The article tackles the plural and evolving concepts of security by ana-lysing their relation to human rights and ethics. Although the general impression is that seldom the security discourse is associated with the respect of human rights and ethics, at least from a theoretical point of view security is indeed intertwined with those normative features (first thesis). Moreover, ethics and human rights can be valuably and usefully employed to clarify issues related to security and eventually to suggest improvements in the political management of security issues (second thesis). We argue our theses by focusing on a case study of particular relevance to the present day debate on security: the Syrian asylum seekers headed to Europe. In our ethical and human rights enquiry into this case study we consider multiple as-pects related to security (‘de jure’ or normative, ‘de facto’ and perceptive-societal) and the interpretative lens provided by ethics and human rights sheds light on the crucial and manifold centrality played by the notion of human dignity.
{"title":"A Human Rights and Ethical Lens on Security and Human Dignity: The Case Study of Syrian Asylum Seekers","authors":"F. Vietti, Roberto Franzini Tibaldeo","doi":"10.11610/isij.3302","DOIUrl":"https://doi.org/10.11610/isij.3302","url":null,"abstract":"The article tackles the plural and evolving concepts of security by ana-lysing their relation to human rights and ethics. Although the general impression is that seldom the security discourse is associated with the respect of human rights and ethics, at least from a theoretical point of view security is indeed intertwined with those normative features (first thesis). Moreover, ethics and human rights can be valuably and usefully employed to clarify issues related to security and eventually to suggest improvements in the political management of security issues (second thesis). We argue our theses by focusing on a case study of particular relevance to the present day debate on security: the Syrian asylum seekers headed to Europe. In our ethical and human rights enquiry into this case study we consider multiple as-pects related to security (‘de jure’ or normative, ‘de facto’ and perceptive-societal) and the interpretative lens provided by ethics and human rights sheds light on the crucial and manifold centrality played by the notion of human dignity.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128404640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pariah states and criminal gangs are often early adopters of disruptive technologies. With blockchain, the possibilities for circumventing controls and systems— or creating new ways of business—are rich grounds for such early adopters. What has gone widely ignored in the buzz around cryptocurrencies is the role that states play and their changing perspectives on the matter. This article analyzes the geo-strategic implications of a suite of technologies that has the possibility of altering core economic tenets about money and, along the way, attracting the attention of those who would skirt the law. A R T I C L E I N F O : RECEIVED: 21 MAY 2019
{"title":"What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security","authors":"Sean Costigan, G. Gleason","doi":"10.11610/isij.4301","DOIUrl":"https://doi.org/10.11610/isij.4301","url":null,"abstract":"Pariah states and criminal gangs are often early adopters of disruptive technologies. With blockchain, the possibilities for circumventing controls and systems— or creating new ways of business—are rich grounds for such early adopters. What has gone widely ignored in the buzz around cryptocurrencies is the role that states play and their changing perspectives on the matter. This article analyzes the geo-strategic implications of a suite of technologies that has the possibility of altering core economic tenets about money and, along the way, attracting the attention of those who would skirt the law. A R T I C L E I N F O : RECEIVED: 21 MAY 2019","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127147907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
a. Transform operational need into a description of system performance parameters and a system configuration through the use of an iterative process of definition, synthesis, analysis, design, test, and evaluation; b. Integrate related technical parameters and ensure compatibility of all physical, functional, and program interfaces in a manner that optimises the total system definition and design; c. Integrate reliability, maintainability, safety, survivability, human, and other requirements into the total engineering effort to meet cost, schedule, and technical performance objectives.
