverse hidden tame homomorphism protocol, which rests on the complexity of word decomposition for tame Eulerian transformations. We use natural bijections between Z2^s and Z2^(s-1), Z2^s and finite field F2^(s-1), and Z2^s and Boolean ring B(s-1) of order 2^(s-1) to modify the family of ciphers or cryptosystems via the change of AGLn(Z2^s) for AGLn(K), where K is one of the rings Z2^(s-1), F2^(s-1), or B(s-1). New ciphers are defined via the multiplication of two different commutative rings Z2^s and K. This does not allow treating them as stream ciphers of multivariate cryptography and using corresponding cryptanalytic techniques. An adversary is not able to use known cryptanalytical methods such as linearization attacks. We discuss the option of changing the elements of AGLn(Z2^s) or AGLn(K) for nonlinear multivariate transformations F of (Z2^s)^n or K^n with a symmetric trapdoor accelerator T, i.e., a piece of information such that the knowledge of T allows computing the value F(p) for an arbitrarily chosen p in P in time O(n^2) and solving the equation of the form F(x) = c for each c in C in time O(n^2).Документ Відкритий доступ On the usage of postquantum protocols defined in terms of transformation semigroups and their homomophisms(Igor Sikorsky Kyiv Polytechnic Institute, 2020) Ustimenko, VasylДокумент Відкритий доступ Technique of testing cyber vulnerabilities and quality of Cyberphysical software systems(Igor Sikorsky Kyiv Polytechnic Institute, 2021) Danyk, Yuriy; Vysochanska, VictoriyaCyber vulnerability testing and software quality cyberphysical systems (complexes) is an important task in ensuring its reliability and security. When working with several variations of products or their versions, testing all software for every variation is resource intensive and irrational. To implement effective technological and economical quality of testing and cyber vulnerabilities of cyberphysical systems software (complexes) in terms of its increasing complexity, both in time (when considering the version) and in space (when considering variation) and lack of access to program code should be developed as follows new methods. Those methods will allow to use the results of previous tests and focus on the most important, for their testing, not yet tested parts. This is possible using regression testing methods and the appropriate choice of test cases and their prioritization to identify and address software issues and cyber vulnerabilities. Of course, testing variations and versions without access to source code, is an extremely problematic and costly task. The article analyzes the stages of regression testing and proposes an improved method for selecting test cases for testing of cyber vulnerabilities of software of cyberphysical systems (complexes) without access to program code. During the study, an analysis of the achievements in this area was conducted, investigating leading experts works. This article also identifies and compares the effectiveness of prioritized and non-prioritized test cases using the average percent detection rate (APFD). As a result of the study, new metrics for measuring test coverage are presented.