scholarly journals Application three-valued logic in symmetric block encryption algorithms

2021 ◽  
Vol 2131 (2) ◽  
pp. 022082
Author(s):  
T R Abdullaev ◽  
G U Juraev

Abstract The issues of limiting the use of binary logic for the further development of science engineering are discussed. The effectiveness of the use of the ternary number system at this stage in the development of information technologies is substantiated and shown. A method is proposed for increasing the informational entropy of plaintext by adding random data using ternary logic in the process of symmetric encryption. To reliably hide the added random data, the first transforming function is proposed to choose gamming with a key.

2014 ◽  
Vol 60 (1) ◽  
pp. 25-45 ◽  
Author(s):  
Dmytro Kaidalov ◽  
Roman Oliynykov ◽  
Oleksandr Kazymyrov

Abstract Symmetric block ciphers are the most widely used cryptographic primitives. In addition to providing privacy, block ciphers are used as basic components in the construction of hash functions, message authentication codes, pseudorandom number generators, as a part of various cryptographic protocols, etc. Nowadays the most popular block cipher is AES (Advanced Encryption Standard). It is used as a standard of symmetric encryption in many countries. Several years ago it was found a theoretical attack exploiting the AES key expansion algorithm that allows reducing significantly the complexity comparing to the brute force attack. This article presents an advanced method of finding the number of active substitutions that helps to estimate the security of encryption algorithms against related-key attacks. The method was applied to a prospective block cipher, which is a candidate for the Ukrainian standard


2021 ◽  
Vol 54 (1) ◽  
pp. 1-30
Author(s):  
Zarin Tasnim Sandhie ◽  
Jill Arvindbhai Patel ◽  
Farid Uddin Ahmed ◽  
Masud H. Chowdhury

Computing technologies are currently based on the binary logic/number system, which is dependent on the simple on and off switching mechanism of the prevailing transistors. With the exponential increase of data processing and storage needs, there is a strong push to move to a higher radix logic/number system that can eradicate or lessen many limitations of the binary system. Anticipated saturation of Moore’s law and the necessity to increase information density and processing speed in the future micro and nanoelectronic circuits and systems provide a strong background and motivation for the beyond-binary logic system. In this review article, different technologies for Multiple-valued-Logic (MVL) devices and the associated prospects and constraints are discussed. The feasibility of the MVL system in real-world applications rests on resolving two major challenges: (i) development of an efficient mathematical approach to implement the MVL logic using available technologies, and (ii) availability of effective synthesis techniques. This review of different technologies for the MVL system is intended to perform a comprehensive investigation of various MVL technologies and a comparative analysis of the feasible approaches to implement MVL devices, especially ternary logic.


2020 ◽  
pp. 3-10
Author(s):  
I. V. Levchenko

The article considers the feasibility of integrating artificial intelligence technologies into school education and identifies a problem in identifying didactic elements in the field of artificial intelligence, which must be mastered in a school informatics course. The purpose of the article is to propose variant of the content of teaching the elements of artificial intelligence for the general education of schoolchildren as part of the curricular and extracurricular activities in informatics. An analysis of the psychological, pedagogical and scientific-methodical literature in the field of artificial intelligence made it possible to identify the appropriateness of teaching schoolchildren the elements of artificial intelligence in the framework of a comprehensive informatics course, as the theoretical foundations of modern information technologies. Summarizing and systematizing the learning experience of schoolchildren in the field of artificial intelligence made it possible to form variant of the content of teaching the elements of artificial intelligence, which can be implemented in a compulsory informatics course for 9th grade, as well as in elective classes. The results of the study are the theoretical basis for the further development of the components of the methodological system of teaching the elements of artificial intelligence in a school informatics course. The research materials may be useful to specialists in the field of teaching informatics and to informatics teachers.


2020 ◽  
Vol 29 (12) ◽  
pp. 2050196 ◽  
Author(s):  
Maryam Shahangian ◽  
Seied Ali Hosseini ◽  
Reza Faghih Mirzaee

Ternary logic can reduce the number of interconnections, chip area and power dissipation. In addition, one of the important features of carbon nanotube field effect transistors (CNTFETs) is the capability of adjusting threshold voltage. As a result, the design complexity of ternary circuits can be decreased. The structure of a mixed radix system which is based on multi-valued and binary logic is more appropriate compared to only multiple-valued logic (MVL). Therefore, ternary-to-binary and binary-to-ternary converters are the essential components for the ternary signaling on the bus and the binary logic processing circuits. It is also important for the creation of compatibility between the binary and ternary logic. This study is about a multi-digit binary-to-ternary converter by using CNTFET. At first, the algorithm used for the multi-digit conversion from ternary to binary logic is addressed in this paper. Then, the paper proposes a block diagram suitable for designing the multi-digit ternary-to-binary converter. Some new gates including One-Active Gate and Two-Active Gate, as well as two types of binary half-and full-adders, are designed for the purpose of implementing the proposed block diagram. This is done by adjusting the proper threshold voltage for CNTFETs. The proposed algorithm can also be applied to any desired number of bits. The proper operation and high efficiency of the proposed converter are confirmed by HSPICE simulation results and 32[Formula: see text]nm CNTFET technology from the Stanford University.