{"title":"E-Models and Methods for Project Management in the Public Area","authors":"G. Pavlov, J. Karakaneva","doi":"10.11610/ISIJ.1106","DOIUrl":"https://doi.org/10.11610/ISIJ.1106","url":null,"abstract":"a. Transform operational need into a description of system performance parameters and a system configuration through the use of an iterative process of definition, synthesis, analysis, design, test, and evaluation; b. Integrate related technical parameters and ensure compatibility of all physical, functional, and program interfaces in a manner that optimises the total system definition and design; c. Integrate reliability, maintainability, safety, survivability, human, and other requirements into the total engineering effort to meet cost, schedule, and technical performance objectives.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In a comprehensive manner this article presents roles and missions of Bulgaria’s Navy, and the capabilities it develops to deal with the 21 century security challenges in cooperation with other services, security organizations, and allied navies. In the process of transformation, the Navy has developed ambitious plans to insert advanced technologies, commensurate to its new missions and tasks. This article looks specifically at plans to introduce advanced communications and information technologies in order to achieve required naval capabilities and to facilitate individual, crew, and staff training. New Roles, Missions, and Responsibilities of the Navies Facing 21 st Century Security Challenges Historically, the term ―national security‖ had various specific definitions and dimensions; however, they all had one common meaning – the reliable protection of the territorial integrity and the independence of a sovereign state. The challenge in this respect was how to approach and in what manner to realize this ―national security.‖ The turmoil of the political and societal changes in Europe in the 1990s and thereafter, the dissolution of a number of multinational states, e.g., the Soviet Union and the Socialist Federal Republic of Yugoslavia, the unification of Germany, the processes of globalization and unification of Europe, as well as the aggravation of demographic, ecological, economic and social problems and, most importantly, the expansion of the international terrorism and organized crime, brought forward a number of issues related to the notion of national security and the ways to realize it. In the last few years, the notion of national security went beyond the boundaries of a separate state. Of increasing importance are the notions of Individual Security, Collective Security, Bulgaria in NATO: New Roles and Capabilities of the Navy 10 Figure 1: Constituents of the Cooperative Security System. Collective Defense, and Promotion of Stability, constituting a system for common /cooperative/ security (This interaction of terms and notions is presented graphically in Figure 1). Security is based not only on military force and government actions, activities of national institutions and non-governmental organizations within a state, but also on international (bilateral and multilateral) treaties and organizations. In this respect I am proud to state that, since 1991, Bulgaria’s naval forces stand firmly behind the Atlantic idea. The Navy incorporated in its plans variety of activities aimed to increase the confidence and to foster collective security in the Black Sea region and to promote stability. Even prior to the ―Partnership for Peace‖ Initiative, in 1993 Varna hosted the international symposium ―Black Sea Naval Review‖—the first of its kind—on the topic ―The Naval Forces in the New Geopolitical Environment.‖ Under excellent organization, more than 100 participants form 13 countries actively discussed 26 reports. As a continuation of this effort,
{"title":"Bulgaria in NATO:New Roles and Capabilities of the Navy","authors":"Emil Lyutzkanov","doi":"10.11610/ISIJ.1301","DOIUrl":"https://doi.org/10.11610/ISIJ.1301","url":null,"abstract":"In a comprehensive manner this article presents roles and missions of Bulgaria’s Navy, and the capabilities it develops to deal with the 21 century security challenges in cooperation with other services, security organizations, and allied navies. In the process of transformation, the Navy has developed ambitious plans to insert advanced technologies, commensurate to its new missions and tasks. This article looks specifically at plans to introduce advanced communications and information technologies in order to achieve required naval capabilities and to facilitate individual, crew, and staff training. New Roles, Missions, and Responsibilities of the Navies Facing 21 st Century Security Challenges Historically, the term ―national security‖ had various specific definitions and dimensions; however, they all had one common meaning – the reliable protection of the territorial integrity and the independence of a sovereign state. The challenge in this respect was how to approach and in what manner to realize this ―national security.‖ The turmoil of the political and societal changes in Europe in the 1990s and thereafter, the dissolution of a number of multinational states, e.g., the Soviet Union and the Socialist Federal Republic of Yugoslavia, the unification of Germany, the processes of globalization and unification of Europe, as well as the aggravation of demographic, ecological, economic and social problems and, most importantly, the expansion of the international terrorism and organized crime, brought forward a number of issues related to the notion of national security and the ways to realize it. In the last few years, the notion of national security went beyond the boundaries of a separate state. Of increasing importance are the notions of Individual Security, Collective Security, Bulgaria in NATO: New Roles and Capabilities of the Navy 10 Figure 1: Constituents of the Cooperative Security System. Collective Defense, and Promotion of Stability, constituting a system for common /cooperative/ security (This interaction of terms and notions is presented graphically in Figure 1). Security is based not only on military force and government actions, activities of national institutions and non-governmental organizations within a state, but also on international (bilateral and multilateral) treaties and organizations. In this respect I am proud to state that, since 1991, Bulgaria’s naval forces stand firmly behind the Atlantic idea. The Navy incorporated in its plans variety of activities aimed to increase the confidence and to foster collective security in the Black Sea region and to promote stability. Even prior to the ―Partnership for Peace‖ Initiative, in 1993 Varna hosted the international symposium ―Black Sea Naval Review‖—the first of its kind—on the topic ―The Naval Forces in the New Geopolitical Environment.‖ Under excellent organization, more than 100 participants form 13 countries actively discussed 26 reports. As a continuation of this effort,","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Early Childhood Development), or in the case of some materials, by third parties (third party materials). No part may be reproduced by any process except in accordance with the provisions of the Copyright Act 1968, the National Education Access Licence for Schools (NEALS) (see below) or with permission. An educational institution situated in Australia which is not conducted for profit, or a body responsible for administering such an institution may copy and communicate the materials, other than third party materials, for the educational purposes of the institution.
