首页 > 最新文献

Information & Security: An International Journal最新文献

英文 中文
A Human Rights and Ethical Lens on Security and Human Dignity: The Case Study of Syrian Asylum Seekers 人权与伦理视角下的安全和人的尊严:叙利亚寻求庇护者个案研究
Pub Date : 1900-01-01 DOI: 10.11610/isij.3302
F. Vietti, Roberto Franzini Tibaldeo
The article tackles the plural and evolving concepts of security by ana-lysing their relation to human rights and ethics. Although the general impression is that seldom the security discourse is associated with the respect of human rights and ethics, at least from a theoretical point of view security is indeed intertwined with those normative features (first thesis). Moreover, ethics and human rights can be valuably and usefully employed to clarify issues related to security and eventually to suggest improvements in the political management of security issues (second thesis). We argue our theses by focusing on a case study of particular relevance to the present day debate on security: the Syrian asylum seekers headed to Europe. In our ethical and human rights enquiry into this case study we consider multiple as-pects related to security (‘de jure’ or normative, ‘de facto’ and perceptive-societal) and the interpretative lens provided by ethics and human rights sheds light on the crucial and manifold centrality played by the notion of human dignity.
本文通过分析安全概念与人权和伦理的关系,论述了安全概念的多元性和演变性。虽然一般的印象是,安全话语很少与尊重人权和道德联系在一起,但至少从理论的角度来看,安全确实与这些规范特征交织在一起(第一篇论文)。此外,伦理和人权可以有价值和有用地用于澄清与安全有关的问题,并最终建议改进安全问题的政治管理(第二篇论文)。我们通过关注一个与当今安全辩论特别相关的案例研究来论证我们的论点:前往欧洲的叙利亚寻求庇护者。在我们对这个案例研究的道德和人权调查中,我们考虑了与安全相关的多个方面(“法律上”或规范,“事实”和感知社会),道德和人权提供的解释性镜头揭示了人类尊严概念所发挥的关键和多方面的中心作用。
{"title":"A Human Rights and Ethical Lens on Security and Human Dignity: The Case Study of Syrian Asylum Seekers","authors":"F. Vietti, Roberto Franzini Tibaldeo","doi":"10.11610/isij.3302","DOIUrl":"https://doi.org/10.11610/isij.3302","url":null,"abstract":"The article tackles the plural and evolving concepts of security by ana-lysing their relation to human rights and ethics. Although the general impression is that seldom the security discourse is associated with the respect of human rights and ethics, at least from a theoretical point of view security is indeed intertwined with those normative features (first thesis). Moreover, ethics and human rights can be valuably and usefully employed to clarify issues related to security and eventually to suggest improvements in the political management of security issues (second thesis). We argue our theses by focusing on a case study of particular relevance to the present day debate on security: the Syrian asylum seekers headed to Europe. In our ethical and human rights enquiry into this case study we consider multiple as-pects related to security (‘de jure’ or normative, ‘de facto’ and perceptive-societal) and the interpretative lens provided by ethics and human rights sheds light on the crucial and manifold centrality played by the notion of human dignity.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128404640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security 如果区块链不能被屏蔽怎么办?加密货币与国际安全
Pub Date : 1900-01-01 DOI: 10.11610/isij.4301
Sean Costigan, G. Gleason
Pariah states and criminal gangs are often early adopters of disruptive technologies. With blockchain, the possibilities for circumventing controls and systems— or creating new ways of business—are rich grounds for such early adopters. What has gone widely ignored in the buzz around cryptocurrencies is the role that states play and their changing perspectives on the matter. This article analyzes the geo-strategic implications of a suite of technologies that has the possibility of altering core economic tenets about money and, along the way, attracting the attention of those who would skirt the law. A R T I C L E I N F O : RECEIVED: 21 MAY 2019
贱民国家和犯罪团伙往往是颠覆性技术的早期采用者。有了区块链,规避控制和系统的可能性——或者创造新的商业方式——为这些早期采用者提供了丰富的基础。在围绕加密货币的讨论中,被广泛忽视的是各州在其中扮演的角色,以及它们对这一问题不断变化的看法。本文分析了一套技术的地缘战略影响,这些技术有可能改变有关货币的核心经济原则,并在此过程中吸引那些想要规避法律的人的注意。收到日期:2019年5月21日
{"title":"What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security","authors":"Sean Costigan, G. Gleason","doi":"10.11610/isij.4301","DOIUrl":"https://doi.org/10.11610/isij.4301","url":null,"abstract":"Pariah states and criminal gangs are often early adopters of disruptive technologies. With blockchain, the possibilities for circumventing controls and systems— or creating new ways of business—are rich grounds for such early adopters. What has gone widely ignored in the buzz around cryptocurrencies is the role that states play and their changing perspectives on the matter. This article analyzes the geo-strategic implications of a suite of technologies that has the possibility of altering core economic tenets about money and, along the way, attracting the attention of those who would skirt the law. A R T I C L E I N F O : RECEIVED: 21 MAY 2019","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127147907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
E-Models and Methods for Project Management in the Public Area 公共领域项目管理的电子模型与方法
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1106
G. Pavlov, J. Karakaneva
a. Transform operational need into a description of system performance parameters and a system configuration through the use of an iterative process of definition, synthesis, analysis, design, test, and evaluation; b. Integrate related technical parameters and ensure compatibility of all physical, functional, and program interfaces in a manner that optimises the total system definition and design; c. Integrate reliability, maintainability, safety, survivability, human, and other requirements into the total engineering effort to meet cost, schedule, and technical performance objectives.
