首页 > 最新文献

Theoretical and applied cybersecurity最新文献

英文 中文
Quantum Distinguishing Attacks on Generalized Feistel Schemes 广义Feistel方案的量子区分攻击
Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.279992
Andrii Fesenko, Anastasiia Zvychaina
{"title":"Quantum Distinguishing Attacks on Generalized Feistel Schemes","authors":"Andrii Fesenko, Anastasiia Zvychaina","doi":"10.20535/tacs.2664-29132023.1.279992","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.279992","url":null,"abstract":"","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135109033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposing of suggestive influence detection and classification method based on fuzzy logic and feature driven analysis 提出了一种基于模糊逻辑和特征驱动分析的暗示性影响检测与分类方法
Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.283565
Yuliia Nakonechna
This research proposes an approach to identify and classify tools utilized in information operations that aim to exert suggestive influence. The proposed method combines fuzzy sets theory and fuzzy inference methods with a feature-based analysis approach. By employing this approach, the study focuses on identifying and categorizing tools such propaganda, fake, disinformation, manipulation, and artificial narrative. This framework provides a comprehensive and nuanced understanding of the various tactics employed in information operations, allowing for improved analysis and mitigation strategies.
本研究提出了一种方法来识别和分类信息操作中使用的旨在发挥暗示性影响的工具。该方法将模糊集理论和模糊推理方法与基于特征的分析方法相结合。通过采用这种方法,研究的重点是识别和分类工具,如宣传、虚假、虚假信息、操纵和人为叙述。该框架提供了对信息行动中采用的各种战术的全面和细致的理解,从而改进了分析和缓解战略。
{"title":"Proposing of suggestive influence detection and classification method based on fuzzy logic and feature driven analysis","authors":"Yuliia Nakonechna","doi":"10.20535/tacs.2664-29132023.1.283565","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.283565","url":null,"abstract":"This research proposes an approach to identify and classify tools utilized in information operations that aim to exert suggestive influence. The proposed method combines fuzzy sets theory and fuzzy inference methods with a feature-based analysis approach. By employing this approach, the study focuses on identifying and categorizing tools such propaganda, fake, disinformation, manipulation, and artificial narrative. This framework provides a comprehensive and nuanced understanding of the various tactics employed in information operations, allowing for improved analysis and mitigation strategies.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135108163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Frequency Analysis of Russian Propaganda Telegram Channels 俄罗斯宣传电报频道频率分析
Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.277647
Kyrylo Kiforchuk
On 24 February 2022 Russia launched a full-scale invasion of Ukraine. In addition to large-scale military operations against Ukraine, many information attacks were organized. These attacks began before the invasion: for several months, Russia has been actively paving the way for the war by launching different types of information operations in cyberspace. As an example, Russian propaganda media were promoting the idea of “Russian world”, which calls into a question the existence of Ukraine as an independent state and justifies Russian military aggression. In this work, Russian propaganda Telegram channels were analyzed using term frequency analysis with bag-of-words technique. For this analysis, text data from Telegram propaganda channels was collected and processed. The obtained results revealed different patterns in Russian propaganda against Ukraine via Telegram channels.
2022年2月24日,俄罗斯对乌克兰发动了全面入侵。除了针对乌克兰的大规模军事行动外,还组织了许多信息攻击。这些攻击在入侵之前就开始了:几个月来,俄罗斯一直在积极地为战争铺平道路,在网络空间发起不同类型的信息行动。例如,俄罗斯宣传媒体正在宣传“俄罗斯世界”的概念,这使乌克兰作为一个独立国家的存在受到质疑,并为俄罗斯的军事侵略辩护。本研究采用词袋技术对俄罗斯宣传电报频道进行词频分析。为了进行分析,我们收集并处理了Telegram宣传频道的文本数据。获得的结果揭示了俄罗斯通过电报频道对乌克兰进行宣传的不同模式。
{"title":"Frequency Analysis of Russian Propaganda Telegram Channels","authors":"Kyrylo Kiforchuk","doi":"10.20535/tacs.2664-29132023.1.277647","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.277647","url":null,"abstract":"On 24 February 2022 Russia launched a full-scale invasion of Ukraine. In addition to large-scale military operations against Ukraine, many information attacks were organized. These attacks began before the invasion: for several months, Russia has been actively paving the way for the war by launching different types of information operations in cyberspace. As an example, Russian propaganda media were promoting the idea of “Russian world”, which calls into a question the existence of Ukraine as an independent state and justifies Russian military aggression. In this work, Russian propaganda Telegram channels were analyzed using term frequency analysis with bag-of-words technique. For this analysis, text data from Telegram propaganda channels was collected and processed. The obtained results revealed different patterns in Russian propaganda against Ukraine via Telegram channels.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135109032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Forgery Attack on the Post-Quantum AJPS-2 Cryptosystem and Modification of the AJPS-2 Cryptosystem by Changing the Class of Numbers Used as a Module 后量子AJPS-2密码系统的伪造攻击及AJPS-2密码系统的修改
Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.286166
Dariya Yadukha
In recent years, post-quantum (quantum-resistant) cryptography has been actively researched, in particular, due to the National Institute of Standards and Technology's (NIST) Post-Quantum Cryptography Competition (PQC), which has been running since 2017. One of the participants in the first round of the competition is the Mersenne-756839 key encapsulation mechanism based on the AJPS-2 encryption scheme. The arithmetic modulo Mersenne number is used to construct the cryptoprimitives of the AJPS family. In this paper, we propose a forgery attack on the AJPS-2 cryptosystem using an active eavesdropper, and two modifications of the post-quantum AJPS-2 cryptosystem, namely, the modification of AJPS-2 using the arithmetic modulo generalized Mersenne number and Crandall number. Moreover, new algebraic problems are defined, on the complexity of which the security of the created modifications is based. The advantages of these modifications are the extension of the number class used as a module in the cryptosystem and the security against the forgery attack with the active eavesdropper, which was successful in the original AJPS-2.