{"title":"Stakeholder Engagement Framework","authors":"P. Smith","doi":"10.11610/ISIJ.3802","DOIUrl":"https://doi.org/10.11610/ISIJ.3802","url":null,"abstract":"Early Childhood Development), or in the case of some materials, by third parties (third party materials). No part may be reproduced by any process except in accordance with the provisions of the Copyright Act 1968, the National Education Access Licence for Schools (NEALS) (see below) or with permission. An educational institution situated in Australia which is not conducted for profit, or a body responsible for administering such an institution may copy and communicate the materials, other than third party materials, for the educational purposes of the institution.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131034765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Kharchenko, I. Kliushnikov, H. Fesenko, O. Illiashenko
{"title":"Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks","authors":"V. Kharchenko, I. Kliushnikov, H. Fesenko, O. Illiashenko","doi":"10.11610/isij.4906","DOIUrl":"https://doi.org/10.11610/isij.4906","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132859083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
istance Learning (DL), Computer Based Training (CBT) and e-Learning today encompass a broad range of technologies and teaching theories and practices, all of which are being aggressively explored by various groups, enterprises, industries and interests around the world. This huge arena of exploration involves incalculable combinations of technologies and learning theories. Where all of this will lead cannot be clearly projected, neither in terms of the technologies that will apply tomorrow, nor how the teaching methods encompassed and affected by those technologies will be shaped and altered.
{"title":"Standards Integration in E-Learning, Simulations, and Technical Manuals","authors":"J. Krinock","doi":"10.11610/ISIJ.1406","DOIUrl":"https://doi.org/10.11610/ISIJ.1406","url":null,"abstract":"istance Learning (DL), Computer Based Training (CBT) and e-Learning today encompass a broad range of technologies and teaching theories and practices, all of which are being aggressively explored by various groups, enterprises, industries and interests around the world. This huge arena of exploration involves incalculable combinations of technologies and learning theories. Where all of this will lead cannot be clearly projected, neither in terms of the technologies that will apply tomorrow, nor how the teaching methods encompassed and affected by those technologies will be shaped and altered.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131976868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A R T I C L E I N F O : RECEIVED: 22 JUNE 2020 REVISED: 08 SEP 2020 ONLINE: 22 SEP 2020 K E Y W O R D S : public key cryptography, Miller–Rabin primality test improvement, cybersecurity Creative Commons BY-NC 4.0 Introduction Nowadays the growing use of online communications over the Internet and the associated threats to the data we exchange, requires sufficient and reliable protection of the information exchanged. One of the most reliable and basic method to make information secure, when two communicating parties don't know each other, is public key cryptography. Hard-to-solve mathematical problems are used to realize the mathematical foundations of the existing algorithms using public key cryptography. 2 In this mathematics, integer operations with large numbers are used and are based on modulo calculations of large prime numbers. Large prime numbers are also used to produce the user’s cryptographic keys (public and private). N. Stoianov & A. Ivanov, ISIJ 47, no. 2 (2020): 249-260 250 We could state that the security of the exchanged data protected by public key cryptography is due to two main facts: the difficulty of solving a mathematical algorithm and the reliability of the generated prime numbers used as keys in such a system. In this paper we will consider deterministic and probabilistic primality tests and will focus