a.通过使用定义、综合、分析、设计、测试和评估的迭代过程,将操作需求转化为对系统性能参数和系统配置的描述;b.以优化整个系统定义和设计的方式整合相关技术参数,确保所有物理、功能和程序接口的兼容性;c.将可靠性、可维护性、安全性、生存性、人力和其他要求整合到整个工程工作中,以满足成本、进度和技术性能目标。
{"title":"E-Models and Methods for Project Management in the Public Area","authors":"G. Pavlov, J. Karakaneva","doi":"10.11610/ISIJ.1106","DOIUrl":"https://doi.org/10.11610/ISIJ.1106","url":null,"abstract":"a. Transform operational need into a description of system performance parameters and a system configuration through the use of an iterative process of definition, synthesis, analysis, design, test, and evaluation; b. Integrate related technical parameters and ensure compatibility of all physical, functional, and program interfaces in a manner that optimises the total system definition and design; c. Integrate reliability, maintainability, safety, survivability, human, and other requirements into the total engineering effort to meet cost, schedule, and technical performance objectives.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bulgaria in NATO:New Roles and Capabilities of the Navy 保加利亚在北约:海军的新角色和能力
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1301
Emil Lyutzkanov
In a comprehensive manner this article presents roles and missions of Bulgaria’s Navy, and the capabilities it develops to deal with the 21 century security challenges in cooperation with other services, security organizations, and allied navies. In the process of transformation, the Navy has developed ambitious plans to insert advanced technologies, commensurate to its new missions and tasks. This article looks specifically at plans to introduce advanced communications and information technologies in order to achieve required naval capabilities and to facilitate individual, crew, and staff training. New Roles, Missions, and Responsibilities of the Navies Facing 21 st Century Security Challenges Historically, the term ―national security‖ had various specific definitions and dimensions; however, they all had one common meaning – the reliable protection of the territorial integrity and the independence of a sovereign state. The challenge in this respect was how to approach and in what manner to realize this ―national security.‖ The turmoil of the political and societal changes in Europe in the 1990s and thereafter, the dissolution of a number of multinational states, e.g., the Soviet Union and the Socialist Federal Republic of Yugoslavia, the unification of Germany, the processes of globalization and unification of Europe, as well as the aggravation of demographic, ecological, economic and social problems and, most importantly, the expansion of the international terrorism and organized crime, brought forward a number of issues related to the notion of national security and the ways to realize it. In the last few years, the notion of national security went beyond the boundaries of a separate state. Of increasing importance are the notions of Individual Security, Collective Security, Bulgaria in NATO: New Roles and Capabilities of the Navy 10 Figure 1: Constituents of the Cooperative Security System. Collective Defense, and Promotion of Stability, constituting a system for common /cooperative/ security (This interaction of terms and notions is presented graphically in Figure 1). Security is based not only on military force and government actions, activities of national institutions and non-governmental organizations within a state, but also on international (bilateral and multilateral) treaties and organizations. In this respect I am proud to state that, since 1991, Bulgaria’s naval forces stand firmly behind the Atlantic idea. The Navy incorporated in its plans variety of activities aimed to increase the confidence and to foster collective security in the Black Sea region and to promote stability. Even prior to the ―Partnership for Peace‖ Initiative, in 1993 Varna hosted the international symposium ―Black Sea Naval Review‖—the first of its kind—on the topic ―The Naval Forces in the New Geopolitical Environment.‖ Under excellent organization, more than 100 participants form 13 countries actively discussed 26 reports. As a continuation of this effort,
