Pub Date : 2022-06-24DOI: 10.30837/rt.2022.2.209.09
Ye.Yu. Kaptiol
The paper identifies and analyzes attacks aimed at cryptanalysis of the Rainbow post-quantum electronic signature algorithm and the state of this electronic signature within the framework of the NIST PQC competition and as a whole. The Rainbow electronic signature as a candidate in the third round of the NIST PQC was examined in detail for the possibility of cryptanalysis. The possibility to use this quantitative attack on the Rainbow electronic signature and the complexity of such an attack depends on the possibility to use this electronic signature in the post-quantum period. Also during the NIST PQC report on the peculiarities of the adoption of the first post-quantum standards, which took place on March 8-11, 2022, some concerns about the Rainbow's security were mentioned due to the implementation of an attack on one of the parameter sets (although the parameter set of the second round). Some details of this attack were discussed in the paper to understand better the state of the Rainbow's electronic signature at the end of the third round of the NIST PQC.
{"title":"Analysis of the RAINBOW post-quantum electronic signature algorithm state and attacks on it for the period of the NIST PQC third round completion","authors":"Ye.Yu. Kaptiol","doi":"10.30837/rt.2022.2.209.09","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.09","url":null,"abstract":"The paper identifies and analyzes attacks aimed at cryptanalysis of the Rainbow post-quantum electronic signature algorithm and the state of this electronic signature within the framework of the NIST PQC competition and as a whole. The Rainbow electronic signature as a candidate in the third round of the NIST PQC was examined in detail for the possibility of cryptanalysis. The possibility to use this quantitative attack on the Rainbow electronic signature and the complexity of such an attack depends on the possibility to use this electronic signature in the post-quantum period. Also during the NIST PQC report on the peculiarities of the adoption of the first post-quantum standards, which took place on March 8-11, 2022, some concerns about the Rainbow's security were mentioned due to the implementation of an attack on one of the parameter sets (although the parameter set of the second round). Some details of this attack were discussed in the paper to understand better the state of the Rainbow's electronic signature at the end of the third round of the NIST PQC.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"46 2 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77479462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.30837/rt.2022.2.209.01
M. Yesina, O. Potii, Y. Gorbenko, V. Ponomar
The world is in the process of intensive creation and application of quantum technologies. On May 4, 2022, the President of the United States signed the «National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems». Therefore, advancing leadership is an important challenge in quantum computing in general, while reducing risks to vulnerable cryptographic systems. Accordingly, standardized scientific and methodological support for risk assessment should be justified, accepted and applied at the international and national levels when quantum computing is used in general and especially when quantum computing is used in cryptology. The purpose of the work is to substantiate and develop a risk assessment methodology for quantum computing used in cryptology in the so-called “post-quantum period”. With this aim in view the following components were taken into account: the use of methods that have not yet arisen to combat cybersecurity threats; determination of the essence of the quantum risk assessment methodology; identification and documentation of information assets and their current cryptographic protection; research on the state of quantum computers and quantum-safe cryptography. Quantum risk assessment is considered, an ideal approach for identifying and prioritizing threats and vulnerabilities, as well as laying the foundation for the reliable and cost-effective development of systems so that they are resistant to quantum attacks. Quantum risk assessment provides organizations with the knowledge necessary to understand the extent of their quantum cyber risk and the terms in which quantum threats can arise. This will provide the organization with a basis for proactively addressing quantum risks, building a path to a quantum safe state, and implementing and validating quantum safe solutions.