2021 ◽  
Vol 273 ◽  
pp. 11012
Author(s):  
Polina Dmitrieva

The article is devoted to the description and explanation of individual psychological and social phenomena from the point of view of actualizing thanatic issues during the COVID-19 pandemic and its information coverage. The relevance of the study is due to the situation of the spread of coronavirus infection, the peculiarities of combating its spread, the influence of information technologies on this process and the need to understand the phenomena that have developed in society. The novelty of the research lies in the complex consideration of various social and individual psychological phenomena from the standpoint of the influence of the vital threat and existential fears on the individual and social consciousness. The article contains information on the socio-psychological phenomena that manifested themselves during the COVID-19 pandemic (alarmism, infodemic, intergroup tensions, stigmatization of certain groups of the population, a shift in political preferences, aggravation or emergence of mental disorders, inadequate purchasing activity) and describes them in terms of Terror Management Theory. In the conclusion, prospects are given for using the provisions of Terror Management Theory to develop a strategy for overcoming a pandemic situation, taking into account the action of proximal and distal defenses. The author comes to the conclusion that the features of the information coverage of the situation have a strong influence on its further development, in connection with which it is necessary to develop a clear plan for the preparation of official information that meets the criteria of completeness, credibility, scientific character and conveys the idea of positive realism.


2021 ◽  
Vol 10 (19) ◽  
pp. 43-57
Author(s):  
Filip Bugarčić ◽  
Marijana Bugarčić

Air transport as an organized form of service provision, especially in passenger transport, can be important for increasing the number of foreign tourists. Globalization and the development of information technologies have contributed to the development of the business model of airlines, which has enabled a significant reduction in the cost of air travel and the accelerated development of this industry. Therefore, the emphasis is placed on the global trend of development of low-cost airlines, their way of doing business and the effects they have on the development of tourism. The increase in the number of low-budget airlines has multiple effects on the development of international tourism and passenger transport due to cheaper transport, which is made possible by improving the competitiveness of air transport after its deregulation. In addition, lower prices and a better logistical position can contribute to an increase in the number of foreign tourists and a higher income for this industry, as well as other related economic activities. The aim of this paper is to examine through theoretical and empirical insight whether there is an impact of low-cost airlines on the volume of air traffic and the intensity of passenger transport, with an emphasis on existing literature, as well as empirical confirmation on the example of Serbia. The conducted research has important implications, since in pandemic conditions, further development of low-budget airlines is expected to contribute to the recovery of air traffic and tourism.


2021 ◽  
Vol 50 (4) ◽  
pp. 786-807
Author(s):  
Alen Salkanovic ◽  
Sandi Ljubic ◽  
Ljubisa Stankovic ◽  
Jonatan Lerga

This paper evaluates the performances of numerous encryption algorithms on mobile devices running the Android operating system. The primary objective of our research was to measure and compare the relative performances of tested algorithm implementations (Data Encryption Standard (DES), 3DES, Advanced Encryption Standard (AES), ChaCha20, Blowfish, and Rivest Cipher 4 (RC4)) on the Android platform. The algorithms were compared in terms of CPU utilization by measuring the time required to encrypt and decrypt variable size text files. Besides evaluating the six common symmetric encryption ciphers, a comparison has been conducted for several Password-Based Encryption (PBE) algorithms. Diverse cipher transformations were evaluated for each algorithm by utilizing various feedback modes and padding schemes. Two smartphone devices were used for testing, with different versions of the Android operating system and hardware specifications. The summarized performance outcomes for various cipher transformations are presented to demonstrate the effectiveness of each algorithm.


Author(s):  
Olena Osadcha

The article deals with the development of the model of students’ independent work under conditions of distance learning. The importance of the research into this problem is determined, on the one hand, by the growing possibilities of using various information technologies and, on the other hand by the necessity to adapt to the conditions of today’s world where independent work of students is becoming increasingly important. The advantages and disadvantages of distance learning have been explored. The author studied the role of independent work in the formation of the professional competences of students. The issue of modeling in the area of education has been tackled. The approaches to the development of the model of independent work have been identified and analyzed. The components of the model, such as the goal, the tasks, the content, the methods, the means and evaluation of results have been determined and characterized. The prospects of further development of this research are related to the exploration of models of independent work of students majoring in different areas.


2020 ◽  
Vol 8 (6) ◽  
pp. 5759-5764

Given the current use of the Internet, The most important thing is to provide security to the user's information. Many encryption algorithms already exist for this purpose. Here we discussed a new process called Mahaviracharya Encryption Standard. MES is a symmetric encryption algorithm. Here, this algorithm is cryptanalyzed, and compared with blowfish algorithm. MES algorithm can be used instead off algorithms like AES, Blowfish etc.


Sign in / Sign up

Export Citation Format

Share Document