本文以全面的方式介绍了保加利亚海军的角色和任务,以及它与其他军种、安全组织和盟国海军合作应对21世纪安全挑战的能力。在转型过程中,海军制定了雄心勃勃的计划,以插入与其新使命和任务相称的先进技术。本文特别着眼于引进先进通信和信息技术的计划,以实现所需的海军能力,并促进个人、船员和工作人员的培训。面对21世纪安全挑战的海军新角色、新使命、新责任历史上,“国家安全”一词有各种具体的定义和维度;然而,它们都有一个共同的含义——可靠地保护主权国家的领土完整和独立。这方面的挑战是如何处理和以何种方式实现这一国家安全。‖20世纪90年代及以后欧洲政治和社会变化的动荡,苏联和南斯拉夫社会主义联邦共和国等一些多民族国家的解体,德国的统一,欧洲的全球化和统一进程,以及人口、生态、经济和社会问题的加剧,最重要的是国际恐怖主义和有组织犯罪的扩大,提出了国家安全观及其实现途径的若干相关问题。在过去的几年里,国家安全的概念已经超越了一个独立国家的边界。个人安全、集体安全、保加利亚在北约:海军的新角色和能力等概念日益重要。集体防御和促进稳定,构成一个共同/合作/安全的体系(这种术语和概念的相互作用如图1所示)。安全不仅基于军事力量和政府行动,国家机构和非政府组织在一个国家内的活动,还基于国际(双边和多边)条约和组织。在这方面,我自豪地指出,自1991年以来,保加利亚海军部队坚定地支持大西洋构想。海军在其计划中纳入了旨在增强信心和促进黑海地区集体安全并促进稳定的各种活动。甚至在“和平伙伴关系”倡议之前,1993年瓦尔纳主办了国际研讨会-黑海海军评论-这是第一次关于新地缘政治环境中的海军力量的主题。‖在出色的组织下,来自13个国家的100多名与会者积极讨论了26份报告。作为这一努力的延续,同年保加利亚举办了第一次有国际参与的“微风”系列国家海军演习。
{"title":"Bulgaria in NATO:New Roles and Capabilities of the Navy","authors":"Emil Lyutzkanov","doi":"10.11610/ISIJ.1301","DOIUrl":"https://doi.org/10.11610/ISIJ.1301","url":null,"abstract":"In a comprehensive manner this article presents roles and missions of Bulgaria’s Navy, and the capabilities it develops to deal with the 21 century security challenges in cooperation with other services, security organizations, and allied navies. In the process of transformation, the Navy has developed ambitious plans to insert advanced technologies, commensurate to its new missions and tasks. This article looks specifically at plans to introduce advanced communications and information technologies in order to achieve required naval capabilities and to facilitate individual, crew, and staff training. New Roles, Missions, and Responsibilities of the Navies Facing 21 st Century Security Challenges Historically, the term ―national security‖ had various specific definitions and dimensions; however, they all had one common meaning – the reliable protection of the territorial integrity and the independence of a sovereign state. The challenge in this respect was how to approach and in what manner to realize this ―national security.‖ The turmoil of the political and societal changes in Europe in the 1990s and thereafter, the dissolution of a number of multinational states, e.g., the Soviet Union and the Socialist Federal Republic of Yugoslavia, the unification of Germany, the processes of globalization and unification of Europe, as well as the aggravation of demographic, ecological, economic and social problems and, most importantly, the expansion of the international terrorism and organized crime, brought forward a number of issues related to the notion of national security and the ways to realize it. In the last few years, the notion of national security went beyond the boundaries of a separate state. Of increasing importance are the notions of Individual Security, Collective Security, Bulgaria in NATO: New Roles and Capabilities of the Navy 10 Figure 1: Constituents of the Cooperative Security System. Collective Defense, and Promotion of Stability, constituting a system for common /cooperative/ security (This interaction of terms and notions is presented graphically in Figure 1). Security is based not only on military force and government actions, activities of national institutions and non-governmental organizations within a state, but also on international (bilateral and multilateral) treaties and organizations. In this respect I am proud to state that, since 1991, Bulgaria’s naval forces stand firmly behind the Atlantic idea. The Navy incorporated in its plans variety of activities aimed to increase the confidence and to foster collective security in the Black Sea region and to promote stability. Even prior to the ―Partnership for Peace‖ Initiative, in 1993 Varna hosted the international symposium ―Black Sea Naval Review‖—the first of its kind—on the topic ―The Naval Forces in the New Geopolitical Environment.‖ Under excellent organization, more than 100 participants form 13 countries actively discussed 26 reports. As a continuation of this effort,","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stakeholder Engagement Framework 利益相关者参与框架
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.3802
P. Smith
Early Childhood Development), or in the case of some materials, by third parties (third party materials). No part may be reproduced by any process except in accordance with the provisions of the Copyright Act 1968, the National Education Access Licence for Schools (NEALS) (see below) or with permission. An educational institution situated in Australia which is not conducted for profit, or a body responsible for administering such an institution may copy and communicate the materials, other than third party materials, for the educational purposes of the institution.