{"title":"Risk estimation methodology in the post-quantum period","authors":"M. Yesina, O. Potii, Y. Gorbenko, V. Ponomar","doi":"10.30837/rt.2022.2.209.01","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.01","url":null,"abstract":"The world is in the process of intensive creation and application of quantum technologies. On May 4, 2022, the President of the United States signed the «National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems». Therefore, advancing leadership is an important challenge in quantum computing in general, while reducing risks to vulnerable cryptographic systems. Accordingly, standardized scientific and methodological support for risk assessment should be justified, accepted and applied at the international and national levels when quantum computing is used in general and especially when quantum computing is used in cryptology. The purpose of the work is to substantiate and develop a risk assessment methodology for quantum computing used in cryptology in the so-called “post-quantum period”. With this aim in view the following components were taken into account: the use of methods that have not yet arisen to combat cybersecurity threats; determination of the essence of the quantum risk assessment methodology; identification and documentation of information assets and their current cryptographic protection; research on the state of quantum computers and quantum-safe cryptography. Quantum risk assessment is considered, an ideal approach for identifying and prioritizing threats and vulnerabilities, as well as laying the foundation for the reliable and cost-effective development of systems so that they are resistant to quantum attacks. Quantum risk assessment provides organizations with the knowledge necessary to understand the extent of their quantum cyber risk and the terms in which quantum threats can arise. This will provide the organization with a basis for proactively addressing quantum risks, building a path to a quantum safe state, and implementing and validating quantum safe solutions.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"77 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79248671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.30837/rt.2022.2.209.15
A. Oleynikov, V.A. Pulavsky, I.N. Chigirev
The article analyzes the effectiveness of suppressing an unauthorized recording using acoustic, electromagnetic and ultrasonic countermeasures. It is shown that acoustic, electromagnetic and ultrasonic counteraction without a priori knowledge of the type of voice recorder does not provide guaranteed suppression of unauthorized speech recording. To increase the suppression efficiency, it is proposed to adapt the acoustic method, taking into account the characteristics of the propagation of acoustic vibrations in the air, the psychophysical perception of sounds by the human ear, and the use of an electrostatic emitter. The technical parameters of an electrostatic acoustic system make it possible to bring the spectral characteristics of the interference as close as possible to the voices of the interlocutors, increase the power flux density of the interference signal and reduce the intensity of its impact on the hearing organs. The article presents comparative results of experimental studies of suppressors based on adapted acoustic, electromagnetic and ultrasonic methods. The proposed adapted acoustic method for counteracting unauthorized speech recording is equally effective for any type of recording device, since the interference is generated along a functional acoustic channel, taking into account the propagation and perception of acoustic vibrations by a person.
{"title":"Improving the efficiency of methods and means for suppressing unauthorized speech recording","authors":"A. Oleynikov, V.A. Pulavsky, I.N. Chigirev","doi":"10.30837/rt.2022.2.209.15","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.15","url":null,"abstract":"The article analyzes the effectiveness of suppressing an unauthorized recording using acoustic, electromagnetic and ultrasonic countermeasures. It is shown that acoustic, electromagnetic and ultrasonic counteraction without a priori knowledge of the type of voice recorder does not provide guaranteed suppression of unauthorized speech recording. To increase the suppression efficiency, it is proposed to adapt the acoustic method, taking into account the characteristics of the propagation of acoustic vibrations in the air, the psychophysical perception of sounds by the human ear, and the use of an electrostatic emitter. The technical parameters of an electrostatic acoustic system make it possible to bring the spectral characteristics of the interference as close as possible to the voices of the interlocutors, increase the power flux density of the interference signal and reduce the intensity of its impact on the hearing organs. The article presents comparative results of experimental studies of suppressors based on adapted acoustic, electromagnetic and ultrasonic methods. The proposed adapted acoustic method for counteracting unauthorized speech recording is equally effective for any type of recording device, since the interference is generated along a functional acoustic channel, taking into account the propagation and perception of acoustic vibrations by a person.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"78 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74214380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.30837/rt.2022.2.209.18
I. Nevliudov, S. Novoselov, O. Sychova, S. Tesliuk
Existing global positioning technologies cannot be applied indoors, where the signal from satellites or communication towers is significantly reduced or completely absent due to signal weakening in the walls of the building. Wireless network technologies such as Bluetooth or Wi-Fi can also be used in the process of local determining the mobile platforms position in industrial premises. But such methods have a problem with providing the required accuracy. The relevance of these studies is associated with solving the problem of local positioning of mobile robots in a room with an accuracy of ten centimeters. The article presents a comparative analysis of determining coordinates’ principles by the AOA, TOA, TDOA and RSSI methods. It is proposed to use BLE technologies based on the RSSI data received from base stations. Using the triangulation method, formulas are obtained for solving the problem of determining the coordinates of an object moving in space. The software and hardware complex architecture has been developed. It is proposed to use ESP32 modules as base radio stations. The RSSI value is very unstable, so the positioning accuracy will depend on the number of base stations and the additional software tools used.