over the most widely used in practice an algorithm for testing prime numbers, that of Miller-Rabin 3, 4 and we will propose a new addition to it, which will increase the reliability of the estimation that this probabilistic algorithm gives. Public Key Generation and The Importance of The Prime Numbers Public key cryptography algorithms are based on two main things: difficult to solve mathematical problems and prime numbers with big values that serve as user private keys. If that prime numbers are generated not according to the prescribed rules or are not reliably confirmed as such, the security strength of protected data could be not enough. In an effort to ensure better protection of information, new algorithms and rules for generating private keys and the prime numbers involved in their compilation are created and proposed. 6 The more than 85% from certificate authorities (CA) based their root certificate security by using RSA encryption and signing scheme. Approximately of 10% of CA combinate both RSA and ECDSA cryptographic schemes to protect their public key infrastructure (PKI). This statement is based on our study in which we analysed the certificates stored into Windows, Android and Linux operating systems (OS) certificates stores. These operating systems are the most commonly used worldwide. We can say that a reliable estimate of divisibility of numbers is essential. Connected with this we will consider algorithms for primality testing. In practice, they are divided into two main types. Deterministic and probabilistic algorithms. Deterministic Primality Testing The most elementary approach to primality proving is tr
A R T I C L EI N F O:接收日期:2020年6月22日修订日期:2020年9月8日在线日期:2020年9月22日发布日期:2020年9月22日发布日期:2020年9月22日在通信双方互不认识的情况下,保证信息安全的最可靠和最基本的方法之一是公钥加密。利用难以解决的数学问题,利用公钥加密技术实现现有算法的数学基础。在这个数学中,使用大数的整数运算,并基于对大素数的模计算。大素数也用于生成用户的加密密钥(公共和私有)。N. Stoianov和A. Ivanov, ISIJ 47, no. 5。2(2020): 249-260 250我们可以说,受公钥加密保护的交换数据的安全性主要是由于两个事实:求解数学算法的难度以及在这种系统中用作密钥的生成素数的可靠性。在本文中,我们将考虑确定性素数检验和概率素数检验,并将重点放在实践中使用最广泛的一种素数检验算法上,即Miller-Rabin 3, 4算法,我们将提出一个新的补充,这将提高该概率算法给出的估计的可靠性。公钥加密算法主要基于两个方面:难以解决的数学问题和作为用户私钥的大素数。如果质数不是按照规定的规则生成的,或者没有得到可靠的确认,则受保护数据的安全强度可能不够。为了确保更好地保护信息,我们创建并提出了新的算法和规则,用于生成私钥和编译过程中涉及的素数。6 .超过85%的来自CA (certificate authority)的根证书安全基于RSA加密和签名方案。大约10%的CA结合RSA和ECDSA加密方案来保护他们的公钥基础设施(PKI)。这一说法是基于我们的研究,我们分析了存储在Windows、Android和Linux操作系统(OS)证书存储库中的证书。这些操作系统是全球最常用的。我们可以说,对数的可整除性的可靠估计是必不可少的。与此相关,我们将考虑素数测试的算法。在实践中,它们主要分为两种类型。确定性和概率算法。确定性素数检验证明素数的最基本方法是试除法。如果试图将p除以任何整数n≤⌊√p⌋,且n不能整除p,则p是素数。但是这个任务需要O(√p M(log p))的时间复杂度,这对于大的p值来说是不切实际的。这就是为什么最实用的算法必须用来阻止大数被因子整除的原因。2002年创建的一种算法AKS (Agrawal, Kayal和Saxena)属于一组对数字的可整除性给出明确评估的测试。AKS算法的核心是费马小定理。费马小定理指出:如果一个数p是素数,且a∈Z, p∈N且GCD(a, p) = 1,则a≡a mod p。使用这个定理的素数检验对于一类特定的数是不成立的,这些数被称为伪素数,包括卡迈克尔数。主要基于费马小定理的多项式推广,AKS算法声明:数字p是素数当且仅当(x + a)≡(x + a) mod p其中a∈Z, p∈n的公钥生成原理影响网络安全251,这里的时间复杂度为Ω(n),不是多项式时间。为了降低复杂度,我们可以在两边除以(x−1)。因此,对于选定的r,需要执行的计算次数较少。因此,现在的主要目标是选择一个适当的小r,并测试方程:(x + a)≡(x + a) mod GCD(x−1,p)是否满足足够数量的a。Agrawal, Kayal和Saxena 8,9提出的素数检验算法有以下步骤:(1)对于a∈N,如果p = a, b > 1输出COMPOSIT(2)找到最小的r,使得Or(p) > log p(3)如果1 < GCD(a, p) < p对于某些a≤r则输出COMPOSIT(4)如果N≤r对于每个a∈1输出PRIME(5)。⌊√φ(p) log p⌋(6)if (x + a)≠(x + a) mod GCD(x−1,p) (7) output COMPOSIT (8) output PRIME该算法的执行复杂度为?因此,如果p变大,执行时间将与(log n)成正比。 这是一个多项式时间函数,虽然不如现在使用的概率测试快,但它具有完全确定性的优点。素数的概率检验。我们知道两种数学方法来证明一个数p是合数:a.数p分解,其中:p = a. b和a, b >1 (2.2.1) b.展示p的费马见证,即找到一个数x满足:x 1 mod p(2.2.2)这些算法的速度是不令人满意的,它们肯定地决定了一个数是否可整除。这就要求一些用于素数检验的概率算法得到更广泛的应用。米勒-拉宾10,11检验是基于第三种方法来证明一个数是合数。c.给出一个1模p的无平方根。这意味着找到一个数x使x≡1模p和x±1模p (2.2.3) N. Stoianov & a . Ivanov, ISIJ 47, no. 2。2 (2020): 249-260 252 Miller-Rabin检验是应用最广泛的概率原态检验。该算法是在70年代提出的。米勒和拉宾给出了两个版本的相同算法来测试一个数字p是否是素数。Rabin的算法处理随机选择的x∈Zp,因此是随机的。米勒算法的正确性取决于扩展黎曼假设的正确性。在他的测试方法中,需要对所有x进行确定性测试,其中1 < x < 4。logp。如果x是整数p的见证,那么p一定是合数,我们说x见证了p的合数,质数显然没有见证。如果我们收集了足够多的x(100或更多取决于p的大小),并且没有人是目击者,我们可以接受p可能是素数。算法实现步骤为:(1)表示p−1 = s. 2,其中s mod 2 = 1(2)随机拾取x∈Zp(3)如果x≠1 mod p输出COMPOSITE (p肯定是COMPOSITE) (4) b = x mod p(5)如果b≡±1 mod p,输出PRIME (x不是见证,p可以是素数)(6)Loop i∈0..m-1 (7) b←b mod p(8)如果b≡-1 mod p则(9)输出PRIME (x不是见证,p可以是素数)(10)输出COMPOSITE x是见证p,绝对不是素数,该算法的时间复杂度为?logn),其中y是迭代的次数,即随机选择的x的不同值。通过环的新生成数得到子群扩展。在这一部分中,我们将考虑基于两个准则的素数检验,以及由它们的生成整数构成的不同的乘法子群的转移(无交集)或扩展方法的思想。为了描述这种由数字p构成的乘法子群的转移/扩展方法,我们将使用线性丢番图方程:dx。dy−p k = dz(2.3.1),其中di = g i mod p。每个di∈Zp,它是由数g生成的环的一部分,并且环阶为#O(g,p)或更小。在dx = dy - 1 mod p的特殊情况下,dz = 1。在我们处理数环的实践中,我们看到如果dz = 1二次互易性(dx p) = (dy p),并且当#O(g,p)的大小< p - 1时,则数k可以高度具有不同的二次互易性,即(dx p)≠(kp)。在这种情况下,我们可以用dx←k的新值来做到这一点,并且在重复的几个步骤中,我们可以达到k的值,它具有不同的二次互反性,而不是初始的dx。我们看到了更重要的东西,由发生器dx和k组成的环,在它的集合中通常有不同的元素。如果用q = dx。k对p取模作为环发生器,它的#O(q,p)与#O(dx,p)和#O(k,p)不同。为了说明