幼儿发展),或者在某些材料的情况下,由第三方提供(第三方材料)。除非按照1968年版权法、国家学校教育准入许可证(NEALS)(见下文)的规定或获得许可,否则不得以任何方式复制本文的任何部分。位于澳大利亚的非营利性教育机构或负责管理此类机构的机构可以复制和传播这些材料,但第三方材料除外,用于该机构的教育目的。
{"title":"Stakeholder Engagement Framework","authors":"P. Smith","doi":"10.11610/ISIJ.3802","DOIUrl":"https://doi.org/10.11610/ISIJ.3802","url":null,"abstract":"Early Childhood Development), or in the case of some materials, by third parties (third party materials). No part may be reproduced by any process except in accordance with the provisions of the Copyright Act 1968, the National Education Access Licence for Schools (NEALS) (see below) or with permission. An educational institution situated in Australia which is not conducted for profit, or a body responsible for administering such an institution may copy and communicate the materials, other than third party materials, for the educational purposes of the institution.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131034765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks 考虑故障和网络攻击的关键基础设施监控多无人机任务规划
Pub Date : 1900-01-01 DOI: 10.11610/isij.4906
V. Kharchenko, I. Kliushnikov, H. Fesenko, O. Illiashenko
{"title":"Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks","authors":"V. Kharchenko, I. Kliushnikov, H. Fesenko, O. Illiashenko","doi":"10.11610/isij.4906","DOIUrl":"https://doi.org/10.11610/isij.4906","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132859083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Standards Integration in E-Learning, Simulations, and Technical Manuals 电子学习、模拟和技术手册中的标准集成
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1406
J. Krinock
istance Learning (DL), Computer Based Training (CBT) and e-Learning today encompass a broad range of technologies and teaching theories and practices, all of which are being aggressively explored by various groups, enterprises, industries and interests around the world. This huge arena of exploration involves incalculable combinations of technologies and learning theories. Where all of this will lead cannot be clearly projected, neither in terms of the technologies that will apply tomorrow, nor how the teaching methods encompassed and affected by those technologies will be shaped and altered.