{"title":"Determining the coordinates of a mobile robot in an industrial space using BLE technology based on RSSI data received from base stations","authors":"I. Nevliudov, S. Novoselov, O. Sychova, S. Tesliuk","doi":"10.30837/rt.2022.2.209.18","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.18","url":null,"abstract":"Existing global positioning technologies cannot be applied indoors, where the signal from satellites or communication towers is significantly reduced or completely absent due to signal weakening in the walls of the building. Wireless network technologies such as Bluetooth or Wi-Fi can also be used in the process of local determining the mobile platforms position in industrial premises. But such methods have a problem with providing the required accuracy. The relevance of these studies is associated with solving the problem of local positioning of mobile robots in a room with an accuracy of ten centimeters. The article presents a comparative analysis of determining coordinates’ principles by the AOA, TOA, TDOA and RSSI methods. It is proposed to use BLE technologies based on the RSSI data received from base stations. Using the triangulation method, formulas are obtained for solving the problem of determining the coordinates of an object moving in space. The software and hardware complex architecture has been developed. It is proposed to use ESP32 modules as base radio stations. The RSSI value is very unstable, so the positioning accuracy will depend on the number of base stations and the additional software tools used.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"083 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91155887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.30837/rt.2022.2.209.03
I. Gorbenko, С.О. Kandiy, Ye. V. Ostrianska
Post-quantum cryptography is a field of research that studies cryptographic transformations protected against attacks using quantum computers. For many years, lattice-based cryptography has become one of the most promising solutions to protect against the threat of quantum computing. An important feature of the post-quantum period in cryptography is the significant uncertainty about the source data for cryptanalysis and countermeasures in the capabilities of quantum computers, their mathematical support and software, as well as the application of quantum cryptanalysis to existing cryptocurrencies and cryptoprotocol. The main methods are mathematical methods of electronic signature, which have undergone significant analysis and justification in the process of extensive research by cryptologists and mathematicians at the highest level. The security of signature schemes depends strongly on the standard deviation of the discrete Gaussian distribution, which has a sampling algorithm. In this paper, the most common variants of sampling algorithms were considered and analyzed, because the quality of all algorithms depends significantly on the structure of the lattice for which sampling takes place. A comparison of the quality of lattice sampling algorithms is highlighted. In particular, the paper considers Klein's algorithms (its modification is the Thomas Prest and Dukas algorithm), Peikert's algorithm and the floating-point sampling algorithm. Klein's sampling algorithm, in particular its modification, namely, the Dukas-Prest algorithm, gives the smallest vectors. Theoretically, it is much better than Klein's algorithm on NTRU lattices, but it requires the use of floating-point arithmetic, which complicates greatly the analysis of its security and tocreation of software or hardware implementation.
{"title":"Comparison of the quality of sampling algorithms from discrete normal distribution on NTRU lattices","authors":"I. Gorbenko, С.О. Kandiy, Ye. V. Ostrianska","doi":"10.30837/rt.2022.2.209.03","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.03","url":null,"abstract":"Post-quantum cryptography is a field of research that studies cryptographic transformations protected against attacks using quantum computers. For many years, lattice-based cryptography has become one of the most promising solutions to protect against the threat of quantum computing. An important feature of the post-quantum period in cryptography is the significant uncertainty about the source data for cryptanalysis and countermeasures in the capabilities of quantum computers, their mathematical support and software, as well as the application of quantum cryptanalysis to existing cryptocurrencies and cryptoprotocol. The main methods are mathematical methods of electronic signature, which have undergone significant analysis and justification in the process of extensive research by cryptologists and mathematicians at the highest level. The security of signature schemes depends strongly on the standard deviation of the discrete Gaussian distribution, which has a sampling algorithm. In this paper, the most common variants of sampling algorithms were considered and analyzed, because the quality of all algorithms depends significantly on the structure of the lattice for which sampling takes place. A comparison of the quality of lattice sampling algorithms is highlighted. In particular, the paper considers Klein's algorithms (its modification is the Thomas Prest and Dukas algorithm), Peikert's algorithm and the floating-point sampling algorithm. Klein's sampling algorithm, in particular its modification, namely, the Dukas-Prest algorithm, gives the smallest vectors. Theoretically, it is much better than Klein's algorithm on NTRU lattices, but it requires the use of floating-point arithmetic, which complicates greatly the analysis of its security and tocreation of software or hardware implementation.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"155 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79883246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.30837/rt.2022.2.209.20
