958,281 research outputs found

    Evaluation and interoperatibility of security protocols and arquitectures

    Get PDF
    During the last years, use of security protocols has increased significantly. Protection of the communications had been provided by security protocols and architectures, however some problems have appeared, revealing that the potential expansion of ICT can be limited if some interoperability problems are not solved. Our group have created and implemented a new methodology in order to reduce the interoperability problems of the implementations of security protocols and architectures. This methodology develops a completed conformance evaluation with the particular security standard and furthermore realizes a performance analysis of the more important parameters for the development of security protocols

    Applications of tripled chaotic maps in cryptography

    Full text link
    Security of information has become a major issue during the last decades. New algorithms based on chaotic maps were suggested for protection of different types of multimedia data, especially digital images and videos in this period. However, many of them fundamentally were flawed by a lack of robustness and security. For getting higher security and higher complexity, in the current paper, we introduce a new kind of symmetric key block cipher algorithm that is based on \emph{tripled chaotic maps}. In this algorithm, the utilization of two coupling parameters, as well as the increased complexity of the cryptosystem, make a contribution to the development of cryptosystem with higher security. In order to increase the security of the proposed algorithm, the size of key space and the computational complexity of the coupling parameters should be increased as well. Both the theoretical and experimental results state that the proposed algorithm has many capabilities such as acceptable speed and complexity in the algorithm due to the existence of two coupling parameter and high security. Note that the ciphertext has a flat distribution and has the same size as the plaintext. Therefore, it is suitable for practical use in secure communications.Comment: 21 pages, 10 figure

    Markov modeling of moving target defense games

    Get PDF
    We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework allows modeling of broad range of MTD strategies, provides general theorems about how the probability of a successful adversary defeating an MTD strategy is related to the amount of time/cost spent by the adversary, and shows how a multi-level composition of MTD strategies can be analyzed by a straightforward combination of the analysis for each one of these strategies. Within the proposed framework we define the concept of security capacity which measures the strength or effectiveness of an MTD strategy: the security capacity depends on MTD specific parameters and more general system parameters. We apply our framework to two concrete MTD strategies

    Challenges of formal social security systems in Sudan

    Get PDF
    The present paper discusses issues of challenges of social security systems in Sudan. Following parameters advanced by ILO and UNCOSOC, those systems are analyzed. The conclusions focus on their applicability that faces axial difficulties mainly presented in the state of institutional interregnum facing the country. Moreover, it is important to revisit aspects of social cohesion that serves greater role in traditional social security in the Sudan.Sudan,institutional interregnum, Social Cohesion, Social Security
    corecore