远程学习(DL)、基于计算机的培训(CBT)和电子学习如今涵盖了广泛的技术、教学理论和实践,所有这些都被世界各地的各种团体、企业、行业和利益团体积极探索。这个巨大的探索领域涉及到不可估量的技术和学习理论的结合。所有这一切将导致什么结果,无论是从明天将应用的技术方面,还是从这些技术所包含和影响的教学方法将如何形成和改变方面,都无法清楚地预测。
{"title":"Standards Integration in E-Learning, Simulations, and Technical Manuals","authors":"J. Krinock","doi":"10.11610/ISIJ.1406","DOIUrl":"https://doi.org/10.11610/ISIJ.1406","url":null,"abstract":"istance Learning (DL), Computer Based Training (CBT) and e-Learning today encompass a broad range of technologies and teaching theories and practices, all of which are being aggressively explored by various groups, enterprises, industries and interests around the world. This huge arena of exploration involves incalculable combinations of technologies and learning theories. Where all of this will lead cannot be clearly projected, neither in terms of the technologies that will apply tomorrow, nor how the teaching methods encompassed and affected by those technologies will be shaped and altered.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131976868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public Key Generation Principles Impact Cybersecurity 公钥生成原则影响网络安全
Pub Date : 1900-01-01 DOI: 10.11610/isij.4717
N. Stoianov, Andrey Ivanov
A R T I C L E I N F O : RECEIVED: 22 JUNE 2020 REVISED: 08 SEP 2020 ONLINE: 22 SEP 2020 K E Y W O R D S : public key cryptography, Miller–Rabin primality test improvement, cybersecurity Creative Commons BY-NC 4.0 Introduction Nowadays the growing use of online communications over the Internet and the associated threats to the data we exchange, requires sufficient and reliable protection of the information exchanged. One of the most reliable and basic method to make information secure, when two communicating parties don't know each other, is public key cryptography. Hard-to-solve mathematical problems are used to realize the mathematical foundations of the existing algorithms using public key cryptography. 2 In this mathematics, integer operations with large numbers are used and are based on modulo calculations of large prime numbers. Large prime numbers are also used to produce the user’s cryptographic keys (public and private). N. Stoianov & A. Ivanov, ISIJ 47, no. 2 (2020): 249-260 250 We could state that the security of the exchanged data protected by public key cryptography is due to two main facts: the difficulty of solving a mathematical algorithm and the reliability of the generated prime numbers used as keys in such a system. In this paper we will consider deterministic and probabilistic primality tests and will focus over the most widely used in practice an algorithm for testing prime numbers, that of Miller-Rabin 3, 4 and we will propose a new addition to it, which will increase the reliability of the estimation that this probabilistic algorithm gives. Public Key Generation and The Importance of The Prime Numbers Public key cryptography algorithms are based on two main things: difficult to solve mathematical problems and prime numbers with big values that serve as user private keys. If that prime numbers are generated not according to the prescribed rules or are not reliably confirmed as such, the security strength of protected data could be not enough. In an effort to ensure better protection of information, new algorithms and rules for generating private keys and the prime numbers involved in their compilation are created and proposed. 6 The more than 85% from certificate authorities (CA) based their root certificate security by using RSA encryption and signing scheme. Approximately of 10% of CA combinate both RSA and ECDSA cryptographic schemes to protect their public key infrastructure (PKI). This statement is based on our study in which we analysed the certificates stored into Windows, Android and Linux operating systems (OS) certificates stores. These operating systems are the most commonly used worldwide. We can say that a reliable estimate of divisibility of numbers is essential. Connected with this we will consider algorithms for primality testing. In practice, they are divided into two main types. Deterministic and probabilistic algorithms. Deterministic Primality Testing The most elementary approach to primality proving is tr