N. Khmil, V. Kolesnikov, O. Altuhov
Differential diagnosis of stress adaptive mechanisms is one of the areas of modern biomedical engineering and the most complex part of the pre-nosological diagnosis of cardiac pathology. One of the manifestations of disadaptation in heart failure is a violation of the mechanisms of realization of the intracellular chain "signal-function". The concept of imbalance in the functioning of the adenylate cyclase system and β-adrenergic receptors of the erythrocytes membrane and cardiomyocytes is considered in the pathogenesis of the heart. The study of the dielectric constant (ε՜) of erythrocytes of patients with heart failure was performed using an instrument-recording complex based on microwave dielectrometry of the γ-dispersion region of free water dielectric permittivity. Testing of the β-adrenergic complex of the erythrocyte membrane by specific stimulators, blockers, and modulators was implemented at a fixed frequency of microwave radiofrequency generation (f = 37,7 GHz). Interpretation of the obtained experimental data was that the process of interaction of bioregulators with the biological system is accompanied by an increase or decrease in the relative amount of free water, which leads to a change in the real part of ε՜ complex dielectric constant. This allowed us to visualize the violation of the signal cell system at the molecular level, which manifested itself in the change of integral hydration by ε՜ parameter. It was shown that the change in the dielectric constant of the erythrocyte suspension at risk (patients with hereditary predisposition to dilated and ischemic cardiomyopathy) was significant relative to the dielectric parameters of erythrocyte samples from healthy donors; there was a tendency to block β-adrenergic receptors, with the combined action of adrenaline, PGE2 and cordanum, with Δε՜ = 0,009 ± 0,008 х 10-12 F/m. It should be noted the formation of preconditions for changes in the functioning of the adenylate cyclase system and the development of heart failure in the group at risk, is accompanied by dilated and ischemic cardiomyopathy. The effectiveness of the microwave dielectrometry method for the assessment of violations of adaptation mechanisms through the adenylate cyclase system of the erythrocyte membrane in dilated and ischemic forms of cardiomyopathies is shown. The results of the study are the basis for the introduction of the dielectric constant criterion in the general algorithm of pre-nosological diagnosis of heart failure.
{"title":"Evaluation of disorders of adaptive mechanisms in heart failure by microwave dielectrometry","authors":"N. Khmil, V. Kolesnikov, O. Altuhov","doi":"10.30837/rt.2022.2.209.20","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.20","url":null,"abstract":"Differential diagnosis of stress adaptive mechanisms is one of the areas of modern biomedical engineering and the most complex part of the pre-nosological diagnosis of cardiac pathology. One of the manifestations of disadaptation in heart failure is a violation of the mechanisms of realization of the intracellular chain \"signal-function\". The concept of imbalance in the functioning of the adenylate cyclase system and β-adrenergic receptors of the erythrocytes membrane and cardiomyocytes is considered in the pathogenesis of the heart. \u0000The study of the dielectric constant (ε՜) of erythrocytes of patients with heart failure was performed using an instrument-recording complex based on microwave dielectrometry of the γ-dispersion region of free water dielectric permittivity. Testing of the β-adrenergic complex of the erythrocyte membrane by specific stimulators, blockers, and modulators was implemented at a fixed frequency of microwave radiofrequency generation (f = 37,7 GHz). Interpretation of the obtained experimental data was that the process of interaction of bioregulators with the biological system is accompanied by an increase or decrease in the relative amount of free water, which leads to a change in the real part of ε՜ complex dielectric constant. This allowed us to visualize the violation of the signal cell system at the molecular level, which manifested itself in the change of integral hydration by ε՜ parameter. It was shown that the change in the dielectric constant of the erythrocyte suspension at risk (patients with hereditary predisposition to dilated and ischemic cardiomyopathy) was significant relative to the dielectric parameters of erythrocyte samples from healthy donors; there was a tendency to block β-adrenergic receptors, with the combined action of adrenaline, PGE2 and cordanum, with Δε՜ = 0,009 ± 0,008 х 10-12 F/m. It should be noted the formation of preconditions for changes in the functioning of the adenylate cyclase system and the development of heart failure in the group at risk, is accompanied by dilated and ischemic cardiomyopathy. \u0000The effectiveness of the microwave dielectrometry method for the assessment of violations of adaptation mechanisms through the adenylate cyclase system of the erythrocyte membrane in dilated and ischemic forms of cardiomyopathies is shown. The results of the study are the basis for the introduction of the dielectric constant criterion in the general algorithm of pre-nosological diagnosis of heart failure.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"25 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89886382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.30837/rt.2022.2.209.19
