1,730 research outputs found

    Determination of error probability of cryptography and safety codes for safety-related railway applications

    Get PDF
    The paper deals with the problem of determination of error probability of cryptography and safety codes used within the safety-related railway applications with increasing safety integrity level (SIL). In the paper are also described requirements for cryptographic block code and safety linear block code in safety-related communications for railway application. The main part is oriented to the description of mathematical apparatus for the error probability of the cryptography and safety block codes for communication between two safety-related devices across GSM-R communication channel. The practical results are related to the quantitative evaluation of an average error probability of the cryptography and safety codes for several lengths of safety-related messages which are expanded about determination of the cryptography degradation with using GMSK modulation scheme

    Modelling of Hazards Effect on Safety Integrity of Open Transmission Systems

    Get PDF
    The paper is concerned with safety appraisal of safety-related communication systems (SRComSs) with open transmission system, where except in addition to message transmission integrity also confidentiality is recommended to be provided. The authors focused on safety analysis of safety-related messages transmission secured using cryptographic and safety code mechanisms and on the possibilities of modelling safety-related industrial communication system, where a high safety integrity level SIL3 is required to be guaranteed. The paper features mathematical procedures to calculate the rate of hazardous transmission failure of safety-related messages in the result of electromagnetic interference (EMI) effects in the communication channel and by the presence of random hardware failures of SRComS. The theoretical techniques and safety analyses emerge from risk analysis and are compared with the knowledge gained by the authors during safety verifications of such systems for transportation applications. It is a little explored area, because the standards concerning safety-related control systems (SRCSs) did not support any cryptography-based methods. A quantitative safety integrity analysis of SRComS is based on utilisation of Markov's processes. The proposed Markov's model is applied on an open transmission system built on the IEEE 802.11g standard, which is complemented by cryptographic and safety code. The calculations are performed using Mathematica software tool. The proposed base model is universal and can be modified (simplified) in dependence on the parameters of a specific SRComS

    Quantitative Assessment of Safety Integrity Level of Message Transmission Between Safety-Related Equipment

    Get PDF
    This paper describes and analyses the possibilities of a quantitative assessment of message transmission between safety-related equipment for control and communication systems with a guarantee of a higher safety integrity level (SIL). The theoretical methods and standards recommended for industrial safety-related control, information and communication systems with SIL3 are described. The main part of the contribution covers theoretical methods and practical procedures used within a safety analysis of safety-related message transmission with the requirement of SIL4 for the area of railway interlocking systems. The theoretical analysis of these methods is compared with the knowledge and experience, the authors gained within several safety verifications of such systems in practice in Slovakia as well as abroad. Also, based on a case study in the mentioned application area, the authors proposed their own quantitative mathematical model for assessing the safety integrity level of message transmission within a closed transmission system with the failure tree analysis (FTA) and Markov's analysis (MA). The designed model, which evaluates the effect of electromagnetic interferences (EMI) and random hardware failures of a safety-related communication system (SRComS) to its safety, was realised and verified. The verification in available conditions confirmed the contribution of the model to the process of objectification of the safety assessment of message transmission via SRComS

    Too Many Secrets: Challenges to the Control of Strong Crypto and the National Security Perspective

    Get PDF

    SYNERGY OF BUILDING CYBERSECURITY SYSTEMS

    Get PDF
    The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed. ISBN 978-617-7319-31-2 (on-line)ISBN 978-617-7319-32-9 (print) ------------------------------------------------------------------------------------------------------------------ How to Cite: Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et. al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. doi: http://doi.org/10.15587/978-617-7319-31-2 ------------------------------------------------------------------------------------------------------------------ Indexing:                    Розвиток сучасної світової спільноти тісно пов’язаний з досягненнями в області обчислювальних ресурсів і кіберпростору. Формування та розширення асортименту послуг базується на досягненнях людства у галузі високих технологій. Однак стрімке зростання обчислювальних ресурсів, поява повномасштабного квантового комп’ютера посилює вимоги до систем безпеки не тільки інформаційно-комунікаційних, але і до кіберфізичних систем і технологій. У першому розділі обговорюються методологічні основи побудови систем безпеки для об'єктів критичної інфраструктури на основі моделювання процесів поведінки антагоністичних агентів у систем безпеки. У другому розділі пропонується концепція інформаційної безпеки в соціальних мережах, яка заснована на математичних моделях захисту даних, з урахуванням впливу конкретних параметрів соціальної мережі та наслідків для неї. Враховуються нелінійні взаємозв'язки параметрів системи захисту, атак, соціальних мереж, а також вплив індивідуальних характеристик користувачів і характеру взаємовідносин між ними. У третьому розділі розглядаються практичні аспекти методології побудови постквантових алгоритмів для асиметричних криптосистем Мак-Еліса та Нідеррейтера на алгебраїчних кодах (еліптичних та модифікованих еліптичних кодах), їх математичні моделі та практичні алгоритми. Запропоновано гібридні конструкції криптокоду Мак-Еліса та Нідеррейтера на дефектних кодах. Вони дозволяють істотно знизити енергетичні витрати на реалізацію, забезпечуючи при цьому необхідний рівень криптографічної стійкості системи в цілому. Запропоновано концепцію безпеки корпоративних інформаційних та освітніх систем, які засновані на побудові адаптивної системи захисту інформації. ISBN 978-617-7319-31-2 (on-line)ISBN 978-617-7319-32-9 (print) ------------------------------------------------------------------------------------------------------------------ Як цитувати: Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et. al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. doi: http://doi.org/10.15587/978-617-7319-31-2 ------------------------------------------------------------------------------------------------------------------ Індексація:                 &nbsp

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    The Birth of a New Industry: Entry by Start-ups and the Drivers of Firm Growth. The Case of Encryption Software

    Get PDF
    The paper analyses the birth of the Encryption Software Industry (ESI), a new niche in the software industry. Using a Chandlerian perspective, this work reports the main facts about firm entry and growth, with a particular focus on start-up strategies and actions. Since scale economies do not play a major role in ESI, the paper investigates the different sources of firm competitive advantages. This work shows that innovation and product differentiation, along with investments in co-specialised assets, are variables strongly correlated to young firm probability to survive and grow. In so doing, we have collected highly detailed information on product introduction, US patents granted, worldwide alliances and biographical data of firm founders.Entry, Entrepreneurship, Innovation, Software.
    corecore