{"title":"Public Key Generation Principles Impact Cybersecurity","authors":"N. Stoianov, Andrey Ivanov","doi":"10.11610/isij.4717","DOIUrl":"https://doi.org/10.11610/isij.4717","url":null,"abstract":"A R T I C L E I N F O : RECEIVED: 22 JUNE 2020 REVISED: 08 SEP 2020 ONLINE: 22 SEP 2020 K E Y W O R D S : public key cryptography, Miller–Rabin primality test improvement, cybersecurity Creative Commons BY-NC 4.0 Introduction Nowadays the growing use of online communications over the Internet and the associated threats to the data we exchange, requires sufficient and reliable protection of the information exchanged. One of the most reliable and basic method to make information secure, when two communicating parties don't know each other, is public key cryptography. Hard-to-solve mathematical problems are used to realize the mathematical foundations of the existing algorithms using public key cryptography. 2 In this mathematics, integer operations with large numbers are used and are based on modulo calculations of large prime numbers. Large prime numbers are also used to produce the user’s cryptographic keys (public and private). N. Stoianov & A. Ivanov, ISIJ 47, no. 2 (2020): 249-260 250 We could state that the security of the exchanged data protected by public key cryptography is due to two main facts: the difficulty of solving a mathematical algorithm and the reliability of the generated prime numbers used as keys in such a system. In this paper we will consider deterministic and probabilistic primality tests and will focus over the most widely used in practice an algorithm for testing prime numbers, that of Miller-Rabin 3, 4 and we will propose a new addition to it, which will increase the reliability of the estimation that this probabilistic algorithm gives. Public Key Generation and The Importance of The Prime Numbers Public key cryptography algorithms are based on two main things: difficult to solve mathematical problems and prime numbers with big values that serve as user private keys. If that prime numbers are generated not according to the prescribed rules or are not reliably confirmed as such, the security strength of protected data could be not enough. In an effort to ensure better protection of information, new algorithms and rules for generating private keys and the prime numbers involved in their compilation are created and proposed. 6 The more than 85% from certificate authorities (CA) based their root certificate security by using RSA encryption and signing scheme. Approximately of 10% of CA combinate both RSA and ECDSA cryptographic schemes to protect their public key infrastructure (PKI). This statement is based on our study in which we analysed the certificates stored into Windows, Android and Linux operating systems (OS) certificates stores. These operating systems are the most commonly used worldwide. We can say that a reliable estimate of divisibility of numbers is essential. Connected with this we will consider algorithms for primality testing. In practice, they are divided into two main types. Deterministic and probabilistic algorithms. Deterministic Primality Testing The most elementary approach to primality proving is tr","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130804864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The development of modern information systems in various application areas (e-commerce, logistics, and intelligent telecommunication services) presents a serious challenge to software technologies. This can be acknowledged to the