I. Prasol, О.A. Yeroshenko
The object of research is the process of electrical stimulation of human skeletal muscles during therapeutic therapy. The subject of study is a mathematical model of the electrostimulation characteristic, which relates the amplitude of muscle contraction and the frequency of the stimulating effect. The purpose of the work is to develop a mathematical model in the form of an analytical expression for describing the dependence of the amplitude of muscle contractions on the frequency of electrical stimuli. Methods used: methods of mathematical modeling, methods of structural and parametric identification of models, methods of approximation, methods of parametric optimization, methods of mathematical analysis. The results obtained: an analytical model in the form of a polynomial is proposed, which displays the dependence of the amplitude of muscle contraction on the frequency of stimuli; the degree of the polynomial is chosen and the coefficients of the model are obtained by parametric optimization; a model trajectory is built and the accuracy of modeling is estimated; an equation is obtained and its possible solutions are found to determine the optimal value of the stimulus frequency. The results can be used in the selection of individual effects of electrical stimulation during one session or with extrapolation over a number of sessions. Scientific novelty: an analytical description of the influence of the frequency of electrical stimuli on the mode of contraction of skeletal muscles has been obtained, which allows you to determine the individual optimal parameters of electromyostimulation.
{"title":"Modeling the electrical stimulation intensity dependence on stimulus frequency","authors":"I. Prasol, О.A. Yeroshenko","doi":"10.30837/rt.2022.2.209.19","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.19","url":null,"abstract":"The object of research is the process of electrical stimulation of human skeletal muscles during therapeutic therapy. The subject of study is a mathematical model of the electrostimulation characteristic, which relates the amplitude of muscle contraction and the frequency of the stimulating effect. The purpose of the work is to develop a mathematical model in the form of an analytical expression for describing the dependence of the amplitude of muscle contractions on the frequency of electrical stimuli. Methods used: methods of mathematical modeling, methods of structural and parametric identification of models, methods of approximation, methods of parametric optimization, methods of mathematical analysis. The results obtained: an analytical model in the form of a polynomial is proposed, which displays the dependence of the amplitude of muscle contraction on the frequency of stimuli; the degree of the polynomial is chosen and the coefficients of the model are obtained by parametric optimization; a model trajectory is built and the accuracy of modeling is estimated; an equation is obtained and its possible solutions are found to determine the optimal value of the stimulus frequency. The results can be used in the selection of individual effects of electrical stimulation during one session or with extrapolation over a number of sessions. Scientific novelty: an analytical description of the influence of the frequency of electrical stimuli on the mode of contraction of skeletal muscles has been obtained, which allows you to determine the individual optimal parameters of electromyostimulation.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"4 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80496558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.30837/rt.2022.2.209.06
G. Maleeva
The Rainbow signature scheme, proposed by Ding and Schmidt in 2005, is one of the oldest and most studied signature schemes in multidimensional cryptography. The Rainbow, based on the unbalanced Oil and Vinegar signature scheme, has the necessary cryptocurrency since 1999 with the right parameters. Interest in multivariate cryptography has increased in the last decade, as it is considered to be quantum-stable. Cryptanalysis of the Rainbow and its predecessors was actively developed in the early 2000s. Attacks from this era include the MinRank attack, the HighRank attack, the Bill-Gilbert attack, the UOV agreement attack, and the Rainbow bandwidth attack. After 2008, cryptanalysis seemed to have stopped, until the Rainbow's participation in the NIST PQC project, which motivated the continuation of cryptanalysis. During the second round of NIST, Bardett and others proposed a new algorithm for solving the MinRank problem. This dramatically increased the effectiveness of MinRank's attack, although not enough to threaten the parameters provided to NIST. A less memory-intensive version of this algorithm was suggested by Baena et al. Perlner and Smith-Tone analyzed the Rainbow bandwidth attack in depth, which showed that the attack was more effective than previously thought. This prompted the Rainbow team to increase slightly the parameters for the third round. During the third round, Bellens introduced a new attack that reduced the Rainbow's security by 220 times for SL 1. The Rainbow team claimed that despite the new attacks, the Rainbow's parameters still met NIST requirement. The purpose of this article is to present two new (partial) key recovery attacks on multivariate cryptographic transformations using rank systems.