近年来,后量子(抗量子)密码学得到了积极的研究,特别是由于自2017年以来一直在运行的美国国家标准与技术研究院(NIST)后量子密码学竞赛(PQC)。第一轮竞赛的参与者之一是基于AJPS-2加密方案的Mersenne-756839密钥封装机制。利用算术模梅森数构造了AJPS族的密码基元。本文提出了一种利用有源窃听器对AJPS-2密码系统进行伪造攻击的方法,并对后量子AJPS-2密码系统进行了两种修改,即利用算术模广义梅森数和克兰德尔数对AJPS-2进行修改。此外,还定义了新的代数问题,所创建的修改的安全性基于复杂性。这些修改的优点是扩展了作为密码系统模块的数字类,并且增加了主动窃听器对伪造攻击的安全性,这在原来的AJPS-2中已经取得了成功。
{"title":"The Forgery Attack on the Post-Quantum AJPS-2 Cryptosystem and Modification of the AJPS-2 Cryptosystem by Changing the Class of Numbers Used as a Module","authors":"Dariya Yadukha","doi":"10.20535/tacs.2664-29132023.1.286166","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.286166","url":null,"abstract":"In recent years, post-quantum (quantum-resistant) cryptography has been actively researched, in particular, due to the National Institute of Standards and Technology's (NIST) Post-Quantum Cryptography Competition (PQC), which has been running since 2017. One of the participants in the first round of the competition is the Mersenne-756839 key encapsulation mechanism based on the AJPS-2 encryption scheme. The arithmetic modulo Mersenne number is used to construct the cryptoprimitives of the AJPS family. In this paper, we propose a forgery attack on the AJPS-2 cryptosystem using an active eavesdropper, and two modifications of the post-quantum AJPS-2 cryptosystem, namely, the modification of AJPS-2 using the arithmetic modulo generalized Mersenne number and Crandall number. Moreover, new algebraic problems are defined, on the complexity of which the security of the created modifications is based. The advantages of these modifications are the extension of the number class used as a module in the cryptosystem and the security against the forgery attack with the active eavesdropper, which was successful in the original AJPS-2.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135108151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Analysis Template Attacks on AES-128 Hardware Implementations and Protection Against Them AES-128硬件实现的功耗分析模板攻击及防范
Pub Date : 2023-09-19 DOI: 10.20535/tacs.2664-29132023.1.281307
Mykola Graivoronskyi, Andrii Dehtyariov
The purpose of this work is to research AES-128 power analysis template attack and propose a practical way to mitigate such kind of side-channel attacks. The research includes a review of power analysis side-channel attacks, an experiment with the collection of Atmega328PU chip power samples using Hantek 6022BE oscilloscope, processing collected data, and modeling – building a statistical template of the device and analyzing parameters of the side-channel attack.The work is focused on preparation and carrying out the experiment. The experimental bench layout and procedures for collecting and processing the data are considered in detail. The result of this work is the confirmation of the effectiveness of power analysis template attacks on AES-128 for Arduino Uno hardware, and a mechanism for mitigating such kind of attacks on the particular hardware and software implementation. Research materials described in the current work could be used for developing other side-channel template attack mitigation mechanisms for other cryptographic implementations.
本文的目的是研究AES-128功率分析模板攻击,并提出一种切实可行的方法来缓解此类侧信道攻击。本研究包括对功率分析侧通道攻击的回顾,利用汉泰6022BE示波器收集Atmega328PU芯片功率样本进行实验,处理收集到的数据,并建模-建立器件的统计模板并分析侧通道攻击的参数。这项工作的重点是准备和实施实验。详细讨论了实验台架的布置和数据采集与处理的步骤。这项工作的结果是确认了针对Arduino Uno硬件的AES-128的功率分析模板攻击的有效性,以及一种减轻特定硬件和软件实现上此类攻击的机制。当前工作中描述的研究材料可用于为其他加密实现开发其他侧信道模板攻击缓解机制。
{"title":"Power Analysis Template Attacks on AES-128 Hardware Implementations and Protection Against Them","authors":"Mykola Graivoronskyi, Andrii Dehtyariov","doi":"10.20535/tacs.2664-29132023.1.281307","DOIUrl":"https://doi.org/10.20535/tacs.2664-29132023.1.281307","url":null,"abstract":"The purpose of this work is to research AES-128 power analysis template attack and propose a practical way to mitigate such kind of side-channel attacks. The research includes a review of power analysis side-channel attacks, an experiment with the collection of Atmega328PU chip power samples using Hantek 6022BE oscilloscope, processing collected data, and modeling – building a statistical template of the device and analyzing parameters of the side-channel attack.The work is focused on preparation and carrying out the experiment. The experimental bench layout and procedures for collecting and processing the data are considered in detail. The result of this work is the confirmation of the effectiveness of power analysis template attacks on AES-128 for Arduino Uno hardware, and a mechanism for mitigating such kind of attacks on the particular hardware and software implementation. Research materials described in the current work could be used for developing other side-channel template attack mitigation mechanisms for other cryptographic implementations.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135108160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Theoretical and applied cybersecurity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1