A R T I C L EI N F O:接收日期:2020年6月22日修订日期:2020年9月8日在线日期:2020年9月22日发布日期:2020年9月22日发布日期:2020年9月22日在通信双方互不认识的情况下,保证信息安全的最可靠和最基本的方法之一是公钥加密。利用难以解决的数学问题,利用公钥加密技术实现现有算法的数学基础。在这个数学中,使用大数的整数运算,并基于对大素数的模计算。大素数也用于生成用户的加密密钥(公共和私有)。N. Stoianov和A. Ivanov, ISIJ 47, no. 5。2(2020): 249-260 250我们可以说,受公钥加密保护的交换数据的安全性主要是由于两个事实:求解数学算法的难度以及在这种系统中用作密钥的生成素数的可靠性。在本文中,我们将考虑确定性素数检验和概率素数检验,并将重点放在实践中使用最广泛的一种素数检验算法上,即Miller-Rabin 3, 4算法,我们将提出一个新的补充,这将提高该概率算法给出的估计的可靠性。公钥加密算法主要基于两个方面:难以解决的数学问题和作为用户私钥的大素数。如果质数不是按照规定的规则生成的,或者没有得到可靠的确认,则受保护数据的安全强度可能不够。为了确保更好地保护信息,我们创建并提出了新的算法和规则,用于生成私钥和编译过程中涉及的素数。6 .超过85%的来自CA (certificate authority)的根证书安全基于RSA加密和签名方案。大约10%的CA结合RSA和ECDSA加密方案来保护他们的公钥基础设施(PKI)。这一说法是基于我们的研究,我们分析了存储在Windows、Android和Linux操作系统(OS)证书存储库中的证书。这些操作系统是全球最常用的。我们可以说,对数的可整除性的可靠估计是必不可少的。与此相关,我们将考虑素数测试的算法。在实践中,它们主要分为两种类型。确定性和概率算法。确定性素数检验证明素数的最基本方法是试除法。如果试图将p除以任何整数n≤⌊√p⌋,且n不能整除p,则p是素数。但是这个任务需要O(√p M(log p))的时间复杂度,这对于大的p值来说是不切实际的。这就是为什么最实用的算法必须用来阻止大数被因子整除的原因。2002年创建的一种算法AKS (Agrawal, Kayal和Saxena)属于一组对数字的可整除性给出明确评估的测试。AKS算法的核心是费马小定理。费马小定理指出:如果一个数p是素数,且a∈Z, p∈N且GCD(a, p) = 1,则a≡a mod p。使用这个定理的素数检验对于一类特定的数是不成立的,这些数被称为伪素数,包括卡迈克尔数。主要基于费马小定理的多项式推广,AKS算法声明:数字p是素数当且仅当(x + a)≡(x + a) mod p其中a∈Z, p∈n的公钥生成原理影响网络安全251,这里的时间复杂度为Ω(n),不是多项式时间。为了降低复杂度,我们可以在两边除以(x−1)。因此,对于选定的r,需要执行的计算次数较少。因此,现在的主要目标是选择一个适当的小r,并测试方程:(x + a)≡(x + a) mod GCD(x−1,p)是否满足足够数量的a。Agrawal, Kayal和Saxena 8,9提出的素数检验算法有以下步骤:(1)对于a∈N,如果p = a, b > 1输出COMPOSIT(2)找到最小的r,使得Or(p) > log p(3)如果1 < GCD(a, p) < p对于某些a≤r则输出COMPOSIT(4)如果N≤r对于每个a∈1输出PRIME(5)。⌊√φ(p) log p⌋(6)if (x + a)≠(x + a) mod GCD(x−1,p) (7) output COMPOSIT (8) output PRIME该算法的执行复杂度为?因此,如果p变大,执行时间将与(log n)成正比。 这是一个多项式时间函数,虽然不如现在使用的概率测试快,但它具有完全确定性的优点。素数的概率检验。我们知道两种数学方法来证明一个数p是合数:a.数p分解,其中:p = a. b和a, b >1 (2.2.1) b.展示p的费马见证,即找到一个数x满足:x 1 mod p(2.2.2)这些算法的速度是不令人满意的,它们肯定地决定了一个数是否可整除。这就要求一些用于素数检验的概率算法得到更广泛的应用。米勒-拉宾10,11检验是基于第三种方法来证明一个数是合数。c.给出一个1模p的无平方根。这意味着找到一个数x使x≡1模p和x±1模p (2.2.3) N. Stoianov & a . Ivanov, ISIJ 47, no. 2。2 (2020): 249-260 252 Miller-Rabin检验是应用最广泛的概率原态检验。该算法是在70年代提出的。米勒和拉宾给出了两个版本的相同算法来测试一个数字p是否是素数。Rabin的算法处理随机选择的x∈Zp,因此是随机的。米勒算法的正确性取决于扩展黎曼假设的正确性。在他的测试方法中,需要对所有x进行确定性测试,其中1 < x < 4。logp。如果x是整数p的见证,那么p一定是合数,我们说x见证了p的合数,质数显然没有见证。如果我们收集了足够多的x(100或更多取决于p的大小),并且没有人是目击者,我们可以接受p可能是素数。算法实现步骤为:(1)表示p−1 = s. 2,其中s mod 2 = 1(2)随机拾取x∈Zp(3)如果x≠1 mod p输出COMPOSITE (p肯定是COMPOSITE) (4) b = x mod p(5)如果b≡±1 mod p,输出PRIME (x不是见证,p可以是素数)(6)Loop i∈0..m-1 (7) b←b mod p(8)如果b≡-1 mod p则(9)输出PRIME (x不是见证,p可以是素数)(10)输出COMPOSITE x是见证p,绝对不是素数,该算法的时间复杂度为?logn),其中y是迭代的次数,即随机选择的x的不同值。通过环的新生成数得到子群扩展。在这一部分中,我们将考虑基于两个准则的素数检验,以及由它们的生成整数构成的不同的乘法子群的转移(无交集)或扩展方法的思想。为了描述这种由数字p构成的乘法子群的转移/扩展方法,我们将使用线性丢番图方程:dx。dy−p k = dz(2.3.1),其中di = g i mod p。每个di∈Zp,它是由数g生成的环的一部分,并且环阶为#O(g,p)或更小。在dx = dy - 1 mod p的特殊情况下,dz = 1。在我们处理数环的实践中,我们看到如果dz = 1二次互易性(dx p) = (dy p),并且当#O(g,p)的大小< p - 1时,则数k可以高度具有不同的二次互易性,即(dx p)≠(kp)。在这种情况下,我们可以用dx←k的新值来做到这一点,并且在重复的几个步骤中,我们可以达到k的值,它具有不同的二次互反性,而不是初始的dx。我们看到了更重要的东西,由发生器dx和k组成的环,在它的集合中通常有不同的元素。如果用q = dx。k对p取模作为环发生器,它的#O(q,p)与#O(dx,p)和#O(k,p)不同。为了说明