{"title":"Analysis of partial key recovery attack on multivariate cryptographic transformations using rank systems","authors":"G. Maleeva","doi":"10.30837/rt.2022.2.209.06","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.06","url":null,"abstract":"The Rainbow signature scheme, proposed by Ding and Schmidt in 2005, is one of the oldest and most studied signature schemes in multidimensional cryptography. The Rainbow, based on the unbalanced Oil and Vinegar signature scheme, has the necessary cryptocurrency since 1999 with the right parameters. Interest in multivariate cryptography has increased in the last decade, as it is considered to be quantum-stable. \u0000Cryptanalysis of the Rainbow and its predecessors was actively developed in the early 2000s. Attacks from this era include the MinRank attack, the HighRank attack, the Bill-Gilbert attack, the UOV agreement attack, and the Rainbow bandwidth attack. After 2008, cryptanalysis seemed to have stopped, until the Rainbow's participation in the NIST PQC project, which motivated the continuation of cryptanalysis. During the second round of NIST, Bardett and others proposed a new algorithm for solving the MinRank problem. This dramatically increased the effectiveness of MinRank's attack, although not enough to threaten the parameters provided to NIST. A less memory-intensive version of this algorithm was suggested by Baena et al. Perlner and Smith-Tone analyzed the Rainbow bandwidth attack in depth, which showed that the attack was more effective than previously thought. This prompted the Rainbow team to increase slightly the parameters for the third round. During the third round, Bellens introduced a new attack that reduced the Rainbow's security by 220 times for SL 1. The Rainbow team claimed that despite the new attacks, the Rainbow's parameters still met NIST requirement. \u0000The purpose of this article is to present two new (partial) key recovery attacks on multivariate cryptographic transformations using rank systems.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"11 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87964751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.30837/rt.2022.2.209.22
Y. Khoroshailo, N. Zaichenko, О.B. Zaichenko
The article considers the topical problem of non-destructive filament defectoscopy for 3D printing. The subject of the research is the process of determining the refractive index of the filament material for 3D printing taking into account the reflections from sample opposite walls, which is studied by terahertz spectroscopy in the time domain. Reflections from opposite walls are called the Fabry-Perot effect, and interference members resulting from reflections from walls are traditionally taken into account by summation and represented as a series. The disadvantage of the model in the form of a simple summation is the rejection of the members of the series above the fourth, which leads to inaccuracies in the model. The main problem with terahertz spectroscopy and this study in particular is the contradiction between the rapid development of terahertz spectroscopy and the slow development of models used in terahertz spectroscopy, while the adjacent microwave region has a set of ready-made models. Models based on the description of a standing wave in the microwave tract with refinements, transferred to a new region of terahertz spectroscopy in the time domain. The scientific novelty lies in increasing accuracy by taking into account previously unaccounted for interference members. The analogy between the Fabry-Perot effect used in terahertz spectroscopy and the reflections in a microwave multiprobe multimeter suggested the following recommendations. First, because the phase distance between the sensors in the microwave multimeter is similar to the thickness of the sample in terahertz spectroscopy, therefore, there was choosen such a sample thickness that the interference members are compensated, and secondly, instead of simple sum up it is possibility apply algorithmic processing, the condition for this is the existence in addition to the main signal in the time domain of the recorded echo signals of much smaller amplitude, therefore, one can build a system of equations and by solving it to determine the desired refractive index parameters of the filament sample material.