difficulty, complexity, heterogeneity and distributed functionality of the systems. It is still a difficult task to find a homogeneous technological framework for the effective solution of these problems. Different models and standard frameworks have been developed for this kind of systems.1 Although they posses certain advantages, the requirement for generality makes their application in specific domains relatively expensive. In addition, considerable resources are needed for their adaptation.2 Agent-based systems solve some of these problems, especially those systems developed in e-commerce applications.3 The agent-based technology offers flexibility and easier adaptation.
{"title":"AN AGENT-BASED APPROACH TO THE DEVELOPMENT OF INFORMATION SYSTEMS FOR MILITARY LOGISTICS","authors":"S. Stojanov, R. Venkov, R. Radev.","doi":"10.11610/ISIJ.0813","DOIUrl":"https://doi.org/10.11610/ISIJ.0813","url":null,"abstract":"The development of modern information systems in various application areas (e-commerce, logistics, and intelligent telecommunication services) presents a serious challenge to software technologies. This can be acknowledged to the difficulty, complexity, heterogeneity and distributed functionality of the systems. It is still a difficult task to find a homogeneous technological framework for the effective solution of these problems. Different models and standard frameworks have been developed for this kind of systems.1 Although they posses certain advantages, the requirement for generality makes their application in specific domains relatively expensive. In addition, considerable resources are needed for their adaptation.2 Agent-based systems solve some of these problems, especially those systems developed in e-commerce applications.3 The agent-based technology offers flexibility and easier adaptation.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127614395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The transnational nature of security threats in the 21st Century are such that interorganizational cooperation is necessary to effectively combat these threats. This article explores a key organization, the Multinational Joint Task Force (MNJTF), charged with curtailing the threat posed by terrorism in certain parts of the Sahel and West Africa. Using the theoretical framework of Walt’s balance of threat and a combination of data obtained from ACLED and expert interviews, the article argues that the MNJTF has not been successful in achieving its mandate. This could be attributed to five lapses in the restructuring of the organization in 2015 to combat terrorism. The article concludes that for interorganizational security cooperation to be successful, the allies must equally acknowledge that they face the same existential threats which will make them commit to the demands of the organisation.
{"title":"Interorganizational Cooperation and the Fight against Terrorism in West Africa and the Sahel","authors":"O. Ajala","doi":"10.11610/ISIJ.4811","DOIUrl":"https://doi.org/10.11610/ISIJ.4811","url":null,"abstract":"The transnational nature of security threats in the 21st Century are such that interorganizational cooperation is necessary to effectively combat these threats. This article explores a key organization, the Multinational Joint Task Force (MNJTF), charged with curtailing the threat posed by terrorism in certain parts of the Sahel and West Africa. Using the theoretical framework of Walt’s balance of threat and a combination of data obtained from ACLED and expert interviews, the article argues that the MNJTF has not been successful in achieving its mandate. This could be attributed to five lapses in the restructuring of the organization in 2015 to combat terrorism. The article concludes that for interorganizational security cooperation to be successful, the allies must equally acknowledge that they face the same existential threats which will make them commit to the demands of the organisation.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127851030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}