{"title":"Public Key Generation Principles Impact Cybersecurity","authors":"N. Stoianov, Andrey Ivanov","doi":"10.11610/isij.4717","DOIUrl":"https://doi.org/10.11610/isij.4717","url":null,"abstract":"A R T I C L E I N F O : RECEIVED: 22 JUNE 2020 REVISED: 08 SEP 2020 ONLINE: 22 SEP 2020 K E Y W O R D S : public key cryptography, Miller–Rabin primality test improvement, cybersecurity Creative Commons BY-NC 4.0 Introduction Nowadays the growing use of online communications over the Internet and the associated threats to the data we exchange, requires sufficient and reliable protection of the information exchanged. One of the most reliable and basic method to make information secure, when two communicating parties don't know each other, is public key cryptography. Hard-to-solve mathematical problems are used to realize the mathematical foundations of the existing algorithms using public key cryptography. 2 In this mathematics, integer operations with large numbers are used and are based on modulo calculations of large prime numbers. Large prime numbers are also used to produce the user’s cryptographic keys (public and private). N. Stoianov & A. Ivanov, ISIJ 47, no. 2 (2020): 249-260 250 We could state that the security of the exchanged data protected by public key cryptography is due to two main facts: the difficulty of solving a mathematical algorithm and the reliability of the generated prime numbers used as keys in such a system. In this paper we will consider deterministic and probabilistic primality tests and will focus over the most widely used in practice an algorithm for testing prime numbers, that of Miller-Rabin 3, 4 and we will propose a new addition to it, which will increase the reliability of the estimation that this probabilistic algorithm gives. Public Key Generation and The Importance of The Prime Numbers Public key cryptography algorithms are based on two main things: difficult to solve mathematical problems and prime numbers with big values that serve as user private keys. If that prime numbers are generated not according to the prescribed rules or are not reliably confirmed as such, the security strength of protected data could be not enough. In an effort to ensure better protection of information, new algorithms and rules for generating private keys and the prime numbers involved in their compilation are created and proposed. 6 The more than 85% from certificate authorities (CA) based their root certificate security by using RSA encryption and signing scheme. Approximately of 10% of CA combinate both RSA and ECDSA cryptographic schemes to protect their public key infrastructure (PKI). This statement is based on our study in which we analysed the certificates stored into Windows, Android and Linux operating systems (OS) certificates stores. These operating systems are the most commonly used worldwide. We can say that a reliable estimate of divisibility of numbers is essential. Connected with this we will consider algorithms for primality testing. In practice, they are divided into two main types. Deterministic and probabilistic algorithms. Deterministic Primality Testing The most elementary approach to primality proving is tr","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130804864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
AN AGENT-BASED APPROACH TO THE DEVELOPMENT OF INFORMATION SYSTEMS FOR MILITARY LOGISTICS 基于代理的军事后勤信息系统开发方法
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0813
S. Stojanov, R. Venkov, R. Radev.
The development of modern information systems in various application areas (e-commerce, logistics, and intelligent telecommunication services) presents a serious challenge to software technologies. This can be acknowledged to the difficulty, complexity, heterogeneity and distributed functionality of the systems. It is still a difficult task to find a homogeneous technological framework for the effective solution of these problems. Different models and standard frameworks have been developed for this kind of systems.1 Although they posses certain advantages, the requirement for generality makes their application in specific domains relatively expensive. In addition, considerable resources are needed for their adaptation.2 Agent-based systems solve some of these problems, especially those systems developed in e-commerce applications.3 The agent-based technology offers flexibility and easier adaptation.