{"title":"Improvement of spectroscopic method for determining refractive index of filament sample material for 3D printing in terahertz range","authors":"Y. Khoroshailo, N. Zaichenko, О.B. Zaichenko","doi":"10.30837/rt.2022.2.209.22","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.22","url":null,"abstract":"The article considers the topical problem of non-destructive filament defectoscopy for 3D printing. The subject of the research is the process of determining the refractive index of the filament material for 3D printing taking into account the reflections from sample opposite walls, which is studied by terahertz spectroscopy in the time domain. Reflections from opposite walls are called the Fabry-Perot effect, and interference members resulting from reflections from walls are traditionally taken into account by summation and represented as a series. The disadvantage of the model in the form of a simple summation is the rejection of the members of the series above the fourth, which leads to inaccuracies in the model. The main problem with terahertz spectroscopy and this study in particular is the contradiction between the rapid development of terahertz spectroscopy and the slow development of models used in terahertz spectroscopy, while the adjacent microwave region has a set of ready-made models. Models based on the description of a standing wave in the microwave tract with refinements, transferred to a new region of terahertz spectroscopy in the time domain. The scientific novelty lies in increasing accuracy by taking into account previously unaccounted for interference members. The analogy between the Fabry-Perot effect used in terahertz spectroscopy and the reflections in a microwave multiprobe multimeter suggested the following recommendations. First, because the phase distance between the sensors in the microwave multimeter is similar to the thickness of the sample in terahertz spectroscopy, therefore, there was choosen such a sample thickness that the interference members are compensated, and secondly, instead of simple sum up it is possibility apply algorithmic processing, the condition for this is the existence in addition to the main signal in the time domain of the recorded echo signals of much smaller amplitude, therefore, one can build a system of equations and by solving it to determine the desired refractive index parameters of the filament sample material.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"48 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91206261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.30837/rt.2022.2.209.14
V. Yesin, V. Vilihura
The growing popularity of data outsourcing to third-party cloud servers causes their owners to have serious concerns about their security due to possible data leakage. A well-known measure to solve this problem and ensure the confidentiality of data is to encrypt it. However, the use of traditional encryption techniques is faced with the problem of how to allow untrusted cloud servers to perform search operations, while the actual data transmitted must remain confidential. Searchable encryption is a powerful tool, a class of cryptographic techniques that attempts to solve this problem. Searchable encryption acts as a data management technique that allows data owners to store and manage their data on a third-party, untrusted cloud server, and allows the data user to delegate search functions to the cloud server to retrieve that data. Currently, there are a number of approaches to solving this problem, although there is still no dominant solution. Therefore, the paper presents an overview of current secure search solutions. The main searchable encryption techniques are considered, which allow you to perform search operations on encrypted data without disclosing any information about what is being searched. The strengths and weaknesses of the analyzed methods are highlighted. Models and architectures of existing secure search engines are analyzed, taking into account the peculiarities of their operation scenarios. The problem of confidentiality in searchable encryption schemes is discussed. A comparative analysis of the performance of several searchable symmetric encryption schemes is given. Various gaps in the area under consideration are identified, with indication of open research problems.
{"title":"Research on the main methods and schemes of encryption with search capability","authors":"V. Yesin, V. Vilihura","doi":"10.30837/rt.2022.2.209.14","DOIUrl":"https://doi.org/10.30837/rt.2022.2.209.14","url":null,"abstract":"The growing popularity of data outsourcing to third-party cloud servers causes their owners to have serious concerns about their security due to possible data leakage. A well-known measure to solve this problem and ensure the confidentiality of data is to encrypt it. However, the use of traditional encryption techniques is faced with the problem of how to allow untrusted cloud servers to perform search operations, while the actual data transmitted must remain confidential. Searchable encryption is a powerful tool, a class of cryptographic techniques that attempts to solve this problem. Searchable encryption acts as a data management technique that allows data owners to store and manage their data on a third-party, untrusted cloud server, and allows the data user to delegate search functions to the cloud server to retrieve that data. Currently, there are a number of approaches to solving this problem, although there is still no dominant solution. Therefore, the paper presents an overview of current secure search solutions. The main searchable encryption techniques are considered, which allow you to perform search operations on encrypted data without disclosing any information about what is being searched. The strengths and weaknesses of the analyzed methods are highlighted. Models and architectures of existing secure search engines are analyzed, taking into account the peculiarities of their operation scenarios. The problem of confidentiality in searchable encryption schemes is discussed. A comparative analysis of the performance of several searchable symmetric encryption schemes is given. Various gaps in the area under consideration are identified, with indication of open research problems.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"35 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81932439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}