现代信息系统在各个应用领域(电子商务、物流和智能电信服务)的发展对软件技术提出了严峻的挑战。这可以归因于系统的难度、复杂性、异构性和分布式功能。要找到一个统一的技术框架来有效地解决这些问题,仍然是一项艰巨的任务。针对这类系统已经开发了不同的模型和标准框架尽管它们具有一定的优势,但对通用性的需求使得它们在特定领域的应用相对昂贵。此外,还需要大量的资源来适应它们基于代理的系统解决了其中的一些问题,特别是那些在电子商务应用中开发的系统基于代理的技术提供了灵活性和更容易的适应性。
{"title":"AN AGENT-BASED APPROACH TO THE DEVELOPMENT OF INFORMATION SYSTEMS FOR MILITARY LOGISTICS","authors":"S. Stojanov, R. Venkov, R. Radev.","doi":"10.11610/ISIJ.0813","DOIUrl":"https://doi.org/10.11610/ISIJ.0813","url":null,"abstract":"The development of modern information systems in various application areas (e-commerce, logistics, and intelligent telecommunication services) presents a serious challenge to software technologies. This can be acknowledged to the difficulty, complexity, heterogeneity and distributed functionality of the systems. It is still a difficult task to find a homogeneous technological framework for the effective solution of these problems. Different models and standard frameworks have been developed for this kind of systems.1 Although they posses certain advantages, the requirement for generality makes their application in specific domains relatively expensive. In addition, considerable resources are needed for their adaptation.2 Agent-based systems solve some of these problems, especially those systems developed in e-commerce applications.3 The agent-based technology offers flexibility and easier adaptation.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127614395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interorganizational Cooperation and the Fight against Terrorism in West Africa and the Sahel 西非和萨赫勒地区组织间合作与反恐斗争
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.4811
O. Ajala
The transnational nature of security threats in the 21st Century are such that interorganizational cooperation is necessary to effectively combat these threats. This article explores a key organization, the Multinational Joint Task Force (MNJTF), charged with curtailing the threat posed by terrorism in certain parts of the Sahel and West Africa. Using the theoretical framework of Walt’s balance of threat and a combination of data obtained from ACLED and expert interviews, the article argues that the MNJTF has not been successful in achieving its mandate. This could be attributed to five lapses in the restructuring of the organization in 2015 to combat terrorism. The article concludes that for interorganizational security cooperation to be successful, the allies must equally acknowledge that they face the same existential threats which will make them commit to the demands of the organisation.
21世纪的安全威胁具有跨国性,为有效应对这些威胁,必须开展组织间合作。这篇文章探讨了一个重要的组织,多国联合特遣部队(MNJTF),其任务是在萨赫勒和西非的某些地区减少恐怖主义构成的威胁。利用沃尔特威胁平衡的理论框架,结合从ACLED和专家访谈中获得的数据,文章认为MNJTF并没有成功地实现其使命。这可以归因于2015年为打击恐怖主义而进行的组织结构调整中出现的5次失误。文章的结论是,为了使组织间的安全合作取得成功,盟国必须平等地承认他们面临着同样的生存威胁,这将使他们致力于该组织的要求。
{"title":"Interorganizational Cooperation and the Fight against Terrorism in West Africa and the Sahel","authors":"O. Ajala","doi":"10.11610/ISIJ.4811","DOIUrl":"https://doi.org/10.11610/ISIJ.4811","url":null,"abstract":"The transnational nature of security threats in the 21st Century are such that interorganizational cooperation is necessary to effectively combat these threats. This article explores a key organization, the Multinational Joint Task Force (MNJTF), charged with curtailing the threat posed by terrorism in certain parts of the Sahel and West Africa. Using the theoretical framework of Walt’s balance of threat and a combination of data obtained from ACLED and expert interviews, the article argues that the MNJTF has not been successful in achieving its mandate. This could be attributed to five lapses in the restructuring of the organization in 2015 to combat terrorism. The article concludes that for interorganizational security cooperation to be successful, the allies must equally acknowledge that they face the same existential threats which will make them commit to the demands of the organisation.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127851030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Information & Security: An International Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1